last executing test programs: 2.425531712s ago: executing program 1 (id=6981): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x45ba}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000fcffffff0020000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="000000006c3058fb00001b0226eacdb5a46524e3f2afa9ff32964d278068753ebc7107445ccd685574542ca4030bd0bb968968009b", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="03000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4, 0xffffffffffffffff}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a04, 0x0, @perf_bp={0x0}, 0x1e005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x4, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x94) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x1a, 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r7}, 0x10) 2.424553003s ago: executing program 4 (id=6982): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb7, 0xb7, 0x3, [@union={0x2, 0x0, 0x0, 0x5, 0x0, 0x3}, @datasec={0xc, 0x8, 0x0, 0xf, 0x3, [{0x3, 0x40, 0x806}, {0x1, 0x6, 0x6}, {0x2, 0x3, 0xffffff10}, {0x2, 0x8, 0x4}, {0x3, 0x9, 0x6b}, {0x1, 0x9fe0, 0xfff}, {0x5, 0x1, 0x6}, {0x3, 0x5, 0x4337}], "beb41a"}, @float={0x10, 0x0, 0x0, 0x10, 0x14}, @enum64={0xe, 0x1, 0x0, 0x13, 0x1, 0x6, [{0x2, 0x3, 0x3}]}, @float={0x2, 0x0, 0x0, 0x10, 0x4}, @volatile={0x8, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x61]}}, &(0x7f00000002c0)=""/101, 0xd3, 0x65, 0x0, 0x4e, 0x10000}, 0x28) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r1}, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r3}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xfffffffe, 0x9, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff0000"], 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000340)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{}, &(0x7f0000000400), &(0x7f00000004c0)='%pI4 \x00'}, 0x20) 1.919250362s ago: executing program 1 (id=6990): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb7020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r0}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 1.620587448s ago: executing program 4 (id=6991): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x94) (async) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8148}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1801000000050000000000000000ea0485000000d000000095"], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r3 = getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x4, 0x9, 0x9, 0x0, 0x10, 0x80210, 0xe, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffffffa, 0x0, @perf_config_ext={0x80, 0x4}, 0x20, 0x7fff, 0x1, 0x0, 0x8, 0x1, 0x7, 0x0, 0xa5, 0x0, 0x7}, r3, 0xe, r0, 0x1) (async) r4 = openat$cgroup_procs(r2, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000001c0), 0x12) (async) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, 0x0, 0x0) 1.610295008s ago: executing program 1 (id=6992): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0x0}, 0x18) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x12, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x2, 0x4, 0x6, 0xb, 0x0, 0xffffffffffffffff, 0x40}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r3}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r4, 0x0, 0x0}, 0x10) r5 = gettid() syz_open_procfs$namespace(r5, 0x0) perf_event_open(0x0, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r6, 0x0, 0xfffe}, 0x38) 1.570133559s ago: executing program 4 (id=6993): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x1}, 0x0, 0x40000000000, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x4, 0x8, &(0x7f00000002c0)="0000ffff", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xe) 1.53915992s ago: executing program 1 (id=6995): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb7, 0xb7, 0x3, [@union={0x2, 0x0, 0x0, 0x5, 0x0, 0x3}, @datasec={0xc, 0x8, 0x0, 0xf, 0x3, [{0x3, 0x40, 0x806}, {0x1, 0x6, 0x6}, {0x2, 0x3, 0xffffff10}, {0x2, 0x8, 0x4}, {0x3, 0x9, 0x6b}, {0x1, 0x9fe0, 0xfff}, {0x5, 0x1, 0x6}, {0x3, 0x5, 0x4337}], "beb41a"}, @float={0x10, 0x0, 0x0, 0x10, 0x14}, @enum64={0xe, 0x1, 0x0, 0x13, 0x1, 0x6, [{0x2, 0x3, 0x3}]}, @float={0x2, 0x0, 0x0, 0x10, 0x4}, @volatile={0x8, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x61]}}, &(0x7f00000002c0)=""/101, 0xd3, 0x65, 0x0, 0x4e, 0x10000}, 0x28) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r1}, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r3}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xfffffffe, 0x9, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018", @ANYRES32, @ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000"], 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000340)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a62c422000000000044400090dcd3411970a3163f9faf79549c15459af3a2543244fc69f2447ab98f21388fa767b70589ff2d703152cab563d6bfcbd76d6ac8d2a0ff7adac9d92988d55b13862b7be75c146e24057f570b0add"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{r5}, &(0x7f0000000400), &(0x7f00000004c0)='%pI4 \x00'}, 0x20) 1.53820581s ago: executing program 3 (id=6996): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000200)="df33c9f7b9a60000000000000000", 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 1.48964661s ago: executing program 0 (id=6998): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001d00)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b70500000000e000720a23fe000000008500000012000000b70000000000000095000000000000004e6258941c823b7505608556ba4ababb42684e890d31ae450400373a0a5447a801b8c1c4f0c4bd97c6555e61345400f9bd42abeb9ade0105000000000000a21902ff07000094a2b51c21df74924f5436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca201000000bebbe8282f8b1e26407437a397bf8f50e87ed4d27adfd876bffc402887781979461c4363bc5c9b6202ea471428197ef88bc333fbcec0ea4334844d232279ae95a90fd41d528f58d305000000435883df6c10ce86188c92292b2d0226082960be682836bdff8b0971f2a5405e453228e7b1005bd73479358a90df3e481947de6453736aa572158af6ea63d6d418fbbd2bba050000001da000ef78df03000000d19913a5fb03c79dac2e489f68127892658115e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517000026637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024dbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6aba0fa978f41eb1d4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb80ee202222c03fa84ccc374e717f694018630366397266090a82343aedfbf7afe892390c2eb775b0d16073da2229958db05de7df6ab7600004000010000006d8081cb3bf251d906c00da0e23b50465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa461fc54401a76406db718d4efd6c1bd10ce1d087cf9bba461162555a95524c84df0952d32093082b7aa71304e0d2d9ec310d1b676b378a5879e47941de1a28c3a8f400000000000000000e032b7d2badd0bc6617a859b7ac273b6304555f664469cec152030f06cc0ca1765838eb5590264736fbccfc3a8f4e3b10daf6a275daf5db2dac7096fe8ac8876acaad043663b3b0fedb05e6d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e8807107f79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249f36329a6526b354b6e674b08f7ef492b804c4b08fb10de807d79fd782027318cd7632e22d2faa16209272b39b5ec8d239832ea02cc88e249a2e77753a58987547571fbc8de747faab724bebb6401412b496e078fcb6c78ab447e871b76a8b0506f49594aa1d610567e14d739a60ff3ce04d0d2e5681e787c7e1ad25467bb81f2f448128207fe07a83759ec30cf9e0a3fd3f2fcee97fe8d273f8e712a8a64eaf2d89a1fa44554357fcd7ab531ff7a41c27164fca430a62d015b477de61853f5ee2e25b00a63642ec32ece2ff3bb5883deb895f52a923b5c744d8dccdd6a09ded8b90f1eeda8e6e884a4f090edb6ab9fc8107846508d51f3735493d5860cf80200ce31b92eb3563d485b5a7d192092d7a9fd2bc67d305d1d4573aad5f6501d1cd27657ce17330402dacb78d72d776330711645eed7d4c292f4448733c0826c4eb950f3d40457f82d7f792d106518f6bde874aff9e2bea7d73f74bebeeacfc700000000000000000000d40d73be47803297db004264c8c70b7761b22a7114a078a87d63d63b0c9dcc263a5b773bfeba212abef4181ad9e4872e328c0f105d51e3d167a2b717051d7681ba04552eeba18a000000b22b50d76d85040c9000ea68a528049a60d5e26b20455194f4be3b8466fd66d0e6cefcff7891c485d61cb66f4076cd60a22733cb00cf7cc12ca7d9bb864c0e650236a79a5c85349a9b1e6bbc3bace197e72490c566431cd3a08e9d1b641c1ba1f661d01573b904c3fa1427370fa15cecd294ac21fefe3d161fdf58e8bc5957ef145839f4370176e1be88d2e3516a1998c1621a00b4438b85a4dfee6f61827a1e50e158038b037dfda3ffb35069e41fc740ae720800de53948f176c3c15f3a529c02434b920d87f12a6e3420a2fdcb3559e7a5b1ddbb06b7a5977f63bfac701e673bf626d126b213c92e7169a930beb8d76f9db34e8098bea301baa96916d6458c923866dc192928b320738d1b298fb55f2a64500000000000000000000000000509885a38d9d995a46817e7ff7acddcc5f9253c63f86baf33f92820c9ff497cf76b6482c3ab53fb6ecea6d220b91b99b2fb4279ab09ae0645ab92df309000000000000a4868411948f8e3e259b717d722a1eebd3f6860a17f1ae9e10a1178f6aef4951b192d13e9600c1f700ca7b1d127e451034469bf2a8f93dbae6ad8e932e431dc18323794156238625bb9c45c5a76a68a8646e701b29a71ffbd854f50f195823106a5625ff94221f1f04c72525b50aae69081de9626de9847bf53475d90642d9730101d80b1b0000000000000000822b0641698d60160d9157548302dd2636d12c431f96728ae4a45361e6d47a1c4a52d67c0f0a62585c09fcfd70d0f249f87c44b47283c1c6f2430d70c751e4ada9b646e6e7c1719faee476d88a2943c71a21db55b7497dd7ed385ac2e8cb916390a3a0ed52e7371e1a141e69afa07b46ac20f3521fb251b72c82ee1c7eb4f67c0deed5618d0db925ce7a7c50a99835544c540f5d528587d1a26e78df1bc9a8e4d90c57d0b8122eae7b23e4456624f5337c16c42648c7a3d0b799ad409befe0cbe2aa781ba826918df7aa80dff4f62258e54419629eb1d37de7f6a3512bd618781d1ad3a4d4b0da44df9f9a93f0487f79a9b16dfa6f68b06ce6a96ca344d194cded05702c2300d1a4f451b33830765f8131f6c28fada65701851bba089b8a8347900e72d68cea965feb6a06225dd3f0e135323a5bde3b43c9d242b73abf9e05336af040a4a6bb5918146393f1d50705c1d1e986bf2f690de51ee8727d37339df5391db535bb1e9bb3e5dadb6e5a2bb4faa2dcbc6ca9b40ac96e448b9dadeb08fc2cf3a960f22bf20b9e967b7a75687372b8e3edc543896c360674d901a7f56b07ba1479b46eea3d94026a9c7e670ab40bb2c1ca1a7c90299361239bef773140af974c7efc285a64633d21513481b3ac62dec9fa3e8ce6156d76b82baa145bc550b0ccbc0934ccfea45292caa2f0654fe18dc0669a4f2af9fa232a293ad94261f55675cc686db72783a6bacc0df6a1ea943ae266af112f35319980cd681811a369e0d03cf7d22bed7cbe1afe498b88942b1bf7edae441a0d0d88fce65cb4e848793a28cbd7373f6acd3b5a48c034e487750388929d37fa3165f205dab3be5f3e5781a84298687cbf02dcaf0e14a2b260293f349d076eb75a2ddc5382d106f0beea02aa45018fe36d1176cf7704383b6922d10dc80bc7feca3982ae232d4bb47c722c83a7cf6ee8832f038b072eb803a47cd7f753e80c9f6e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x300f000, 0xe, 0x0, &(0x7f0000000080)="0069c2704ade28eddb0000200000", 0x0, 0x48b8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 1.48762655s ago: executing program 2 (id=6999): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000200)="df33c9f7b9a60000000000000000", 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) (fail_nth: 1) 1.474313041s ago: executing program 3 (id=7000): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x17, 0x9, &(0x7f0000000680)=@framed={{0x18, 0x8, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0xba}, @generic={0xa7}, @initr0, @exit]}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20}, 0x94) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r0, &(0x7f0000000580)="a33930ce5f77ddd64e1393fe02bcecc0cbb63a0759be71ebb17257d1", &(0x7f0000000b00)=""/4096, 0x4}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc, 0x1}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8, '\x00', r2, r3, 0xa, 0x4, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@type_tag={0xf, 0x0, 0x0, 0x12, 0x2}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @ptr={0x1, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x30, 0x30, 0x0, 0x2e]}}, &(0x7f0000000780)=""/118, 0x42, 0x76, 0x0, 0x6}, 0x28) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffff, 0x8}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xa, &(0x7f0000000000)=@raw=[@ldst={0x3, 0x0, 0x0, 0x5, 0x6, 0x80, 0x10}, @ldst={0x3, 0x1, 0x2, 0x3, 0x8, 0x10, 0x1}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}], &(0x7f0000000080)='GPL\x00', 0x0, 0x2e, &(0x7f00000000c0)=""/46, 0x41000, 0x10, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000280)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x6, 0x9, 0xfffffffc}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000003c0)=[r0, r0, r0, r0, r4, r0, r5], &(0x7f0000000400)=[{0x0, 0x5, 0xe, 0x2}, {0x4, 0x5, 0x5, 0xb}], 0x10, 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000200)="df33c9f7b9a60000000000000000", 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 1.410175762s ago: executing program 0 (id=7001): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb7, 0xb7, 0x3, [@union={0x2, 0x0, 0x0, 0x5, 0x0, 0x3}, @datasec={0xc, 0x8, 0x0, 0xf, 0x3, [{0x3, 0x40, 0x806}, {0x1, 0x6, 0x6}, {0x2, 0x3, 0xffffff10}, {0x2, 0x8, 0x4}, {0x3, 0x9, 0x6b}, {0x1, 0x9fe0, 0xfff}, {0x5, 0x1, 0x6}, {0x3, 0x5, 0x4337}], "beb41a"}, @float={0x10, 0x0, 0x0, 0x10, 0x14}, @enum64={0xe, 0x1, 0x0, 0x13, 0x1, 0x6, [{0x2, 0x3, 0x3}]}, @float={0x2, 0x0, 0x0, 0x10, 0x4}, @volatile={0x8, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x61]}}, &(0x7f00000002c0)=""/101, 0xd3, 0x65, 0x0, 0x4e, 0x10000}, 0x28) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r1}, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xfffffffe, 0x9, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703"], 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000340)={'sit0\x00', @local}) 1.408395292s ago: executing program 4 (id=7002): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb7, 0xb7, 0x3, [@union={0x2, 0x0, 0x0, 0x5, 0x0, 0x3}, @datasec={0xc, 0x8, 0x0, 0xf, 0x3, [{0x3, 0x40, 0x806}, {0x1, 0x6, 0x6}, {0x2, 0x3, 0xffffff10}, {0x2, 0x8, 0x4}, {0x3, 0x9, 0x6b}, {0x1, 0x9fe0, 0xfff}, {0x5, 0x1, 0x6}, {0x3, 0x5, 0x4337}], "beb41a"}, @float={0x10, 0x0, 0x0, 0x10, 0x14}, @enum64={0xe, 0x1, 0x0, 0x13, 0x1, 0x6, [{0x2, 0x3, 0x3}]}, @float={0x2, 0x0, 0x0, 0x10, 0x4}, @volatile={0x8, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x61]}}, &(0x7f00000002c0)=""/101, 0xd3, 0x65, 0x0, 0x4e, 0x10000}, 0x28) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r1}, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r3}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xfffffffe, 0x9, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800"], 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000340)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{}, &(0x7f0000000400), &(0x7f00000004c0)='%pI4 \x00'}, 0x20) 1.278339375s ago: executing program 3 (id=7003): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb7020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r0}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 1.120407778s ago: executing program 2 (id=7004): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8982, &(0x7f0000000080)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="18080000000000000000000000000000850000002f000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002a00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0xc, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000500000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000880)={r4, 0x0, 0xe, 0x0, &(0x7f0000000640)="c1dfb08008098e000008007e227f", 0x0, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$unix(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 1.119748488s ago: executing program 2 (id=7005): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) 926.703481ms ago: executing program 3 (id=7006): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (fail_nth: 1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) 505.92036ms ago: executing program 3 (id=7007): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000031c0000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)}, 0x4000000) recvmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xa, 0x2, 0x100}, 0x10}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) perf_event_open$cgroup(&(0x7f0000000280)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1002, 0x1000, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 497.31095ms ago: executing program 0 (id=7008): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r1}, 0x8) close(r2) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xcd62b1ab) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0xf, &(0x7f0000000600)=ANY=[@ANYBLOB="14056445ac0233c9138a2f774bb1d2ba18000000f5d288beee45fd66ff899f108f7c3105a06782950c96741e8f56b5323d6ce7963e8d4205c2f169a96a5252d9cb9bd841caf24826a3b13596b657a9679fd0fb0181f577b6eab5ad8587d9a953fee7cac63e7ffee1"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="9feb0100180000000085010000000000000000000800000009000000f3ffff0301000000ebe9e69e00000000060000000000000003000000a00000002d00000005000000020000000120000001000000830300000000002e30615f00"], &(0x7f00000007c0)=""/156, 0x5c, 0x9c, 0x1}, 0x28) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r5}, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r6}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair(0xb, 0xa, 0x4, &(0x7f0000000200)) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000400)='FREEZING\x00', 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xcc0, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001f00cd10b00e08e2632177fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x4000, 0x60000000, 0x2c3, 0xd17e91c4eaae85fe}, 0x28) 494.41223ms ago: executing program 2 (id=7009): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000f7", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x8, 0x4, 0x4, 0x12}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x5, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYRES64=r5, @ANYRESDEC=r5], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000007f6c7528db0b2283ad31315b35110000000000000100000026bc00"], 0x48) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000a0000000000f4ff0000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x10, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r8}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 492.31236ms ago: executing program 1 (id=7010): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x45ba}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000fcffffff0020000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="000000006c3058fb00001b0226eacdb5a46524e3f2afa9ff32964d278068753ebc7107445ccd685574542ca4030bd0bb968968009b", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="03000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r5, 0xffffffffffffffff}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a04, 0x0, @perf_bp={0x0}, 0x1e005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xf, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x4, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x94) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x1a, 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r8}, 0x10) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x110e22fff6) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c25"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 479.63442ms ago: executing program 4 (id=7011): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x300f000, 0xe, 0x0, &(0x7f0000000080)="0069c2704ade28eddb0000200000", 0x0, 0x48b8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 449.832751ms ago: executing program 2 (id=7012): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000580)='kfree\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) sendmsg$inet(r4, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) 448.9933ms ago: executing program 3 (id=7013): openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r0, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000630124000000000095"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x2, 0x34, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x200102, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r0, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYRES32=r5, @ANYRES16=r2, @ANYBLOB="ef259b4e2bc8d2b4a2c732eadfde8abf0a53856f8be3ffb4"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) socketpair(0x1f, 0x4, 0x100, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="00008000"/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r9, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, 0x0}, 0x1f00) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000080)) 448.0098ms ago: executing program 4 (id=7014): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="b430b4e85d00"/33], 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="04000000000900"/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x26a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f00000004c0)=ANY=[@ANYBLOB="180800007f000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70200001c000000b7030000000000008500000005000000bca900000000000035090100000000009500000000000000b702000004000000632af8ff00000000b509000000000000c3aaf8fff1000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffc40200000800000018220000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf98000000000000560800000000000085000000dcb3c8818ffa0d2804ac961207000000c9000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r6 = getpid() syz_open_procfs$namespace(r6, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="0a00000007000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xff, 0x8, 0x0, 0x58c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x2044}, 0x60) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x6, 0x7f, 0x40, 0x9, 0x0, 0x8, 0x80001, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x2, 0x7}, 0x4000, 0x7, 0x8, 0x5, 0xc2c, 0x3, 0x10, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xb, r0, 0x1) 425.349541ms ago: executing program 2 (id=7015): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, &(0x7f0000000340), &(0x7f00000003c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff0017"], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110c23003f) close(r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r4}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000880), 0x12) 345.836843ms ago: executing program 0 (id=7016): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) close(r0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0x40047451, &(0x7f0000000180)) 218.760135ms ago: executing program 0 (id=7017): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x1ff, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x6, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYRES32], 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYRES8=r2, @ANYRES16=r1, @ANYBLOB="0000000500"/19, @ANYRES16], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000008c0)='sys_enter\x00'}, 0x10) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/net\x00') bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffed2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000003200)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 155.136416ms ago: executing program 1 (id=7018): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x1ff, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x6, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYRES32], 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYRES8=r2, @ANYRES16=r1, @ANYBLOB="0000000500"/19, @ANYRES16], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000008c0)='sys_enter\x00'}, 0x10) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/net\x00') bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffed2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000003200)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 0s ago: executing program 0 (id=7019): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb7, 0xb7, 0x3, [@union={0x2, 0x0, 0x0, 0x5, 0x0, 0x3}, @datasec={0xc, 0x8, 0x0, 0xf, 0x3, [{0x3, 0x40, 0x806}, {0x1, 0x6, 0x6}, {0x2, 0x3, 0xffffff10}, {0x2, 0x8, 0x4}, {0x3, 0x9, 0x6b}, {0x1, 0x9fe0, 0xfff}, {0x5, 0x1, 0x6}, {0x3, 0x5, 0x4337}], "beb41a"}, @float={0x10, 0x0, 0x0, 0x10, 0x14}, @enum64={0xe, 0x1, 0x0, 0x13, 0x1, 0x6, [{0x2, 0x3, 0x3}]}, @float={0x2, 0x0, 0x0, 0x10, 0x4}, @volatile={0x8, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x61]}}, &(0x7f00000002c0)=""/101, 0xd3, 0x65, 0x0, 0x4e, 0x10000}, 0x28) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r1}, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xfffffffe, 0x9, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300"], 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000340)={'sit0\x00', @local}) kernel console output (not intermixed with test programs): IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 778.078659][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 778.241382][T15216] device pim6reg1 entered promiscuous mode [ 778.765518][T15234] device veth0_vlan left promiscuous mode [ 778.792769][T15234] device veth0_vlan entered promiscuous mode [ 779.700678][T15249] device pim6reg1 entered promiscuous mode [ 780.730259][T15265] device veth0_vlan left promiscuous mode [ 780.750859][T15265] device veth0_vlan entered promiscuous mode [ 780.990938][T15274] device pim6reg1 entered promiscuous mode [ 781.222743][T15278] device pim6reg1 entered promiscuous mode [ 782.267387][T15298] device pim6reg1 entered promiscuous mode [ 782.324150][T15300] device veth0_vlan left promiscuous mode [ 782.356434][T15300] device veth0_vlan entered promiscuous mode [ 782.784512][T15316] device pim6reg1 entered promiscuous mode [ 783.102965][T15322] device pim6reg1 entered promiscuous mode [ 783.526045][T15333] device pim6reg1 entered promiscuous mode [ 783.596764][T15337] device veth0_vlan left promiscuous mode [ 783.607491][T15337] device veth0_vlan entered promiscuous mode [ 783.644607][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 783.655504][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 783.665842][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 783.752539][T15339] device veth0_vlan left promiscuous mode [ 783.773521][T15339] device veth0_vlan entered promiscuous mode [ 783.817333][T15341] device veth0_vlan left promiscuous mode [ 783.838028][T15341] device veth0_vlan entered promiscuous mode [ 784.586353][T15361] device veth0_vlan left promiscuous mode [ 784.598206][T15361] device veth0_vlan entered promiscuous mode [ 784.605694][T15362] device pim6reg1 entered promiscuous mode [ 784.614689][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 784.623638][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 784.632297][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 784.961996][T15369] device pim6reg1 entered promiscuous mode [ 785.355803][T15374] device veth0_vlan left promiscuous mode [ 785.368672][T15374] device veth0_vlan entered promiscuous mode [ 786.889717][T15403] device pim6reg1 entered promiscuous mode [ 787.185528][T15411] device veth0_vlan left promiscuous mode [ 787.197590][T15411] device veth0_vlan entered promiscuous mode [ 787.225810][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 787.245812][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 787.254123][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 787.500709][T15418] device pim6reg1 entered promiscuous mode [ 787.542156][T15415] device veth0_vlan left promiscuous mode [ 787.576479][T15415] device veth0_vlan entered promiscuous mode [ 788.264563][T15430] device veth0_vlan left promiscuous mode [ 788.317100][T15430] device veth0_vlan entered promiscuous mode [ 788.345194][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 788.384325][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 788.412290][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 788.567817][T15438] device veth0_vlan left promiscuous mode [ 788.597953][T15438] device veth0_vlan entered promiscuous mode [ 788.725610][T15444] device veth0_vlan left promiscuous mode [ 788.756676][T15444] device veth0_vlan entered promiscuous mode [ 789.503373][T15454] device pim6reg1 entered promiscuous mode [ 792.281458][T15508] device pim6reg1 entered promiscuous mode [ 792.434995][T15511] device syzkaller0 entered promiscuous mode [ 792.701071][T15521] device veth0_vlan left promiscuous mode [ 792.742017][T15521] device veth0_vlan entered promiscuous mode [ 792.859446][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 792.881571][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 792.977905][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 793.291044][T15541] device veth0_vlan left promiscuous mode [ 793.334025][T15541] device veth0_vlan entered promiscuous mode [ 793.408380][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 793.438273][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 793.470512][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 794.942582][T15569] device veth0_vlan left promiscuous mode [ 794.959775][T15569] device veth0_vlan entered promiscuous mode [ 795.101409][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 795.112359][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 795.167518][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 795.240752][T15579] device pim6reg1 entered promiscuous mode [ 795.269070][T15577] device veth0_vlan left promiscuous mode [ 795.301912][T15577] device veth0_vlan entered promiscuous mode [ 796.590112][T15605] device pim6reg1 entered promiscuous mode [ 796.634490][T15607] device veth0_vlan left promiscuous mode [ 796.704593][T15607] device veth0_vlan entered promiscuous mode [ 796.880673][T15618] device pim6reg1 entered promiscuous mode [ 796.890715][T15621] device pim6reg1 entered promiscuous mode [ 797.165349][T15627] device veth0_vlan left promiscuous mode [ 797.178419][T15627] device veth0_vlan entered promiscuous mode [ 798.151238][T15651] device veth0_vlan left promiscuous mode [ 798.174833][T15651] device veth0_vlan entered promiscuous mode [ 798.639876][T15667] device pim6reg1 entered promiscuous mode [ 798.658986][T15668] device pim6reg1 entered promiscuous mode [ 799.526479][T15689] device veth0_vlan left promiscuous mode [ 799.551394][T15689] device veth0_vlan entered promiscuous mode [ 800.299646][T15702] device veth0_vlan left promiscuous mode [ 800.330065][T15702] device veth0_vlan entered promiscuous mode [ 800.399042][T15704] device pim6reg1 entered promiscuous mode [ 800.574822][T15708] device veth0_vlan left promiscuous mode [ 800.591535][T15708] device veth0_vlan entered promiscuous mode [ 800.917253][T15720] device veth0_vlan left promiscuous mode [ 800.935373][T15720] device veth0_vlan entered promiscuous mode [ 800.982848][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 800.995087][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 801.021933][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 802.302858][T15746] device pim6reg1 entered promiscuous mode [ 802.629342][T15754] device veth0_vlan left promiscuous mode [ 802.650034][T15754] device veth0_vlan entered promiscuous mode [ 802.758898][T15759] device pim6reg1 entered promiscuous mode [ 803.680594][T15784] device pim6reg1 entered promiscuous mode [ 804.379024][T15799] device veth0_vlan left promiscuous mode [ 804.443009][T15799] device veth0_vlan entered promiscuous mode [ 804.513069][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 804.549802][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 804.604324][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 805.631254][T15829] device veth0_vlan left promiscuous mode [ 805.655195][T15829] device veth0_vlan entered promiscuous mode [ 805.773262][T15832] device veth0_vlan left promiscuous mode [ 805.786545][T15832] device veth0_vlan entered promiscuous mode [ 805.820109][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 805.829400][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 805.840966][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 805.853893][T15835] device pim6reg1 entered promiscuous mode [ 805.990145][T15837] device veth0_vlan left promiscuous mode [ 806.002179][T15837] device veth0_vlan entered promiscuous mode [ 806.038906][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 806.048570][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 806.057225][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 806.081139][T15839] device veth0_vlan left promiscuous mode [ 806.121840][T15839] device veth0_vlan entered promiscuous mode [ 807.126611][T15857] device veth0_vlan left promiscuous mode [ 807.161132][T15857] device veth0_vlan entered promiscuous mode [ 807.313876][T15863] device pim6reg1 entered promiscuous mode [ 807.984743][T15873] device veth0_vlan left promiscuous mode [ 808.035422][T15873] device veth0_vlan entered promiscuous mode [ 808.871013][T15897] device pim6reg1 entered promiscuous mode [ 809.091194][T15904] device syzkaller0 entered promiscuous mode [ 809.545612][T15917] device veth0_vlan left promiscuous mode [ 809.588226][T15917] device veth0_vlan entered promiscuous mode [ 809.852058][T15927] device pim6reg1 entered promiscuous mode [ 810.867784][T15952] device veth0_vlan left promiscuous mode [ 810.929734][T15952] device veth0_vlan entered promiscuous mode [ 811.023335][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 811.040946][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 811.087356][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 811.137769][T15957] device veth0_vlan left promiscuous mode [ 811.235786][T15957] device veth0_vlan entered promiscuous mode [ 811.476263][T15967] device veth0_vlan left promiscuous mode [ 811.512060][T15967] device veth0_vlan entered promiscuous mode [ 812.016859][T15982] device pim6reg1 entered promiscuous mode [ 812.401723][T15992] device pim6reg1 entered promiscuous mode [ 812.779286][T15999] device pim6reg1 entered promiscuous mode [ 812.942083][T16001] device veth0_vlan left promiscuous mode [ 812.948729][T16001] device veth0_vlan entered promiscuous mode [ 812.970572][T16003] device pim6reg1 entered promiscuous mode [ 812.997201][T16006] device veth0_vlan left promiscuous mode [ 813.019950][T16006] device veth0_vlan entered promiscuous mode [ 813.304007][T16017] device pim6reg1 entered promiscuous mode [ 813.679049][T16030] device pim6reg1 entered promiscuous mode [ 814.112440][T16042] device veth0_vlan left promiscuous mode [ 814.156557][T16042] device veth0_vlan entered promiscuous mode [ 814.236262][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 814.263378][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 814.311042][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 815.548647][T16081] device pim6reg1 entered promiscuous mode [ 815.784499][T16084] device pim6reg1 entered promiscuous mode [ 816.880272][T16109] device syzkaller0 entered promiscuous mode [ 816.902785][T16112] device pim6reg1 entered promiscuous mode [ 817.064578][T16115] device veth0_vlan left promiscuous mode [ 817.083820][T16115] device veth0_vlan entered promiscuous mode [ 817.935123][T16134] device pim6reg1 entered promiscuous mode [ 818.419175][T16148] device veth0_vlan left promiscuous mode [ 818.491582][T16148] device veth0_vlan entered promiscuous mode [ 818.754906][T16150] device veth0_vlan left promiscuous mode [ 818.770350][T16150] device veth0_vlan entered promiscuous mode [ 819.085480][T16162] device pim6reg1 entered promiscuous mode [ 819.349400][T16168] device pim6reg1 entered promiscuous mode [ 819.994793][T16190] device pim6reg1 entered promiscuous mode [ 820.322195][T16197] device veth0_vlan left promiscuous mode [ 820.374823][T16197] device veth0_vlan entered promiscuous mode [ 820.465948][T16200] device pim6reg1 entered promiscuous mode [ 820.566373][T16207] device pim6reg1 entered promiscuous mode [ 820.731811][T16209] device veth0_vlan left promiscuous mode [ 820.789929][T16209] device veth0_vlan entered promiscuous mode [ 821.194660][T16222] device pim6reg1 entered promiscuous mode [ 822.043924][T16251] device pim6reg1 entered promiscuous mode [ 822.139472][T16255] device pim6reg1 entered promiscuous mode [ 822.502785][T16266] device pim6reg1 entered promiscuous mode [ 822.544472][T16268] device pim6reg1 entered promiscuous mode [ 822.690331][T16274] device veth0_vlan left promiscuous mode [ 822.704864][T16274] device veth0_vlan entered promiscuous mode [ 822.732064][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 822.741059][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 822.749711][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 822.798186][T16272] device pim6reg1 entered promiscuous mode [ 823.011753][T16288] device pim6reg1 entered promiscuous mode [ 823.119033][T16290] device pim6reg1 entered promiscuous mode [ 823.306259][T16297] device pim6reg1 entered promiscuous mode [ 823.388380][T16302] device pim6reg1 entered promiscuous mode [ 823.405563][T16300] device veth0_vlan left promiscuous mode [ 823.415645][T16300] device veth0_vlan entered promiscuous mode [ 823.444026][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 823.453107][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 823.461103][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 823.479752][T16304] device pim6reg1 entered promiscuous mode [ 824.157328][T16325] device pim6reg1 entered promiscuous mode [ 825.553674][T16368] device pim6reg1 entered promiscuous mode [ 825.619684][T16370] device pim6reg1 entered promiscuous mode [ 826.001970][T16381] device pim6reg1 entered promiscuous mode [ 826.838349][T16408] device pim6reg1 entered promiscuous mode [ 827.325259][T16428] device veth0_vlan left promiscuous mode [ 827.335454][T16428] device veth0_vlan entered promiscuous mode [ 827.359863][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 827.371559][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 827.401349][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 828.010719][T16447] device pim6reg1 entered promiscuous mode [ 828.212333][T16454] device veth0_vlan left promiscuous mode [ 828.267173][T16454] device veth0_vlan entered promiscuous mode [ 828.464021][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 828.514080][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 828.538720][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 828.694895][T16463] device veth0_vlan left promiscuous mode [ 828.786981][T16463] device veth0_vlan entered promiscuous mode [ 828.840872][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 828.852371][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 828.868622][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 829.102583][T16473] device veth0_vlan left promiscuous mode [ 829.134838][T16473] device veth0_vlan entered promiscuous mode [ 829.292499][T16479] device veth0_vlan left promiscuous mode [ 829.335090][T16479] device veth0_vlan entered promiscuous mode [ 830.670124][T16524] device pim6reg1 entered promiscuous mode [ 831.731533][T16546] device pim6reg1 entered promiscuous mode [ 832.099330][T16562] device pim6reg1 entered promiscuous mode [ 833.218280][T16584] device pim6reg1 entered promiscuous mode [ 834.323308][T16610] device pim6reg1 entered promiscuous mode [ 834.831550][T16622] device pim6reg1 entered promiscuous mode [ 835.263649][T16643] device veth0_vlan left promiscuous mode [ 835.273002][T16643] device veth0_vlan entered promiscuous mode [ 835.308636][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 835.322752][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 835.354241][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 835.372612][T16645] device veth0_vlan left promiscuous mode [ 835.382116][T16645] device veth0_vlan entered promiscuous mode [ 835.432846][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 835.461776][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 835.511824][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 836.046104][T16657] device pim6reg1 entered promiscuous mode [ 836.889506][T16683] device pim6reg1 entered promiscuous mode [ 837.408111][T16693] device veth0_vlan left promiscuous mode [ 837.444405][T16693] device veth0_vlan entered promiscuous mode [ 837.546538][T16699] device pim6reg1 entered promiscuous mode [ 837.829965][T16710] device pim6reg1 entered promiscuous mode [ 837.865861][T16712] device pim6reg1 entered promiscuous mode [ 837.961276][T16716] device pim6reg1 entered promiscuous mode [ 838.143645][T16725] device pim6reg1 entered promiscuous mode [ 838.187826][T16731] device pim6reg1 entered promiscuous mode [ 838.354753][T16737] device veth0_vlan left promiscuous mode [ 838.377442][T16737] device veth0_vlan entered promiscuous mode [ 838.436396][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 838.450611][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 838.458886][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 838.482476][T16741] device pim6reg1 entered promiscuous mode [ 838.549203][T16745] device pim6reg1 entered promiscuous mode [ 838.890371][T16755] device pim6reg1 entered promiscuous mode [ 839.461854][T16775] device pim6reg1 entered promiscuous mode [ 839.557004][T16777] device pim6reg1 entered promiscuous mode [ 839.883890][T16782] device veth0_vlan left promiscuous mode [ 839.915943][T16782] device veth0_vlan entered promiscuous mode [ 839.975411][T16785] device pim6reg1 entered promiscuous mode [ 841.057879][T16812] device pim6reg1 entered promiscuous mode [ 841.145688][T16814] device veth0_vlan left promiscuous mode [ 841.169760][T16814] device veth0_vlan entered promiscuous mode [ 841.535716][T16828] device pim6reg1 entered promiscuous mode [ 842.389950][T16856] device veth0_vlan left promiscuous mode [ 842.498308][T16856] device veth0_vlan entered promiscuous mode [ 842.552974][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 842.584795][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 842.623257][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 842.702896][T16862] device pim6reg1 entered promiscuous mode [ 842.940128][T16873] device pim6reg1 entered promiscuous mode [ 843.234237][T16883] device pim6reg1 entered promiscuous mode [ 843.515231][T16893] device veth0_vlan left promiscuous mode [ 843.579607][T16893] device veth0_vlan entered promiscuous mode [ 843.677325][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 843.691267][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 843.707860][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 843.892279][T16907] device pim6reg1 entered promiscuous mode [ 844.321228][T16921] device pim6reg1 entered promiscuous mode [ 844.394741][T16924] device pim6reg1 entered promiscuous mode [ 845.172607][T16946] device pim6reg1 entered promiscuous mode [ 845.595642][T16958] device pim6reg1 entered promiscuous mode [ 846.241273][T16978] device pim6reg1 entered promiscuous mode [ 846.319346][T16982] device pim6reg1 entered promiscuous mode [ 846.666417][T16985] device veth0_vlan left promiscuous mode [ 846.700635][T16985] device veth0_vlan entered promiscuous mode [ 846.895147][T16991] device pim6reg1 entered promiscuous mode [ 847.607715][T17016] device veth0_vlan left promiscuous mode [ 847.625730][T17016] device veth0_vlan entered promiscuous mode [ 847.824206][T17027] device pim6reg1 entered promiscuous mode [ 847.851263][T17028] device pim6reg1 entered promiscuous mode [ 848.345445][T17043] device pim6reg1 entered promiscuous mode [ 849.109024][T17064] device pim6reg1 entered promiscuous mode [ 849.271639][T17070] device pim6reg1 entered promiscuous mode [ 849.728172][T17093] device pim6reg1 entered promiscuous mode [ 850.490707][T17102] device pim6reg1 entered promiscuous mode [ 850.687412][T17104] device pim6reg1 entered promiscuous mode [ 851.369927][T17123] device pim6reg1 entered promiscuous mode [ 851.579422][T17131] device pim6reg1 entered promiscuous mode [ 852.418456][T17151] device pim6reg1 entered promiscuous mode [ 852.633088][T17168] device pim6reg1 entered promiscuous mode [ 854.074252][T17211] device pim6reg1 entered promiscuous mode [ 854.232748][T17214] device pim6reg1 entered promiscuous mode [ 854.800913][T17234] device pim6reg1 entered promiscuous mode [ 855.067008][T17244] device pim6reg1 entered promiscuous mode [ 855.283919][T17251] device pim6reg1 entered promiscuous mode [ 855.325550][T17252] device pim6reg1 entered promiscuous mode [ 855.750832][T17264] device pim6reg1 entered promiscuous mode [ 855.834222][T17268] device pim6reg1 entered promiscuous mode [ 856.349150][T17280] device pim6reg1 entered promiscuous mode [ 856.658384][T17288] device veth0_vlan left promiscuous mode [ 856.680929][T17288] device veth0_vlan entered promiscuous mode [ 856.725981][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 856.734624][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 856.742312][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 856.751170][T17293] device pim6reg1 entered promiscuous mode [ 856.830064][T17296] device pim6reg1 entered promiscuous mode [ 856.928861][T17299] device veth0_vlan left promiscuous mode [ 856.935235][T17299] device veth0_vlan entered promiscuous mode [ 856.942683][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 856.952921][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 856.961498][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 858.763354][T17322] device veth0_vlan left promiscuous mode [ 858.786592][T17322] device veth0_vlan entered promiscuous mode [ 858.830086][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 858.851279][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 858.864940][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 859.228686][T17337] device pim6reg1 entered promiscuous mode [ 859.342687][T17339] device pim6reg1 entered promiscuous mode [ 859.717393][T17352] device pim6reg1 entered promiscuous mode [ 860.409680][T17364] device pim6reg1 entered promiscuous mode [ 860.751851][T17368] device pim6reg1 entered promiscuous mode [ 861.398559][T17388] device pim6reg1 entered promiscuous mode [ 861.841270][T17393] device veth0_vlan left promiscuous mode [ 861.870781][T17393] device veth0_vlan entered promiscuous mode [ 862.580201][T17406] device pim6reg1 entered promiscuous mode [ 863.224696][T17421] device veth0_vlan left promiscuous mode [ 863.234282][T17421] device veth0_vlan entered promiscuous mode [ 863.264662][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 863.304327][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 863.344731][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 863.816363][T17432] device pim6reg1 entered promiscuous mode [ 864.123690][T17436] device veth0_vlan left promiscuous mode [ 864.142929][T17436] device veth0_vlan entered promiscuous mode [ 865.235680][T17454] device veth0_vlan left promiscuous mode [ 865.259628][T17454] device veth0_vlan entered promiscuous mode [ 865.333517][T17458] device pim6reg1 entered promiscuous mode [ 867.067119][T17492] device veth0_vlan left promiscuous mode [ 867.085625][T17492] device veth0_vlan entered promiscuous mode [ 867.128562][T17490] device pim6reg1 entered promiscuous mode [ 867.283131][T17497] device pim6reg1 entered promiscuous mode [ 867.468584][T17502] device pim6reg1 entered promiscuous mode [ 868.333984][T17523] device veth0_vlan left promiscuous mode [ 868.386651][T17523] device veth0_vlan entered promiscuous mode [ 868.478333][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 868.521897][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 868.613380][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 868.675774][T17533] device pim6reg1 entered promiscuous mode [ 868.720821][T17532] device pim6reg1 entered promiscuous mode [ 868.798577][T17538] device pim6reg1 entered promiscuous mode [ 869.008813][T17542] device pim6reg1 entered promiscuous mode [ 869.112674][T17546] device pim6reg1 entered promiscuous mode [ 869.237325][T17558] device pim6reg1 entered promiscuous mode [ 869.339196][T17561] device veth0_vlan left promiscuous mode [ 869.363337][T17561] device veth0_vlan entered promiscuous mode [ 869.960433][T17580] device pim6reg1 entered promiscuous mode [ 870.251931][T17585] device pim6reg1 entered promiscuous mode [ 870.299811][T17587] device pim6reg1 entered promiscuous mode [ 870.645685][T17601] device veth0_vlan left promiscuous mode [ 870.665112][T17601] device veth0_vlan entered promiscuous mode [ 871.511027][T17614] device pim6reg1 entered promiscuous mode [ 871.668005][T17618] device pim6reg1 entered promiscuous mode [ 872.650384][T17634] device pim6reg1 entered promiscuous mode [ 872.661818][T17633] device pim6reg1 entered promiscuous mode [ 872.902645][T17637] device pim6reg1 entered promiscuous mode [ 873.047551][T17644] device pim6reg1 entered promiscuous mode [ 873.154337][T17646] device pim6reg1 entered promiscuous mode [ 873.303377][T17650] device pim6reg1 entered promiscuous mode [ 874.134385][T17667] device pim6reg1 entered promiscuous mode [ 874.296581][T17670] device pim6reg1 entered promiscuous mode [ 874.562318][T17676] device pim6reg1 entered promiscuous mode [ 874.880206][T17683] device veth0_vlan left promiscuous mode [ 874.901199][T17683] device veth0_vlan entered promiscuous mode [ 875.002249][T17690] device pim6reg1 entered promiscuous mode [ 875.673503][T17704] device pim6reg1 entered promiscuous mode [ 875.751504][T17708] device pim6reg1 entered promiscuous mode [ 875.872262][T17716] device pim6reg1 entered promiscuous mode [ 876.015855][T17722] device pim6reg1 entered promiscuous mode [ 876.446614][T17732] device pim6reg1 entered promiscuous mode [ 876.710803][T17743] device veth0_vlan left promiscuous mode [ 876.757931][T17743] device veth0_vlan entered promiscuous mode [ 876.801732][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 876.814085][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 876.821801][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 876.833390][T17749] device pim6reg1 entered promiscuous mode [ 876.919763][T17751] device pim6reg1 entered promiscuous mode [ 877.183683][T17760] device pim6reg1 entered promiscuous mode [ 877.367935][T17772] device pim6reg1 entered promiscuous mode [ 877.462059][T17775] device veth0_vlan left promiscuous mode [ 877.471557][T17775] device veth0_vlan entered promiscuous mode [ 877.502955][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 877.516800][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 877.539672][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 877.559933][T17779] device pim6reg1 entered promiscuous mode [ 877.568797][T17777] device pim6reg1 entered promiscuous mode [ 877.888859][T17790] device veth0_vlan left promiscuous mode [ 877.964887][T17790] device veth0_vlan entered promiscuous mode [ 878.247283][T17798] device pim6reg1 entered promiscuous mode [ 878.313115][T17800] device pim6reg1 entered promiscuous mode [ 878.539175][T17807] device pim6reg1 entered promiscuous mode [ 878.626491][T17812] device veth0_vlan left promiscuous mode [ 878.641259][T17812] device veth0_vlan entered promiscuous mode [ 878.734556][T17816] device pim6reg1 entered promiscuous mode [ 879.330003][T17833] device pim6reg1 entered promiscuous mode [ 879.570941][T17844] device pim6reg1 entered promiscuous mode [ 879.801791][T17850] device pim6reg1 entered promiscuous mode [ 880.391665][T17862] device pim6reg1 entered promiscuous mode [ 880.440940][T17864] device pim6reg1 entered promiscuous mode [ 880.654865][T17871] device pim6reg1 entered promiscuous mode [ 880.875761][T17882] device pim6reg1 entered promiscuous mode [ 880.893546][T17885] device pim6reg1 entered promiscuous mode [ 881.902244][T17900] device veth0_vlan left promiscuous mode [ 881.983960][T17900] device veth0_vlan entered promiscuous mode [ 882.012137][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 882.037444][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 882.050526][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 882.124779][T17912] device pim6reg1 entered promiscuous mode [ 883.403445][T17938] device veth0_vlan left promiscuous mode [ 883.432301][T17938] device veth0_vlan entered promiscuous mode [ 883.549715][T17941] device pim6reg1 entered promiscuous mode [ 883.587595][T17943] device pim6reg1 entered promiscuous mode [ 883.798733][T17947] device pim6reg1 entered promiscuous mode [ 883.874597][T17951] device pim6reg1 entered promiscuous mode [ 883.987385][T17959] device pim6reg1 entered promiscuous mode [ 884.161819][T17966] device pim6reg1 entered promiscuous mode [ 884.778071][T17976] device veth0_vlan left promiscuous mode [ 884.814344][T17976] device veth0_vlan entered promiscuous mode [ 885.251581][T17984] device pim6reg1 entered promiscuous mode [ 885.402074][T17988] device pim6reg1 entered promiscuous mode [ 885.559163][T17990] device pim6reg1 entered promiscuous mode [ 885.722030][T17994] device pim6reg1 entered promiscuous mode [ 885.880384][T18001] device pim6reg1 entered promiscuous mode [ 885.902546][T17998] device pim6reg1 entered promiscuous mode [ 885.935225][T18003] device pim6reg1 entered promiscuous mode [ 886.183218][T18010] device pim6reg1 entered promiscuous mode [ 886.468255][T18014] device pim6reg1 entered promiscuous mode [ 886.611890][T18018] device pim6reg1 entered promiscuous mode [ 886.654997][T18020] device pim6reg1 entered promiscuous mode [ 887.148980][T18039] device pim6reg1 entered promiscuous mode [ 887.305006][T18049] device pim6reg1 entered promiscuous mode [ 888.704122][T18086] device pim6reg1 entered promiscuous mode [ 888.876490][T18093] device pim6reg1 entered promiscuous mode [ 888.976671][T18099] device pim6reg1 entered promiscuous mode [ 890.291114][T18131] device veth0_vlan left promiscuous mode [ 890.336882][T18131] device veth0_vlan entered promiscuous mode [ 890.396269][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 890.434862][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 890.494535][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 890.592071][T18139] device pim6reg1 entered promiscuous mode [ 891.119020][T18155] device pim6reg1 entered promiscuous mode [ 891.297740][T18163] device pim6reg1 entered promiscuous mode [ 891.604476][T18169] device veth0_vlan left promiscuous mode [ 891.614854][T18169] device veth0_vlan entered promiscuous mode [ 891.639874][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 891.651654][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 891.668233][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 891.685083][T18171] device pim6reg1 entered promiscuous mode [ 891.796833][T18173] device pim6reg1 entered promiscuous mode [ 891.960090][T18180] device pim6reg1 entered promiscuous mode [ 892.095299][T18185] device pim6reg1 entered promiscuous mode [ 892.104549][T18183] device pim6reg1 entered promiscuous mode [ 892.149070][T18187] device veth0_vlan left promiscuous mode [ 892.161651][T18187] device veth0_vlan entered promiscuous mode [ 892.245519][T18195] device pim6reg1 entered promiscuous mode [ 892.292062][T18197] device pim6reg1 entered promiscuous mode [ 892.654377][T18205] device pim6reg1 entered promiscuous mode [ 893.100666][T18218] device pim6reg1 entered promiscuous mode [ 893.148520][T18223] device pim6reg1 entered promiscuous mode [ 893.691904][T18238] device veth0_vlan left promiscuous mode [ 893.707761][T18238] device veth0_vlan entered promiscuous mode [ 893.774956][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 893.797140][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 893.829055][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 894.030374][T18246] device pim6reg1 entered promiscuous mode [ 894.044983][T18245] device pim6reg1 entered promiscuous mode [ 894.382945][T18258] device pim6reg1 entered promiscuous mode [ 895.478832][T18275] device pim6reg1 entered promiscuous mode [ 895.668225][T18280] device pim6reg1 entered promiscuous mode [ 897.189497][T18320] device pim6reg1 entered promiscuous mode [ 897.204780][T18322] FAULT_INJECTION: forcing a failure. [ 897.204780][T18322] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 897.287377][T18322] CPU: 0 PID: 18322 Comm: syz.1.5829 Not tainted syzkaller #0 [ 897.294917][T18322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 897.305103][T18322] Call Trace: [ 897.308410][T18322] [ 897.311360][T18322] __dump_stack+0x21/0x24 [ 897.315734][T18322] dump_stack_lvl+0xee/0x150 [ 897.320395][T18322] ? __cfi_dump_stack_lvl+0x8/0x8 [ 897.325473][T18322] dump_stack+0x15/0x24 [ 897.329656][T18322] should_fail_ex+0x3d4/0x520 [ 897.334386][T18322] should_fail+0xb/0x10 [ 897.338582][T18322] should_fail_usercopy+0x1a/0x20 [ 897.343671][T18322] _copy_from_user+0x1e/0xc0 [ 897.348383][T18322] __sys_bpf+0x277/0x780 [ 897.352656][T18322] ? bpf_link_show_fdinfo+0x320/0x320 [ 897.358162][T18322] ? __cfi_ksys_write+0x10/0x10 [ 897.363056][T18322] ? debug_smp_processor_id+0x17/0x20 [ 897.368471][T18322] __x64_sys_bpf+0x7c/0x90 [ 897.373014][T18322] x64_sys_call+0x488/0x9a0 [ 897.377553][T18322] do_syscall_64+0x4c/0xa0 [ 897.382095][T18322] ? clear_bhb_loop+0x30/0x80 [ 897.386814][T18322] ? clear_bhb_loop+0x30/0x80 [ 897.391587][T18322] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 897.397512][T18322] RIP: 0033:0x7f573878ebe9 [ 897.401955][T18322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 897.421855][T18322] RSP: 002b:00007f573965a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 897.430404][T18322] RAX: ffffffffffffffda RBX: 00007f57389c5fa0 RCX: 00007f573878ebe9 [ 897.438595][T18322] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 897.446613][T18322] RBP: 00007f573965a090 R08: 0000000000000000 R09: 0000000000000000 [ 897.454620][T18322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 897.462627][T18322] R13: 00007f57389c6038 R14: 00007f57389c5fa0 R15: 00007ffdc4d38a98 [ 897.470637][T18322] [ 897.881517][T18342] device veth0_vlan left promiscuous mode [ 897.989920][T18342] device veth0_vlan entered promiscuous mode [ 898.068901][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 898.103004][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 898.114340][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 898.126088][T18345] device pim6reg1 entered promiscuous mode [ 898.187479][T18357] device pim6reg1 entered promiscuous mode [ 898.240073][T18354] device pim6reg1 entered promiscuous mode [ 898.459356][T18371] FAULT_INJECTION: forcing a failure. [ 898.459356][T18371] name failslab, interval 1, probability 0, space 0, times 0 [ 898.472357][T18371] CPU: 1 PID: 18371 Comm: syz.3.5845 Not tainted syzkaller #0 [ 898.479910][T18371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 898.490063][T18371] Call Trace: [ 898.493397][T18371] [ 898.496478][T18371] __dump_stack+0x21/0x24 [ 898.500821][T18371] dump_stack_lvl+0xee/0x150 [ 898.505699][T18371] ? __cfi_dump_stack_lvl+0x8/0x8 [ 898.510748][T18371] ? stack_trace_save+0x98/0xe0 [ 898.515625][T18371] dump_stack+0x15/0x24 [ 898.519980][T18371] should_fail_ex+0x3d4/0x520 [ 898.524759][T18371] __should_failslab+0xac/0xf0 [ 898.529750][T18371] should_failslab+0x9/0x20 [ 898.534262][T18371] kmem_cache_alloc_node+0x42/0x340 [ 898.539494][T18371] ? dup_task_struct+0x5a/0x790 [ 898.544618][T18371] dup_task_struct+0x5a/0x790 [ 898.549415][T18371] ? __kasan_check_write+0x14/0x20 [ 898.554549][T18371] ? recalc_sigpending+0x168/0x1c0 [ 898.559678][T18371] copy_process+0x5b8/0x3480 [ 898.564311][T18371] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 898.570133][T18371] ? __kasan_check_write+0x14/0x20 [ 898.575261][T18371] ? idle_dummy+0x10/0x10 [ 898.579609][T18371] kernel_clone+0x23a/0x810 [ 898.584128][T18371] ? __cfi_kernel_clone+0x10/0x10 [ 898.589162][T18371] ? __kasan_check_write+0x14/0x20 [ 898.594282][T18371] ? mutex_unlock+0x89/0x220 [ 898.598880][T18371] __x64_sys_clone+0x168/0x1b0 [ 898.603665][T18371] ? __cfi___x64_sys_clone+0x10/0x10 [ 898.609077][T18371] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 898.615184][T18371] x64_sys_call+0x990/0x9a0 [ 898.619715][T18371] do_syscall_64+0x4c/0xa0 [ 898.624498][T18371] ? clear_bhb_loop+0x30/0x80 [ 898.629187][T18371] ? clear_bhb_loop+0x30/0x80 [ 898.633879][T18371] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 898.639902][T18371] RIP: 0033:0x7f222358ebe9 [ 898.644330][T18371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 898.664138][T18371] RSP: 002b:00007f2224406fe8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 898.672680][T18371] RAX: ffffffffffffffda RBX: 00007f22237c5fa0 RCX: 00007f222358ebe9 [ 898.680682][T18371] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000160480 [ 898.688695][T18371] RBP: 00007f2224407090 R08: 0000000000000000 R09: 0000000000000000 [ 898.696762][T18371] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 898.704791][T18371] R13: 00007f22237c6038 R14: 00007f22237c5fa0 R15: 00007ffdddca7478 [ 898.712797][T18371] [ 898.723470][T18365] bridge0: port 1(bridge_slave_0) entered blocking state [ 898.744174][T18365] bridge0: port 1(bridge_slave_0) entered disabled state [ 898.762076][T18365] device bridge_slave_0 entered promiscuous mode [ 898.804771][T18365] bridge0: port 2(bridge_slave_1) entered blocking state [ 898.812825][T18365] bridge0: port 2(bridge_slave_1) entered disabled state [ 898.820911][T18365] device bridge_slave_1 entered promiscuous mode [ 899.042070][ T28] audit: type=1400 audit(1756881260.366:130): avc: denied { write } for pid=18385 comm="syz.0.5850" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 899.065318][T18388] FAULT_INJECTION: forcing a failure. [ 899.065318][T18388] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 899.078588][T18388] CPU: 1 PID: 18388 Comm: syz.2.5851 Not tainted syzkaller #0 [ 899.086160][T18388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 899.096223][T18388] Call Trace: [ 899.099507][T18388] [ 899.102518][T18388] __dump_stack+0x21/0x24 [ 899.106862][T18388] dump_stack_lvl+0xee/0x150 [ 899.111643][T18388] ? __cfi_dump_stack_lvl+0x8/0x8 [ 899.116682][T18388] dump_stack+0x15/0x24 [ 899.120847][T18388] should_fail_ex+0x3d4/0x520 [ 899.125541][T18388] should_fail+0xb/0x10 [ 899.129713][T18388] should_fail_usercopy+0x1a/0x20 [ 899.134761][T18388] _copy_to_user+0x1e/0x90 [ 899.139189][T18388] simple_read_from_buffer+0xe9/0x160 [ 899.144652][T18388] proc_fail_nth_read+0x19a/0x210 [ 899.149695][T18388] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 899.155242][T18388] ? security_file_permission+0x94/0xb0 [ 899.160815][T18388] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 899.166491][T18388] vfs_read+0x26e/0x8c0 [ 899.170681][T18388] ? __cfi_vfs_read+0x10/0x10 [ 899.175381][T18388] ? __kasan_check_write+0x14/0x20 [ 899.180518][T18388] ? mutex_lock+0x8d/0x1a0 [ 899.184942][T18388] ? __cfi_mutex_lock+0x10/0x10 [ 899.189800][T18388] ? __fdget_pos+0x2cd/0x380 [ 899.194390][T18388] ? ksys_read+0x71/0x240 [ 899.198735][T18388] ksys_read+0x140/0x240 [ 899.203008][T18388] ? __cfi_ksys_read+0x10/0x10 [ 899.207781][T18388] ? __bpf_trace_sys_enter+0x62/0x70 [ 899.213085][T18388] ? __traceiter_sys_enter+0x38/0x50 [ 899.218481][T18388] __x64_sys_read+0x7b/0x90 [ 899.223000][T18388] x64_sys_call+0x2f/0x9a0 [ 899.227515][T18388] do_syscall_64+0x4c/0xa0 [ 899.231972][T18388] ? clear_bhb_loop+0x30/0x80 [ 899.236660][T18388] ? clear_bhb_loop+0x30/0x80 [ 899.241361][T18388] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 899.247349][T18388] RIP: 0033:0x7f9e1c38d5fc [ 899.251870][T18388] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 899.272015][T18388] RSP: 002b:00007f9e1d2f6030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 899.280445][T18388] RAX: ffffffffffffffda RBX: 00007f9e1c5c5fa0 RCX: 00007f9e1c38d5fc [ 899.288467][T18388] RDX: 000000000000000f RSI: 00007f9e1d2f60a0 RDI: 0000000000000006 [ 899.296461][T18388] RBP: 00007f9e1d2f6090 R08: 0000000000000000 R09: 0000000000000000 [ 899.304708][T18388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 899.312689][T18388] R13: 00007f9e1c5c6038 R14: 00007f9e1c5c5fa0 R15: 00007ffc4f3002f8 [ 899.320686][T18388] [ 899.489736][T18393] FAULT_INJECTION: forcing a failure. [ 899.489736][T18393] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 899.540026][T18393] CPU: 0 PID: 18393 Comm: syz.0.5853 Not tainted syzkaller #0 [ 899.547645][T18393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 899.557866][T18393] Call Trace: [ 899.561181][T18393] [ 899.564146][T18393] __dump_stack+0x21/0x24 [ 899.568693][T18393] dump_stack_lvl+0xee/0x150 [ 899.573427][T18393] ? __cfi_dump_stack_lvl+0x8/0x8 [ 899.578504][T18393] dump_stack+0x15/0x24 [ 899.582799][T18393] should_fail_ex+0x3d4/0x520 [ 899.587601][T18393] should_fail+0xb/0x10 [ 899.591792][T18393] should_fail_usercopy+0x1a/0x20 [ 899.596961][T18393] _copy_from_user+0x1e/0xc0 [ 899.601803][T18393] sock_do_ioctl+0x186/0x310 [ 899.606530][T18393] ? sock_show_fdinfo+0xb0/0xb0 [ 899.611432][T18393] ? selinux_file_ioctl+0x377/0x480 [ 899.616681][T18393] sock_ioctl+0x4d8/0x6e0 [ 899.621061][T18393] ? __cfi_sock_ioctl+0x10/0x10 [ 899.625982][T18393] ? __fget_files+0x2d5/0x330 [ 899.630698][T18393] ? security_file_ioctl+0x95/0xc0 [ 899.635850][T18393] ? __cfi_sock_ioctl+0x10/0x10 [ 899.640741][T18393] __se_sys_ioctl+0x12f/0x1b0 [ 899.645638][T18393] __x64_sys_ioctl+0x7b/0x90 [ 899.650283][T18393] x64_sys_call+0x58b/0x9a0 [ 899.654860][T18393] do_syscall_64+0x4c/0xa0 [ 899.659481][T18393] ? clear_bhb_loop+0x30/0x80 [ 899.664253][T18393] ? clear_bhb_loop+0x30/0x80 [ 899.669007][T18393] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 899.674940][T18393] RIP: 0033:0x7f4bb058ebe9 [ 899.679472][T18393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 899.699213][T18393] RSP: 002b:00007f4bb147d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 899.707667][T18393] RAX: ffffffffffffffda RBX: 00007f4bb07c5fa0 RCX: 00007f4bb058ebe9 [ 899.715851][T18393] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000006 [ 899.723870][T18393] RBP: 00007f4bb147d090 R08: 0000000000000000 R09: 0000000000000000 [ 899.731967][T18393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 899.740060][T18393] R13: 00007f4bb07c6038 R14: 00007f4bb07c5fa0 R15: 00007ffff7fc3f38 [ 899.748171][T18393] [ 899.804191][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 899.812094][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 899.831081][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 899.839898][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 899.848572][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 899.856376][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 899.864132][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 899.920545][T18403] device pim6reg1 entered promiscuous mode [ 899.938734][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 899.947426][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 899.956137][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 899.963257][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 899.971828][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 899.980544][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 899.989062][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 900.307242][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 900.317424][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 900.350373][T18411] device pim6reg1 entered promiscuous mode [ 900.357973][T18365] device veth0_vlan entered promiscuous mode [ 900.365866][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 900.374081][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 900.401785][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 900.410499][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 900.425899][T18365] device veth1_macvtap entered promiscuous mode [ 900.450350][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 900.460070][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 900.469221][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 900.550421][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 900.577547][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 900.590604][ T8] device bridge_slave_1 left promiscuous mode [ 900.597105][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 900.604949][ T8] device bridge_slave_0 left promiscuous mode [ 900.611328][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 900.837800][T18423] device pim6reg1 entered promiscuous mode [ 900.848721][T18431] device pim6reg1 entered promiscuous mode [ 901.107587][T18430] bridge0: port 1(bridge_slave_0) entered blocking state [ 901.114873][T18430] bridge0: port 1(bridge_slave_0) entered disabled state [ 901.122390][T18430] device bridge_slave_0 entered promiscuous mode [ 901.129852][T18430] bridge0: port 2(bridge_slave_1) entered blocking state [ 901.137817][T18430] bridge0: port 2(bridge_slave_1) entered disabled state [ 901.145970][T18430] device bridge_slave_1 entered promiscuous mode [ 901.354945][T18443] device pim6reg1 entered promiscuous mode [ 901.926376][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 901.935573][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 901.973123][T18458] device pim6reg1 entered promiscuous mode [ 901.996932][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 902.013257][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 902.040524][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 902.048013][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 902.066634][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 902.075485][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 902.084122][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 902.091229][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 902.172831][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 902.180823][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 902.188950][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 902.206573][T18430] device veth0_vlan entered promiscuous mode [ 902.218167][T18463] bridge0: port 3(dummy0) entered blocking state [ 902.225993][T18463] bridge0: port 3(dummy0) entered disabled state [ 902.243725][T18463] device dummy0 entered promiscuous mode [ 902.251164][T18463] bridge0: port 3(dummy0) entered blocking state [ 902.258004][T18463] bridge0: port 3(dummy0) entered forwarding state [ 902.272980][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 902.281953][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 902.290336][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 902.298085][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 902.310607][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 902.320697][ T8] device bridge_slave_1 left promiscuous mode [ 902.326987][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 902.335061][ T8] device bridge_slave_0 left promiscuous mode [ 902.341278][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 902.349681][ T8] device veth1_macvtap left promiscuous mode [ 902.474916][T18430] device veth1_macvtap entered promiscuous mode [ 902.486721][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 902.501609][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 902.529073][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 902.566156][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 902.640497][T18477] device pim6reg1 entered promiscuous mode [ 903.012462][T18484] device gre0 entered promiscuous mode [ 903.081313][T18489] device veth0_vlan left promiscuous mode [ 903.176240][T18489] device veth0_vlan entered promiscuous mode [ 903.251861][ T28] audit: type=1400 audit(1756881264.576:131): avc: denied { create } for pid=18495 comm="syz.3.5881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 903.293125][T18500] device pim6reg1 entered promiscuous mode [ 903.367944][T18508] device pim6reg1 entered promiscuous mode [ 903.560501][T18516] bridge0: port 3(dummy0) entered blocking state [ 903.567395][T18516] bridge0: port 3(dummy0) entered disabled state [ 903.579415][T18516] device dummy0 entered promiscuous mode [ 903.588873][T18516] bridge0: port 3(dummy0) entered blocking state [ 903.595480][T18516] bridge0: port 3(dummy0) entered forwarding state [ 903.928010][T18524] device veth0_vlan left promiscuous mode [ 903.939995][T18524] device veth0_vlan entered promiscuous mode [ 903.987438][T18525] device veth1_macvtap left promiscuous mode [ 904.511820][T18546] device pim6reg1 entered promiscuous mode [ 904.871329][T18556] device pim6reg1 entered promiscuous mode [ 904.935529][T18554] bridge0: port 1(bridge_slave_0) entered blocking state [ 904.969102][T18554] bridge0: port 1(bridge_slave_0) entered disabled state [ 905.002189][T18554] device bridge_slave_0 entered promiscuous mode [ 905.019023][T18564] device veth0_vlan left promiscuous mode [ 905.030262][T18564] device veth0_vlan entered promiscuous mode [ 905.061064][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 905.073525][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 905.090239][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 905.100533][T18554] bridge0: port 2(bridge_slave_1) entered blocking state [ 905.121498][T18554] bridge0: port 2(bridge_slave_1) entered disabled state [ 905.150984][T18554] device bridge_slave_1 entered promiscuous mode [ 905.186664][T18566] bond_slave_1: mtu less than device minimum [ 905.837056][ T8] device bridge_slave_1 left promiscuous mode [ 905.845680][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 905.855365][ T8] device bridge_slave_0 left promiscuous mode [ 905.861673][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 905.870347][ T8] device veth1_macvtap left promiscuous mode [ 906.019317][T18593] device pim6reg1 entered promiscuous mode [ 906.052905][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 906.061431][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 906.093333][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 906.105331][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 906.115336][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 906.122460][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 906.131976][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 906.140916][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 906.149369][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 906.156477][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 906.165935][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 906.174494][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 906.183524][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 906.195405][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 906.203696][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 906.249112][T18554] device veth0_vlan entered promiscuous mode [ 906.255638][T18600] device pim6reg1 entered promiscuous mode [ 906.270737][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 906.279976][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 906.296359][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 906.306187][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 906.330904][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 906.349419][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 906.371561][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 906.388281][T18554] device veth1_macvtap entered promiscuous mode [ 906.456045][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 906.467824][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 906.488347][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 906.507647][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 906.539462][T18609] device veth0_vlan left promiscuous mode [ 906.580116][T18609] device veth0_vlan entered promiscuous mode [ 906.674275][T18611] device pim6reg1 entered promiscuous mode [ 907.346864][T18639] device pim6reg1 entered promiscuous mode [ 907.468416][T18645] device veth0_vlan left promiscuous mode [ 907.480754][T18645] device veth0_vlan entered promiscuous mode [ 907.657756][T18658] device pim6reg1 entered promiscuous mode [ 907.664298][T18660] FAULT_INJECTION: forcing a failure. [ 907.664298][T18660] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 907.689709][T18660] CPU: 1 PID: 18660 Comm: syz.3.5931 Not tainted syzkaller #0 [ 907.697340][T18660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 907.707442][T18660] Call Trace: [ 907.710923][T18660] [ 907.713912][T18660] __dump_stack+0x21/0x24 [ 907.718278][T18660] dump_stack_lvl+0xee/0x150 [ 907.722913][T18660] ? __cfi_dump_stack_lvl+0x8/0x8 [ 907.727989][T18660] dump_stack+0x15/0x24 [ 907.732179][T18660] should_fail_ex+0x3d4/0x520 [ 907.736943][T18660] should_fail+0xb/0x10 [ 907.741144][T18660] should_fail_usercopy+0x1a/0x20 [ 907.746303][T18660] _copy_from_user+0x1e/0xc0 [ 907.750932][T18660] sock_do_ioctl+0x186/0x310 [ 907.755582][T18660] ? sock_show_fdinfo+0xb0/0xb0 [ 907.760475][T18660] ? selinux_file_ioctl+0x377/0x480 [ 907.765741][T18660] sock_ioctl+0x4d8/0x6e0 [ 907.770110][T18660] ? __cfi_sock_ioctl+0x10/0x10 [ 907.775000][T18660] ? __fget_files+0x2d5/0x330 [ 907.779724][T18660] ? security_file_ioctl+0x95/0xc0 [ 907.784877][T18660] ? __cfi_sock_ioctl+0x10/0x10 [ 907.789857][T18660] __se_sys_ioctl+0x12f/0x1b0 [ 907.794573][T18660] __x64_sys_ioctl+0x7b/0x90 [ 907.799198][T18660] x64_sys_call+0x58b/0x9a0 [ 907.803932][T18660] do_syscall_64+0x4c/0xa0 [ 907.808474][T18660] ? clear_bhb_loop+0x30/0x80 [ 907.813198][T18660] ? clear_bhb_loop+0x30/0x80 [ 907.818004][T18660] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 907.823948][T18660] RIP: 0033:0x7f222358ebe9 [ 907.828396][T18660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 907.848136][T18660] RSP: 002b:00007f2224407038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 907.856770][T18660] RAX: ffffffffffffffda RBX: 00007f22237c5fa0 RCX: 00007f222358ebe9 [ 907.864787][T18660] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 907.872913][T18660] RBP: 00007f2224407090 R08: 0000000000000000 R09: 0000000000000000 [ 907.881014][T18660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 907.889029][T18660] R13: 00007f22237c6038 R14: 00007f22237c5fa0 R15: 00007ffdddca7478 [ 907.897132][T18660] [ 908.491825][T18682] FAULT_INJECTION: forcing a failure. [ 908.491825][T18682] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 908.516943][T18682] CPU: 0 PID: 18682 Comm: syz.0.5938 Not tainted syzkaller #0 [ 908.524487][T18682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 908.534576][T18682] Call Trace: [ 908.537888][T18682] [ 908.540843][T18682] __dump_stack+0x21/0x24 [ 908.545204][T18682] dump_stack_lvl+0xee/0x150 [ 908.549839][T18682] ? __cfi_dump_stack_lvl+0x8/0x8 [ 908.554909][T18682] dump_stack+0x15/0x24 [ 908.559275][T18682] should_fail_ex+0x3d4/0x520 [ 908.564086][T18682] should_fail+0xb/0x10 [ 908.568285][T18682] should_fail_usercopy+0x1a/0x20 [ 908.573346][T18682] _copy_from_user+0x1e/0xc0 [ 908.577960][T18682] __sys_bpf+0x277/0x780 [ 908.582334][T18682] ? bpf_link_show_fdinfo+0x320/0x320 [ 908.587836][T18682] ? __cfi_ksys_write+0x10/0x10 [ 908.592742][T18682] ? debug_smp_processor_id+0x17/0x20 [ 908.598279][T18682] __x64_sys_bpf+0x7c/0x90 [ 908.602732][T18682] x64_sys_call+0x488/0x9a0 [ 908.607262][T18682] do_syscall_64+0x4c/0xa0 [ 908.611710][T18682] ? clear_bhb_loop+0x30/0x80 [ 908.616455][T18682] ? clear_bhb_loop+0x30/0x80 [ 908.621177][T18682] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 908.627193][T18682] RIP: 0033:0x7fe13ed8ebe9 [ 908.631757][T18682] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 908.651492][T18682] RSP: 002b:00007fe13d7f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 908.660117][T18682] RAX: ffffffffffffffda RBX: 00007fe13efc5fa0 RCX: 00007fe13ed8ebe9 [ 908.668118][T18682] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 908.676126][T18682] RBP: 00007fe13d7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 908.684297][T18682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 908.692375][T18682] R13: 00007fe13efc6038 R14: 00007fe13efc5fa0 R15: 00007ffc626e1b58 [ 908.700399][T18682] [ 908.753213][T18684] device veth0_vlan left promiscuous mode [ 908.786844][T18684] device veth0_vlan entered promiscuous mode [ 908.918342][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 908.930681][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 908.988018][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 909.069820][T18690] device pim6reg1 entered promiscuous mode [ 909.740639][T18716] device pim6reg1 entered promiscuous mode [ 909.987311][T18718] device pim6reg1 entered promiscuous mode [ 910.774136][T18736] device pim6reg1 entered promiscuous mode [ 911.054513][T18749] FAULT_INJECTION: forcing a failure. [ 911.054513][T18749] name failslab, interval 1, probability 0, space 0, times 0 [ 911.121174][T18749] CPU: 0 PID: 18749 Comm: syz.3.5960 Not tainted syzkaller #0 [ 911.128827][T18749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 911.139000][T18749] Call Trace: [ 911.142302][T18749] [ 911.145259][T18749] __dump_stack+0x21/0x24 [ 911.149621][T18749] dump_stack_lvl+0xee/0x150 [ 911.154257][T18749] ? __cfi_dump_stack_lvl+0x8/0x8 [ 911.159326][T18749] ? avc_has_perm+0x158/0x240 [ 911.164045][T18749] dump_stack+0x15/0x24 [ 911.168230][T18749] should_fail_ex+0x3d4/0x520 [ 911.172938][T18749] __should_failslab+0xac/0xf0 [ 911.177913][T18749] should_failslab+0x9/0x20 [ 911.182576][T18749] slab_pre_alloc_hook+0x30/0x1e0 [ 911.187840][T18749] ? __kasan_check_write+0x14/0x20 [ 911.193086][T18749] kmem_cache_alloc_lru+0x49/0x280 [ 911.198464][T18749] ? sock_alloc_inode+0x28/0xc0 [ 911.203366][T18749] sock_alloc_inode+0x28/0xc0 [ 911.208090][T18749] ? __cfi_sock_alloc_inode+0x10/0x10 [ 911.213497][T18749] new_inode_pseudo+0x70/0x1f0 [ 911.218298][T18749] __sock_create+0x12c/0x7c0 [ 911.223035][T18749] __sys_socketpair+0x1a1/0x5b0 [ 911.227928][T18749] __x64_sys_socketpair+0x9b/0xb0 [ 911.233692][T18749] x64_sys_call+0x6e/0x9a0 [ 911.238138][T18749] do_syscall_64+0x4c/0xa0 [ 911.242684][T18749] ? clear_bhb_loop+0x30/0x80 [ 911.247474][T18749] ? clear_bhb_loop+0x30/0x80 [ 911.252378][T18749] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 911.258369][T18749] RIP: 0033:0x7f222358ebe9 [ 911.262823][T18749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 911.282852][T18749] RSP: 002b:00007f2224407038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 911.291726][T18749] RAX: ffffffffffffffda RBX: 00007f22237c5fa0 RCX: 00007f222358ebe9 [ 911.299735][T18749] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 911.307748][T18749] RBP: 00007f2224407090 R08: 0000000000000000 R09: 0000000000000000 [ 911.315837][T18749] R10: 0000200000000340 R11: 0000000000000246 R12: 0000000000000001 [ 911.323848][T18749] R13: 00007f22237c6038 R14: 00007f22237c5fa0 R15: 00007ffdddca7478 [ 911.331861][T18749] [ 911.478365][T18749] socket: no more sockets [ 911.926651][T18766] FAULT_INJECTION: forcing a failure. [ 911.926651][T18766] name failslab, interval 1, probability 0, space 0, times 0 [ 911.939737][T18766] CPU: 0 PID: 18766 Comm: syz.4.5965 Not tainted syzkaller #0 [ 911.947247][T18766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 911.957337][T18766] Call Trace: [ 911.960774][T18766] [ 911.963808][T18766] __dump_stack+0x21/0x24 [ 911.968164][T18766] dump_stack_lvl+0xee/0x150 [ 911.972793][T18766] ? __cfi_dump_stack_lvl+0x8/0x8 [ 911.977850][T18766] ? stack_trace_save+0x98/0xe0 [ 911.982742][T18766] dump_stack+0x15/0x24 [ 911.986931][T18766] should_fail_ex+0x3d4/0x520 [ 911.991643][T18766] __should_failslab+0xac/0xf0 [ 911.996442][T18766] should_failslab+0x9/0x20 [ 912.001068][T18766] kmem_cache_alloc_node+0x42/0x340 [ 912.006302][T18766] ? dup_task_struct+0x5a/0x790 [ 912.011207][T18766] dup_task_struct+0x5a/0x790 [ 912.015920][T18766] ? __kasan_check_write+0x14/0x20 [ 912.021074][T18766] ? recalc_sigpending+0x168/0x1c0 [ 912.026215][T18766] copy_process+0x5b8/0x3480 [ 912.030845][T18766] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 912.036605][T18766] ? __kasan_check_write+0x14/0x20 [ 912.041767][T18766] ? idle_dummy+0x10/0x10 [ 912.046317][T18766] kernel_clone+0x23a/0x810 [ 912.050858][T18766] ? __cfi_kernel_clone+0x10/0x10 [ 912.055918][T18766] ? __kasan_check_write+0x14/0x20 [ 912.061241][T18766] ? mutex_unlock+0x89/0x220 [ 912.065864][T18766] __x64_sys_clone+0x168/0x1b0 [ 912.070666][T18766] ? __cfi___x64_sys_clone+0x10/0x10 [ 912.075994][T18766] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 912.082184][T18766] x64_sys_call+0x990/0x9a0 [ 912.086718][T18766] do_syscall_64+0x4c/0xa0 [ 912.091240][T18766] ? clear_bhb_loop+0x30/0x80 [ 912.095978][T18766] ? clear_bhb_loop+0x30/0x80 [ 912.100782][T18766] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 912.106711][T18766] RIP: 0033:0x7fc0ed58ebe9 [ 912.111245][T18766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 912.131138][T18766] RSP: 002b:00007fc0ee34dfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 912.139592][T18766] RAX: ffffffffffffffda RBX: 00007fc0ed7c5fa0 RCX: 00007fc0ed58ebe9 [ 912.147598][T18766] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 912.155605][T18766] RBP: 00007fc0ee34e090 R08: 0000000000000000 R09: 0000000000000000 [ 912.163696][T18766] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 912.171968][T18766] R13: 00007fc0ed7c6038 R14: 00007fc0ed7c5fa0 R15: 00007ffc2062ccd8 [ 912.180064][T18766] [ 912.210179][T18768] device pim6reg1 entered promiscuous mode [ 912.310798][T18772] FAULT_INJECTION: forcing a failure. [ 912.310798][T18772] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 912.423903][T18772] CPU: 1 PID: 18772 Comm: syz.0.5968 Not tainted syzkaller #0 [ 912.431442][T18772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 912.441798][T18772] Call Trace: [ 912.445092][T18772] [ 912.448043][T18772] __dump_stack+0x21/0x24 [ 912.452378][T18772] dump_stack_lvl+0xee/0x150 [ 912.456994][T18772] ? __cfi_dump_stack_lvl+0x8/0x8 [ 912.462046][T18772] dump_stack+0x15/0x24 [ 912.466238][T18772] should_fail_ex+0x3d4/0x520 [ 912.471255][T18772] should_fail_alloc_page+0x61/0x90 [ 912.476508][T18772] prepare_alloc_pages+0x148/0x5f0 [ 912.481729][T18772] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 912.486950][T18772] __alloc_pages+0x124/0x450 [ 912.491645][T18772] ? __cfi___alloc_pages+0x10/0x10 [ 912.496773][T18772] ? __cfi_mutex_lock+0x10/0x10 [ 912.501726][T18772] ? __cfi_avc_has_perm+0x10/0x10 [ 912.506776][T18772] pipe_write+0x592/0x1950 [ 912.511213][T18772] ? __cfi_pipe_write+0x10/0x10 [ 912.516088][T18772] ? selinux_file_permission+0x3ef/0x510 [ 912.521745][T18772] ? fsnotify_perm+0x67/0x5b0 [ 912.526438][T18772] ? security_file_permission+0x8a/0xb0 [ 912.531994][T18772] vfs_write+0x5db/0xca0 [ 912.536340][T18772] ? __cfi_vfs_write+0x10/0x10 [ 912.541125][T18772] ? __fget_files+0x2d5/0x330 [ 912.545801][T18772] ? __fdget_pos+0x1f2/0x380 [ 912.550478][T18772] ? ksys_write+0x71/0x240 [ 912.554943][T18772] ksys_write+0x140/0x240 [ 912.559311][T18772] ? __cfi_ksys_write+0x10/0x10 [ 912.564271][T18772] ? __bpf_trace_sys_enter+0x62/0x70 [ 912.569569][T18772] __x64_sys_write+0x7b/0x90 [ 912.574173][T18772] x64_sys_call+0x27b/0x9a0 [ 912.578771][T18772] do_syscall_64+0x4c/0xa0 [ 912.583426][T18772] ? clear_bhb_loop+0x30/0x80 [ 912.588107][T18772] ? clear_bhb_loop+0x30/0x80 [ 912.592998][T18772] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 912.599050][T18772] RIP: 0033:0x7fe13ed8ebe9 [ 912.603482][T18772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 912.623469][T18772] RSP: 002b:00007fe13d7f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 912.632006][T18772] RAX: ffffffffffffffda RBX: 00007fe13efc5fa0 RCX: 00007fe13ed8ebe9 [ 912.640001][T18772] RDX: 000000000000fdef RSI: 0000200000000280 RDI: 0000000000000000 [ 912.648004][T18772] RBP: 00007fe13d7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 912.656106][T18772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 912.664099][T18772] R13: 00007fe13efc6038 R14: 00007fe13efc5fa0 R15: 00007ffc626e1b58 [ 912.672188][T18772] [ 912.752524][T18784] device veth0_vlan left promiscuous mode [ 912.770518][T18784] device veth0_vlan entered promiscuous mode [ 912.844741][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 912.875510][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 913.043060][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 913.451570][T18816] FAULT_INJECTION: forcing a failure. [ 913.451570][T18816] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 913.486758][T18816] CPU: 0 PID: 18816 Comm: syz.2.5982 Not tainted syzkaller #0 [ 913.494288][T18816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 913.504547][T18816] Call Trace: [ 913.507860][T18816] [ 913.510815][T18816] __dump_stack+0x21/0x24 [ 913.515182][T18816] dump_stack_lvl+0xee/0x150 [ 913.519820][T18816] ? __cfi_dump_stack_lvl+0x8/0x8 [ 913.525036][T18816] dump_stack+0x15/0x24 [ 913.529215][T18816] should_fail_ex+0x3d4/0x520 [ 913.534133][T18816] should_fail+0xb/0x10 [ 913.538409][T18816] should_fail_usercopy+0x1a/0x20 [ 913.543463][T18816] _copy_from_user+0x1e/0xc0 [ 913.548187][T18816] __sys_bpf+0x277/0x780 [ 913.552492][T18816] ? bpf_link_show_fdinfo+0x320/0x320 [ 913.557902][T18816] ? __cfi_ksys_write+0x10/0x10 [ 913.562772][T18816] ? debug_smp_processor_id+0x17/0x20 [ 913.568180][T18816] __x64_sys_bpf+0x7c/0x90 [ 913.572694][T18816] x64_sys_call+0x488/0x9a0 [ 913.577220][T18816] do_syscall_64+0x4c/0xa0 [ 913.581676][T18816] ? clear_bhb_loop+0x30/0x80 [ 913.586378][T18816] ? clear_bhb_loop+0x30/0x80 [ 913.591072][T18816] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 913.596971][T18816] RIP: 0033:0x7f6afd98ebe9 [ 913.601403][T18816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 913.621454][T18816] RSP: 002b:00007f6afe8f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 913.629880][T18816] RAX: ffffffffffffffda RBX: 00007f6afdbc5fa0 RCX: 00007f6afd98ebe9 [ 913.638040][T18816] RDX: 0000000000000048 RSI: 0000200000000780 RDI: 000000000000000a [ 913.646115][T18816] RBP: 00007f6afe8f0090 R08: 0000000000000000 R09: 0000000000000000 [ 913.654196][T18816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 913.662267][T18816] R13: 00007f6afdbc6038 R14: 00007f6afdbc5fa0 R15: 00007ffe3a92b8c8 [ 913.670279][T18816] [ 914.404998][T18831] FAULT_INJECTION: forcing a failure. [ 914.404998][T18831] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 914.418866][T18831] CPU: 1 PID: 18831 Comm: syz.4.5986 Not tainted syzkaller #0 [ 914.426362][T18831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 914.436544][T18831] Call Trace: [ 914.439854][T18831] [ 914.442813][T18831] __dump_stack+0x21/0x24 [ 914.447183][T18831] dump_stack_lvl+0xee/0x150 [ 914.451822][T18831] ? __cfi_dump_stack_lvl+0x8/0x8 [ 914.456894][T18831] ? kasan_check_range+0x13/0x290 [ 914.461952][T18831] dump_stack+0x15/0x24 [ 914.466137][T18831] should_fail_ex+0x3d4/0x520 [ 914.470859][T18831] should_fail+0xb/0x10 [ 914.475131][T18831] should_fail_usercopy+0x1a/0x20 [ 914.480209][T18831] _copy_from_user+0x1e/0xc0 [ 914.484846][T18831] __sys_bpf+0x277/0x780 [ 914.489126][T18831] ? bpf_link_show_fdinfo+0x320/0x320 [ 914.494542][T18831] ? irqentry_exit+0x37/0x40 [ 914.499227][T18831] ? sysvec_call_function_single+0x61/0xc0 [ 914.505194][T18831] ? debug_smp_processor_id+0x17/0x20 [ 914.510609][T18831] __x64_sys_bpf+0x7c/0x90 [ 914.515084][T18831] x64_sys_call+0x488/0x9a0 [ 914.519635][T18831] do_syscall_64+0x4c/0xa0 [ 914.524073][T18831] ? clear_bhb_loop+0x30/0x80 [ 914.528854][T18831] ? clear_bhb_loop+0x30/0x80 [ 914.533571][T18831] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 914.539471][T18831] RIP: 0033:0x7fc0ed58ebe9 [ 914.543897][T18831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 914.563521][T18831] RSP: 002b:00007fc0ee34e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 914.571959][T18831] RAX: ffffffffffffffda RBX: 00007fc0ed7c5fa0 RCX: 00007fc0ed58ebe9 [ 914.579951][T18831] RDX: 0000000000000020 RSI: 0000200000000580 RDI: 0000000000000015 [ 914.587942][T18831] RBP: 00007fc0ee34e090 R08: 0000000000000000 R09: 0000000000000000 [ 914.596008][T18831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 914.603995][T18831] R13: 00007fc0ed7c6038 R14: 00007fc0ed7c5fa0 R15: 00007ffc2062ccd8 [ 914.611980][T18831] [ 915.520733][T18867] syz.3.5997 (18867) used obsolete PPPIOCDETACH ioctl [ 915.621856][T18873] FAULT_INJECTION: forcing a failure. [ 915.621856][T18873] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 915.644122][T18873] CPU: 1 PID: 18873 Comm: syz.4.6000 Not tainted syzkaller #0 [ 915.651824][T18873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 915.661919][T18873] Call Trace: [ 915.665216][T18873] [ 915.668173][T18873] __dump_stack+0x21/0x24 [ 915.672528][T18873] dump_stack_lvl+0xee/0x150 [ 915.677291][T18873] ? __cfi_dump_stack_lvl+0x8/0x8 [ 915.682374][T18873] dump_stack+0x15/0x24 [ 915.686566][T18873] should_fail_ex+0x3d4/0x520 [ 915.691280][T18873] should_fail+0xb/0x10 [ 915.695460][T18873] should_fail_usercopy+0x1a/0x20 [ 915.700507][T18873] _copy_from_user+0x1e/0xc0 [ 915.705123][T18873] sock_do_ioctl+0x186/0x310 [ 915.709739][T18873] ? sock_show_fdinfo+0xb0/0xb0 [ 915.714810][T18873] ? selinux_file_ioctl+0x377/0x480 [ 915.720041][T18873] sock_ioctl+0x4d8/0x6e0 [ 915.724395][T18873] ? __cfi_sock_ioctl+0x10/0x10 [ 915.729274][T18873] ? __fget_files+0x2d5/0x330 [ 915.733984][T18873] ? security_file_ioctl+0x95/0xc0 [ 915.739129][T18873] ? __cfi_sock_ioctl+0x10/0x10 [ 915.744051][T18873] __se_sys_ioctl+0x12f/0x1b0 [ 915.748751][T18873] __x64_sys_ioctl+0x7b/0x90 [ 915.753468][T18873] x64_sys_call+0x58b/0x9a0 [ 915.757999][T18873] do_syscall_64+0x4c/0xa0 [ 915.762525][T18873] ? clear_bhb_loop+0x30/0x80 [ 915.767317][T18873] ? clear_bhb_loop+0x30/0x80 [ 915.772029][T18873] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 915.778032][T18873] RIP: 0033:0x7fc0ed58ebe9 [ 915.782480][T18873] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 915.802719][T18873] RSP: 002b:00007fc0ee34e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 915.811268][T18873] RAX: ffffffffffffffda RBX: 00007fc0ed7c5fa0 RCX: 00007fc0ed58ebe9 [ 915.819270][T18873] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 0000000000000009 [ 915.827265][T18873] RBP: 00007fc0ee34e090 R08: 0000000000000000 R09: 0000000000000000 [ 915.835268][T18873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 915.843262][T18873] R13: 00007fc0ed7c6038 R14: 00007fc0ed7c5fa0 R15: 00007ffc2062ccd8 [ 915.851266][T18873] [ 915.997651][T18879] FAULT_INJECTION: forcing a failure. [ 915.997651][T18879] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 916.015897][T18879] CPU: 0 PID: 18879 Comm: syz.2.6003 Not tainted syzkaller #0 [ 916.023416][T18879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 916.033677][T18879] Call Trace: [ 916.037081][T18879] [ 916.040050][T18879] __dump_stack+0x21/0x24 [ 916.044410][T18879] dump_stack_lvl+0xee/0x150 [ 916.049071][T18879] ? __cfi_dump_stack_lvl+0x8/0x8 [ 916.054159][T18879] dump_stack+0x15/0x24 [ 916.058342][T18879] should_fail_ex+0x3d4/0x520 [ 916.063064][T18879] should_fail_alloc_page+0x61/0x90 [ 916.068380][T18879] prepare_alloc_pages+0x148/0x5f0 [ 916.073880][T18879] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 916.079213][T18879] __alloc_pages+0x124/0x450 [ 916.083848][T18879] ? __cfi___alloc_pages+0x10/0x10 [ 916.089032][T18879] ? percpu_counter_add_batch+0x13c/0x160 [ 916.094787][T18879] __folio_alloc+0x12/0x40 [ 916.099246][T18879] shmem_alloc_and_acct_folio+0x650/0x870 [ 916.105067][T18879] ? shmem_replace_folio+0x590/0x590 [ 916.110449][T18879] ? xas_load+0x390/0x3b0 [ 916.114869][T18879] ? __filemap_get_folio+0x93e/0x980 [ 916.120384][T18879] ? __cfi___filemap_get_folio+0x10/0x10 [ 916.126142][T18879] ? do_user_addr_fault+0x9ac/0x1050 [ 916.131455][T18879] shmem_get_folio_gfp+0x119f/0x2230 [ 916.136762][T18879] shmem_write_begin+0xea/0x2c0 [ 916.141647][T18879] generic_perform_write+0x2f6/0x6d0 [ 916.146942][T18879] ? file_update_time+0x2d3/0x340 [ 916.151981][T18879] ? __cfi_generic_perform_write+0x10/0x10 [ 916.157827][T18879] ? __cfi_file_update_time+0x10/0x10 [ 916.163222][T18879] __generic_file_write_iter+0x227/0x580 [ 916.168878][T18879] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 916.174705][T18879] ? __cfi___generic_file_write_iter+0x10/0x10 [ 916.180911][T18879] ? rwsem_write_trylock+0x130/0x300 [ 916.186368][T18879] ? generic_write_checks_count+0x3c6/0x4a0 [ 916.192319][T18879] ? generic_write_checks+0xca/0x100 [ 916.197650][T18879] generic_file_write_iter+0xae/0x310 [ 916.203070][T18879] vfs_write+0x5db/0xca0 [ 916.207354][T18879] ? slab_free_freelist_hook+0xc2/0x190 [ 916.212970][T18879] ? __cfi_vfs_write+0x10/0x10 [ 916.217880][T18879] ? __cfi_mutex_lock+0x10/0x10 [ 916.222850][T18879] ? __fdget_pos+0x2cd/0x380 [ 916.227452][T18879] ? ksys_write+0x71/0x240 [ 916.231899][T18879] ksys_write+0x140/0x240 [ 916.236263][T18879] ? __cfi_ksys_write+0x10/0x10 [ 916.241152][T18879] ? debug_smp_processor_id+0x17/0x20 [ 916.246579][T18879] __x64_sys_write+0x7b/0x90 [ 916.251381][T18879] x64_sys_call+0x27b/0x9a0 [ 916.255925][T18879] do_syscall_64+0x4c/0xa0 [ 916.260347][T18879] ? clear_bhb_loop+0x30/0x80 [ 916.265040][T18879] ? clear_bhb_loop+0x30/0x80 [ 916.269736][T18879] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 916.275750][T18879] RIP: 0033:0x7f6afd98ebe9 [ 916.280323][T18879] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 916.299940][T18879] RSP: 002b:00007f6afe8f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 916.308374][T18879] RAX: ffffffffffffffda RBX: 00007f6afdbc5fa0 RCX: 00007f6afd98ebe9 [ 916.316456][T18879] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000008 [ 916.324457][T18879] RBP: 00007f6afe8f0090 R08: 0000000000000000 R09: 0000000000000000 [ 916.332467][T18879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 916.340463][T18879] R13: 00007f6afdbc6038 R14: 00007f6afdbc5fa0 R15: 00007ffe3a92b8c8 [ 916.348545][T18879] [ 916.534903][T18894] device pim6reg1 entered promiscuous mode [ 916.960826][T18910] device pim6reg1 entered promiscuous mode [ 917.062308][T18919] FAULT_INJECTION: forcing a failure. [ 917.062308][T18919] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 917.103992][T18919] CPU: 0 PID: 18919 Comm: syz.0.6017 Not tainted syzkaller #0 [ 917.111518][T18919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 917.121687][T18919] Call Trace: [ 917.124987][T18919] [ 917.128027][T18919] __dump_stack+0x21/0x24 [ 917.132390][T18919] dump_stack_lvl+0xee/0x150 [ 917.137029][T18919] ? __cfi_dump_stack_lvl+0x8/0x8 [ 917.142106][T18919] dump_stack+0x15/0x24 [ 917.146293][T18919] should_fail_ex+0x3d4/0x520 [ 917.151000][T18919] should_fail+0xb/0x10 [ 917.155185][T18919] should_fail_usercopy+0x1a/0x20 [ 917.160254][T18919] _copy_from_user+0x1e/0xc0 [ 917.164916][T18919] __sys_bpf+0x277/0x780 [ 917.169302][T18919] ? bpf_link_show_fdinfo+0x320/0x320 [ 917.174712][T18919] ? __cfi_ksys_write+0x10/0x10 [ 917.179729][T18919] ? debug_smp_processor_id+0x17/0x20 [ 917.185134][T18919] __x64_sys_bpf+0x7c/0x90 [ 917.189678][T18919] x64_sys_call+0x488/0x9a0 [ 917.194207][T18919] do_syscall_64+0x4c/0xa0 [ 917.198662][T18919] ? clear_bhb_loop+0x30/0x80 [ 917.203382][T18919] ? clear_bhb_loop+0x30/0x80 [ 917.208098][T18919] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 917.214024][T18919] RIP: 0033:0x7fe13ed8ebe9 [ 917.218555][T18919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 917.238296][T18919] RSP: 002b:00007fe13d7f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 917.246742][T18919] RAX: ffffffffffffffda RBX: 00007fe13efc5fa0 RCX: 00007fe13ed8ebe9 [ 917.254740][T18919] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 917.262749][T18919] RBP: 00007fe13d7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 917.270774][T18919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 917.278877][T18919] R13: 00007fe13efc6038 R14: 00007fe13efc5fa0 R15: 00007ffc626e1b58 [ 917.286984][T18919] [ 917.366222][T18926] FAULT_INJECTION: forcing a failure. [ 917.366222][T18926] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 917.393394][T18926] CPU: 0 PID: 18926 Comm: syz.0.6018 Not tainted syzkaller #0 [ 917.400935][T18926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 917.411125][T18926] Call Trace: [ 917.414452][T18926] [ 917.417425][T18926] __dump_stack+0x21/0x24 [ 917.421877][T18926] dump_stack_lvl+0xee/0x150 [ 917.426520][T18926] ? __cfi_dump_stack_lvl+0x8/0x8 [ 917.431604][T18926] dump_stack+0x15/0x24 [ 917.435851][T18926] should_fail_ex+0x3d4/0x520 [ 917.440660][T18926] should_fail+0xb/0x10 [ 917.444909][T18926] should_fail_usercopy+0x1a/0x20 [ 917.449992][T18926] _copy_from_user+0x1e/0xc0 [ 917.454647][T18926] __sys_bpf+0x277/0x780 [ 917.458938][T18926] ? bpf_link_show_fdinfo+0x320/0x320 [ 917.464360][T18926] ? __cfi_ksys_write+0x10/0x10 [ 917.469268][T18926] ? debug_smp_processor_id+0x17/0x20 [ 917.474689][T18926] __x64_sys_bpf+0x7c/0x90 [ 917.479165][T18926] x64_sys_call+0x488/0x9a0 [ 917.483720][T18926] do_syscall_64+0x4c/0xa0 [ 917.488174][T18926] ? clear_bhb_loop+0x30/0x80 [ 917.492896][T18926] ? clear_bhb_loop+0x30/0x80 [ 917.497616][T18926] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 917.503634][T18926] RIP: 0033:0x7fe13ed8ebe9 [ 917.508174][T18926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 917.528080][T18926] RSP: 002b:00007fe13d7f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 917.536547][T18926] RAX: ffffffffffffffda RBX: 00007fe13efc5fa0 RCX: 00007fe13ed8ebe9 [ 917.544550][T18926] RDX: 0000000000000050 RSI: 0000200000000500 RDI: 000000000000000a [ 917.552532][T18926] RBP: 00007fe13d7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 917.560514][T18926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 917.568491][T18926] R13: 00007fe13efc6038 R14: 00007fe13efc5fa0 R15: 00007ffc626e1b58 [ 917.576488][T18926] [ 917.850737][T18944] device veth0_vlan left promiscuous mode [ 917.860028][T18944] device veth0_vlan entered promiscuous mode [ 917.879063][T18947] FAULT_INJECTION: forcing a failure. [ 917.879063][T18947] name failslab, interval 1, probability 0, space 0, times 0 [ 917.891892][T18947] CPU: 0 PID: 18947 Comm: syz.2.6027 Not tainted syzkaller #0 [ 917.899382][T18947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 917.909470][T18947] Call Trace: [ 917.912786][T18947] [ 917.916093][T18947] __dump_stack+0x21/0x24 [ 917.920466][T18947] dump_stack_lvl+0xee/0x150 [ 917.925103][T18947] ? __cfi_dump_stack_lvl+0x8/0x8 [ 917.928313][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 917.930174][T18947] ? _parse_integer+0x2a/0x40 [ 917.939340][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 917.942586][T18947] dump_stack+0x15/0x24 [ 917.942613][T18947] should_fail_ex+0x3d4/0x520 [ 917.951031][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 917.953986][T18947] ? __sigqueue_alloc+0x13f/0x210 [ 917.954022][T18947] __should_failslab+0xac/0xf0 [ 917.975676][T18947] should_failslab+0x9/0x20 [ 917.980247][T18947] kmem_cache_alloc+0x3b/0x330 [ 917.985048][T18947] __sigqueue_alloc+0x13f/0x210 [ 917.989922][T18947] __send_signal_locked+0x19d/0xb70 [ 917.995229][T18947] ? __kasan_check_write+0x14/0x20 [ 918.000366][T18947] ? __task_pid_nr_ns+0x1dd/0x280 [ 918.005412][T18947] send_signal_locked+0x422/0x580 [ 918.010452][T18947] force_sig_info_to_task+0x31c/0x3f0 [ 918.015888][T18947] force_sig+0xb7/0x100 [ 918.020055][T18947] ? __cfi_force_sig+0x10/0x10 [ 918.024894][T18947] ? __kasan_check_write+0x14/0x20 [ 918.030037][T18947] ? cond_local_irq_disable+0x40/0x40 [ 918.035512][T18947] gp_user_force_sig_segv+0xc2/0x1f0 [ 918.040915][T18947] ? __cfi_ksys_write+0x10/0x10 [ 918.045800][T18947] exc_general_protection+0xb9/0x1e0 [ 918.051103][T18947] ? debug_smp_processor_id+0x17/0x20 [ 918.056513][T18947] ? do_syscall_64+0x58/0xa0 [ 918.061205][T18947] asm_exc_general_protection+0x27/0x30 [ 918.066774][T18947] RIP: 0033:0x7f6afd967739 [ 918.071212][T18947] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 918.091046][T18947] RSP: 002b:00007f6afe8ef7c8 EFLAGS: 00010283 [ 918.097135][T18947] RAX: 0000000000000999 RBX: 00007f6afe8efd30 RCX: 00007f6afdb88120 [ 918.105120][T18947] RDX: 9999999999999999 RSI: 00007f6afda11b31 RDI: 9999999999999999 [ 918.113103][T18947] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 918.121092][T18947] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 918.129182][T18947] R13: 00007f6afe8efeb0 R14: 9999999999999999 R15: 0000000000000000 [ 918.137271][T18947] [ 918.217585][T18952] device pim6reg1 entered promiscuous mode [ 918.322702][T18959] FAULT_INJECTION: forcing a failure. [ 918.322702][T18959] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 918.336390][T18959] CPU: 1 PID: 18959 Comm: syz.2.6031 Not tainted syzkaller #0 [ 918.344011][T18959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 918.354124][T18959] Call Trace: [ 918.357536][T18959] [ 918.360593][T18959] __dump_stack+0x21/0x24 [ 918.365057][T18959] dump_stack_lvl+0xee/0x150 [ 918.369722][T18959] ? __cfi_dump_stack_lvl+0x8/0x8 [ 918.374905][T18959] dump_stack+0x15/0x24 [ 918.379109][T18959] should_fail_ex+0x3d4/0x520 [ 918.383847][T18959] should_fail+0xb/0x10 [ 918.388061][T18959] should_fail_usercopy+0x1a/0x20 [ 918.393135][T18959] _copy_from_user+0x1e/0xc0 [ 918.397782][T18959] __sys_bpf+0x277/0x780 [ 918.402073][T18959] ? bpf_link_show_fdinfo+0x320/0x320 [ 918.407492][T18959] ? __cfi_ksys_write+0x10/0x10 [ 918.412397][T18959] ? debug_smp_processor_id+0x17/0x20 [ 918.417828][T18959] __x64_sys_bpf+0x7c/0x90 [ 918.422304][T18959] x64_sys_call+0x488/0x9a0 [ 918.426953][T18959] do_syscall_64+0x4c/0xa0 [ 918.431424][T18959] ? clear_bhb_loop+0x30/0x80 [ 918.436234][T18959] ? clear_bhb_loop+0x30/0x80 [ 918.440950][T18959] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 918.446865][T18959] RIP: 0033:0x7f6afd98ebe9 [ 918.451306][T18959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 918.470948][T18959] RSP: 002b:00007f6afe8f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 918.479514][T18959] RAX: ffffffffffffffda RBX: 00007f6afdbc5fa0 RCX: 00007f6afd98ebe9 [ 918.487541][T18959] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000001 [ 918.495628][T18959] RBP: 00007f6afe8f0090 R08: 0000000000000000 R09: 0000000000000000 [ 918.503632][T18959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 918.511719][T18959] R13: 00007f6afdbc6038 R14: 00007f6afdbc5fa0 R15: 00007ffe3a92b8c8 [ 918.519873][T18959] [ 918.735986][T18974] bond_slave_1: mtu less than device minimum [ 918.842556][T18980] FAULT_INJECTION: forcing a failure. [ 918.842556][T18980] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 918.955462][T18980] CPU: 1 PID: 18980 Comm: syz.3.6037 Not tainted syzkaller #0 [ 918.962995][T18980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 918.973091][T18980] Call Trace: [ 918.976405][T18980] [ 918.979376][T18980] __dump_stack+0x21/0x24 [ 918.983737][T18980] dump_stack_lvl+0xee/0x150 [ 918.988450][T18980] ? __cfi_dump_stack_lvl+0x8/0x8 [ 918.993601][T18980] ? avc_has_extended_perms+0x95f/0xdc0 [ 918.999177][T18980] dump_stack+0x15/0x24 [ 919.003360][T18980] should_fail_ex+0x3d4/0x520 [ 919.008074][T18980] should_fail+0xb/0x10 [ 919.012267][T18980] should_fail_usercopy+0x1a/0x20 [ 919.017324][T18980] _copy_from_user+0x1e/0xc0 [ 919.021954][T18980] do_vfs_ioctl+0x16d6/0x1c80 [ 919.026670][T18980] ? __ia32_compat_sys_ioctl+0x790/0x790 [ 919.032343][T18980] ? __cfi_bpf_trace_run2+0x10/0x10 [ 919.037664][T18980] ? ioctl_has_perm+0x391/0x4c0 [ 919.042536][T18980] ? has_cap_mac_admin+0x330/0x330 [ 919.047759][T18980] ? __hrtimer_run_queues+0x991/0x9f0 [ 919.053175][T18980] ? selinux_file_ioctl+0x377/0x480 [ 919.058402][T18980] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 919.063978][T18980] ? __fget_files+0x2d5/0x330 [ 919.068712][T18980] ? security_file_ioctl+0x95/0xc0 [ 919.073878][T18980] __se_sys_ioctl+0x9f/0x1b0 [ 919.078677][T18980] __x64_sys_ioctl+0x7b/0x90 [ 919.083549][T18980] x64_sys_call+0x58b/0x9a0 [ 919.088085][T18980] do_syscall_64+0x4c/0xa0 [ 919.092603][T18980] ? clear_bhb_loop+0x30/0x80 [ 919.097300][T18980] ? clear_bhb_loop+0x30/0x80 [ 919.102028][T18980] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 919.107943][T18980] RIP: 0033:0x7f222358ebe9 [ 919.112384][T18980] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 919.132118][T18980] RSP: 002b:00007f22243e6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 919.140696][T18980] RAX: ffffffffffffffda RBX: 00007f22237c6090 RCX: 00007f222358ebe9 [ 919.148799][T18980] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000008 [ 919.156915][T18980] RBP: 00007f22243e6090 R08: 0000000000000000 R09: 0000000000000000 [ 919.164907][T18980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 919.172900][T18980] R13: 00007f22237c6128 R14: 00007f22237c6090 R15: 00007ffdddca7478 [ 919.180917][T18980] [ 919.288732][T18985] device pim6reg1 entered promiscuous mode [ 919.665185][T19005] device pim6reg1 entered promiscuous mode [ 920.298140][T19021] device veth0_vlan left promiscuous mode [ 920.357418][T19021] device veth0_vlan entered promiscuous mode [ 920.410728][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 920.430070][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 920.459129][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 921.006669][ T28] audit: type=1400 audit(1756881282.336:132): avc: denied { create } for pid=19046 comm="syz.1.6059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 921.034287][T19051] device pim6reg1 entered promiscuous mode [ 921.195919][T19055] device pim6reg1 entered promiscuous mode [ 921.424054][T19060] FAULT_INJECTION: forcing a failure. [ 921.424054][T19060] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 921.450768][T19060] CPU: 1 PID: 19060 Comm: syz.0.6064 Not tainted syzkaller #0 [ 921.458341][T19060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 921.468519][T19060] Call Trace: [ 921.471940][T19060] [ 921.474894][T19060] __dump_stack+0x21/0x24 [ 921.479265][T19060] dump_stack_lvl+0xee/0x150 [ 921.483986][T19060] ? __cfi_dump_stack_lvl+0x8/0x8 [ 921.489067][T19060] dump_stack+0x15/0x24 [ 921.493617][T19060] should_fail_ex+0x3d4/0x520 [ 921.498337][T19060] should_fail+0xb/0x10 [ 921.502658][T19060] should_fail_usercopy+0x1a/0x20 [ 921.507733][T19060] _copy_from_user+0x1e/0xc0 [ 921.512406][T19060] __sys_bpf+0x277/0x780 [ 921.516691][T19060] ? bpf_link_show_fdinfo+0x320/0x320 [ 921.522104][T19060] ? __cfi_ksys_write+0x10/0x10 [ 921.527010][T19060] ? debug_smp_processor_id+0x17/0x20 [ 921.532422][T19060] __x64_sys_bpf+0x7c/0x90 [ 921.536889][T19060] x64_sys_call+0x488/0x9a0 [ 921.541424][T19060] do_syscall_64+0x4c/0xa0 [ 921.545890][T19060] ? clear_bhb_loop+0x30/0x80 [ 921.550697][T19060] ? clear_bhb_loop+0x30/0x80 [ 921.555457][T19060] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 921.561477][T19060] RIP: 0033:0x7fe13ed8ebe9 [ 921.565918][T19060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 921.585663][T19060] RSP: 002b:00007fe13d7f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 921.594121][T19060] RAX: ffffffffffffffda RBX: 00007fe13efc5fa0 RCX: 00007fe13ed8ebe9 [ 921.602144][T19060] RDX: 0000000000000038 RSI: 0000200000000080 RDI: 0000000000000018 [ 921.610164][T19060] RBP: 00007fe13d7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 921.619105][T19060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 921.627370][T19060] R13: 00007fe13efc6038 R14: 00007fe13efc5fa0 R15: 00007ffc626e1b58 [ 921.635513][T19060] [ 921.981909][T19080] bridge0: port 3(dummy0) entered disabled state [ 921.988402][T19080] bridge0: port 2(bridge_slave_1) entered disabled state [ 921.995574][T19080] bridge0: port 1(bridge_slave_0) entered disabled state [ 922.058904][T19082] FAULT_INJECTION: forcing a failure. [ 922.058904][T19082] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 922.104921][T19082] CPU: 1 PID: 19082 Comm: syz.3.6071 Not tainted syzkaller #0 [ 922.112453][T19082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 922.122535][T19082] Call Trace: [ 922.125848][T19082] [ 922.128806][T19082] __dump_stack+0x21/0x24 [ 922.133170][T19082] dump_stack_lvl+0xee/0x150 [ 922.137789][T19082] ? __cfi_dump_stack_lvl+0x8/0x8 [ 922.142857][T19082] dump_stack+0x15/0x24 [ 922.147033][T19082] should_fail_ex+0x3d4/0x520 [ 922.151753][T19082] should_fail+0xb/0x10 [ 922.155951][T19082] should_fail_usercopy+0x1a/0x20 [ 922.161019][T19082] _copy_from_user+0x1e/0xc0 [ 922.165653][T19082] br_ioctl_stub+0x358/0x880 [ 922.170289][T19082] ? __cfi_br_ioctl_stub+0x10/0x10 [ 922.175523][T19082] ? vfs_write+0x9d6/0xca0 [ 922.179965][T19082] ? __kasan_check_write+0x14/0x20 [ 922.185109][T19082] ? mutex_lock+0x8d/0x1a0 [ 922.189559][T19082] ? __cfi_mutex_lock+0x10/0x10 [ 922.194433][T19082] ? selinux_file_ioctl+0x377/0x480 [ 922.199763][T19082] ? __cfi_br_ioctl_stub+0x10/0x10 [ 922.204916][T19082] sock_ioctl+0x304/0x6e0 [ 922.209277][T19082] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 922.215559][T19082] ? __cfi_sock_ioctl+0x10/0x10 [ 922.220445][T19082] ? security_file_ioctl+0x95/0xc0 [ 922.225703][T19082] ? __cfi_sock_ioctl+0x10/0x10 [ 922.230612][T19082] __se_sys_ioctl+0x12f/0x1b0 [ 922.235344][T19082] __x64_sys_ioctl+0x7b/0x90 [ 922.239956][T19082] x64_sys_call+0x58b/0x9a0 [ 922.244490][T19082] do_syscall_64+0x4c/0xa0 [ 922.248931][T19082] ? clear_bhb_loop+0x30/0x80 [ 922.253656][T19082] ? clear_bhb_loop+0x30/0x80 [ 922.258375][T19082] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 922.264305][T19082] RIP: 0033:0x7f222358ebe9 [ 922.268760][T19082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 922.288574][T19082] RSP: 002b:00007f22243e6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 922.297045][T19082] RAX: ffffffffffffffda RBX: 00007f22237c6090 RCX: 00007f222358ebe9 [ 922.305048][T19082] RDX: 0000200000000900 RSI: 00000000000089a1 RDI: 0000000000000007 [ 922.313591][T19082] RBP: 00007f22243e6090 R08: 0000000000000000 R09: 0000000000000000 [ 922.321601][T19082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 922.329608][T19082] R13: 00007f22237c6128 R14: 00007f22237c6090 R15: 00007ffdddca7478 [ 922.337622][T19082] [ 923.267573][T19103] FAULT_INJECTION: forcing a failure. [ 923.267573][T19103] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 923.362044][T19103] CPU: 1 PID: 19103 Comm: syz.4.6078 Not tainted syzkaller #0 [ 923.369604][T19103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 923.379703][T19103] Call Trace: [ 923.383006][T19103] [ 923.386149][T19103] __dump_stack+0x21/0x24 [ 923.390504][T19103] dump_stack_lvl+0xee/0x150 [ 923.395127][T19103] ? __cfi_dump_stack_lvl+0x8/0x8 [ 923.400305][T19103] dump_stack+0x15/0x24 [ 923.404486][T19103] should_fail_ex+0x3d4/0x520 [ 923.409199][T19103] should_fail+0xb/0x10 [ 923.413399][T19103] should_fail_usercopy+0x1a/0x20 [ 923.418471][T19103] _copy_from_user+0x1e/0xc0 [ 923.423188][T19103] sock_do_ioctl+0x186/0x310 [ 923.427816][T19103] ? sock_show_fdinfo+0xb0/0xb0 [ 923.432788][T19103] ? selinux_file_ioctl+0x377/0x480 [ 923.438050][T19103] sock_ioctl+0x4d8/0x6e0 [ 923.442457][T19103] ? __cfi_sock_ioctl+0x10/0x10 [ 923.447340][T19103] ? __fget_files+0x2d5/0x330 [ 923.452068][T19103] ? security_file_ioctl+0x95/0xc0 [ 923.457244][T19103] ? __cfi_sock_ioctl+0x10/0x10 [ 923.462124][T19103] __se_sys_ioctl+0x12f/0x1b0 [ 923.467003][T19103] __x64_sys_ioctl+0x7b/0x90 [ 923.471785][T19103] x64_sys_call+0x58b/0x9a0 [ 923.476345][T19103] do_syscall_64+0x4c/0xa0 [ 923.480914][T19103] ? clear_bhb_loop+0x30/0x80 [ 923.485694][T19103] ? clear_bhb_loop+0x30/0x80 [ 923.490411][T19103] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 923.496383][T19103] RIP: 0033:0x7fc0ed58ebe9 [ 923.500845][T19103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 923.520487][T19103] RSP: 002b:00007fc0ee34e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 923.529115][T19103] RAX: ffffffffffffffda RBX: 00007fc0ed7c5fa0 RCX: 00007fc0ed58ebe9 [ 923.537338][T19103] RDX: 0000200000000080 RSI: 0000000000008922 RDI: 0000000000000006 [ 923.545355][T19103] RBP: 00007fc0ee34e090 R08: 0000000000000000 R09: 0000000000000000 [ 923.553542][T19103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 923.561563][T19103] R13: 00007fc0ed7c6038 R14: 00007fc0ed7c5fa0 R15: 00007ffc2062ccd8 [ 923.569628][T19103] [ 924.142830][T19113] device pim6reg1 entered promiscuous mode [ 924.696712][T19130] device pim6reg1 entered promiscuous mode [ 924.751030][T19136] bond_slave_1: mtu less than device minimum [ 924.818554][T19139] FAULT_INJECTION: forcing a failure. [ 924.818554][T19139] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 924.861291][T19139] CPU: 1 PID: 19139 Comm: syz.3.6089 Not tainted syzkaller #0 [ 924.868906][T19139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 924.879073][T19139] Call Trace: [ 924.882371][T19139] [ 924.885321][T19139] __dump_stack+0x21/0x24 [ 924.889672][T19139] dump_stack_lvl+0xee/0x150 [ 924.894367][T19139] ? __cfi_dump_stack_lvl+0x8/0x8 [ 924.899416][T19139] dump_stack+0x15/0x24 [ 924.903587][T19139] should_fail_ex+0x3d4/0x520 [ 924.908347][T19139] should_fail+0xb/0x10 [ 924.912732][T19139] should_fail_usercopy+0x1a/0x20 [ 924.917796][T19139] _copy_from_user+0x1e/0xc0 [ 924.922414][T19139] __sys_bpf+0x277/0x780 [ 924.926673][T19139] ? bpf_link_show_fdinfo+0x320/0x320 [ 924.932160][T19139] ? __cfi_ksys_write+0x10/0x10 [ 924.937027][T19139] ? debug_smp_processor_id+0x17/0x20 [ 924.942417][T19139] __x64_sys_bpf+0x7c/0x90 [ 924.946860][T19139] x64_sys_call+0x488/0x9a0 [ 924.951432][T19139] do_syscall_64+0x4c/0xa0 [ 924.956065][T19139] ? clear_bhb_loop+0x30/0x80 [ 924.960848][T19139] ? clear_bhb_loop+0x30/0x80 [ 924.965539][T19139] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 924.971498][T19139] RIP: 0033:0x7f222358ebe9 [ 924.975930][T19139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 924.995716][T19139] RSP: 002b:00007f2224407038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 925.004227][T19139] RAX: ffffffffffffffda RBX: 00007f22237c5fa0 RCX: 00007f222358ebe9 [ 925.012205][T19139] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 925.020183][T19139] RBP: 00007f2224407090 R08: 0000000000000000 R09: 0000000000000000 [ 925.028174][T19139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 925.036177][T19139] R13: 00007f22237c6038 R14: 00007f22237c5fa0 R15: 00007ffdddca7478 [ 925.044388][T19139] [ 925.565550][T19147] device pim6reg1 entered promiscuous mode [ 926.998741][ T28] audit: type=1400 audit(1756881288.326:133): avc: denied { create } for pid=19172 comm="syz.3.6100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 928.225821][T19196] device pim6reg1 entered promiscuous mode [ 928.603200][T19212] device pim6reg1 entered promiscuous mode [ 928.871424][T19221] device pim6reg1 entered promiscuous mode [ 929.086510][T19224] device pim6reg1 entered promiscuous mode [ 929.104438][T19229] device veth0_vlan left promiscuous mode [ 929.129221][T19229] device veth0_vlan entered promiscuous mode [ 929.445961][T19242] FAULT_INJECTION: forcing a failure. [ 929.445961][T19242] name failslab, interval 1, probability 0, space 0, times 0 [ 929.473185][T19242] CPU: 0 PID: 19242 Comm: syz.2.6120 Not tainted syzkaller #0 [ 929.480795][T19242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 929.491076][T19242] Call Trace: [ 929.494476][T19242] [ 929.497440][T19242] __dump_stack+0x21/0x24 [ 929.501802][T19242] dump_stack_lvl+0xee/0x150 [ 929.506442][T19242] ? __cfi_dump_stack_lvl+0x8/0x8 [ 929.511522][T19242] dump_stack+0x15/0x24 [ 929.515705][T19242] should_fail_ex+0x3d4/0x520 [ 929.520424][T19242] __should_failslab+0xac/0xf0 [ 929.525222][T19242] ? slhc_init+0x77/0x770 [ 929.529590][T19242] should_failslab+0x9/0x20 [ 929.534118][T19242] __kmem_cache_alloc_node+0x3d/0x2c0 [ 929.539530][T19242] ? security_file_permission+0x94/0xb0 [ 929.545117][T19242] ? slhc_init+0x77/0x770 [ 929.549530][T19242] kmalloc_trace+0x29/0xb0 [ 929.554037][T19242] slhc_init+0x77/0x770 [ 929.558262][T19242] ppp_ioctl+0x126d/0x1690 [ 929.562726][T19242] ? mutex_unlock+0x89/0x220 [ 929.567356][T19242] ? __cfi_mutex_unlock+0x10/0x10 [ 929.572419][T19242] ? __cfi_ppp_ioctl+0x10/0x10 [ 929.577232][T19242] ? __fget_files+0x2d5/0x330 [ 929.581947][T19242] ? security_file_ioctl+0x95/0xc0 [ 929.587098][T19242] ? __cfi_ppp_ioctl+0x10/0x10 [ 929.591907][T19242] __se_sys_ioctl+0x12f/0x1b0 [ 929.596649][T19242] __x64_sys_ioctl+0x7b/0x90 [ 929.601278][T19242] x64_sys_call+0x58b/0x9a0 [ 929.605978][T19242] do_syscall_64+0x4c/0xa0 [ 929.610433][T19242] ? clear_bhb_loop+0x30/0x80 [ 929.615173][T19242] ? clear_bhb_loop+0x30/0x80 [ 929.619987][T19242] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 929.625937][T19242] RIP: 0033:0x7f6afd98ebe9 [ 929.630388][T19242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 929.650121][T19242] RSP: 002b:00007f6afe8f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 929.658664][T19242] RAX: ffffffffffffffda RBX: 00007f6afdbc5fa0 RCX: 00007f6afd98ebe9 [ 929.666761][T19242] RDX: 0000200000000180 RSI: 0000000040047451 RDI: 0000000000000003 [ 929.674775][T19242] RBP: 00007f6afe8f0090 R08: 0000000000000000 R09: 0000000000000000 [ 929.682782][T19242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 929.690784][T19242] R13: 00007f6afdbc6038 R14: 00007f6afdbc5fa0 R15: 00007ffe3a92b8c8 [ 929.698792][T19242] [ 930.313379][T19262] device veth0_vlan left promiscuous mode [ 930.357581][T19262] device veth0_vlan entered promiscuous mode [ 931.294253][T19281] FAULT_INJECTION: forcing a failure. [ 931.294253][T19281] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 931.373966][T19281] CPU: 0 PID: 19281 Comm: syz.4.6133 Not tainted syzkaller #0 [ 931.381673][T19281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 931.391972][T19281] Call Trace: [ 931.395275][T19281] [ 931.398494][T19281] __dump_stack+0x21/0x24 [ 931.402984][T19281] dump_stack_lvl+0xee/0x150 [ 931.407624][T19281] ? __cfi_dump_stack_lvl+0x8/0x8 [ 931.412697][T19281] dump_stack+0x15/0x24 [ 931.416898][T19281] should_fail_ex+0x3d4/0x520 [ 931.421712][T19281] should_fail+0xb/0x10 [ 931.425934][T19281] should_fail_usercopy+0x1a/0x20 [ 931.431006][T19281] _copy_to_user+0x1e/0x90 [ 931.435487][T19281] simple_read_from_buffer+0xe9/0x160 [ 931.440909][T19281] proc_fail_nth_read+0x19a/0x210 [ 931.445976][T19281] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 931.451566][T19281] ? security_file_permission+0x94/0xb0 [ 931.457155][T19281] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 931.462846][T19281] vfs_read+0x26e/0x8c0 [ 931.467049][T19281] ? __cfi_vfs_read+0x10/0x10 [ 931.471949][T19281] ? __kasan_check_write+0x14/0x20 [ 931.477127][T19281] ? mutex_lock+0x8d/0x1a0 [ 931.481583][T19281] ? __cfi_mutex_lock+0x10/0x10 [ 931.486467][T19281] ? __fdget_pos+0x2cd/0x380 [ 931.491119][T19281] ? ksys_read+0x71/0x240 [ 931.495481][T19281] ksys_read+0x140/0x240 [ 931.499832][T19281] ? __cfi_ksys_read+0x10/0x10 [ 931.504699][T19281] ? fpregs_restore_userregs+0x128/0x260 [ 931.510361][T19281] __x64_sys_read+0x7b/0x90 [ 931.514882][T19281] x64_sys_call+0x2f/0x9a0 [ 931.519306][T19281] do_syscall_64+0x4c/0xa0 [ 931.523727][T19281] ? clear_bhb_loop+0x30/0x80 [ 931.528521][T19281] ? clear_bhb_loop+0x30/0x80 [ 931.533250][T19281] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 931.539162][T19281] RIP: 0033:0x7fc0ed58d5fc [ 931.543694][T19281] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 931.563503][T19281] RSP: 002b:00007fc0ee34e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 931.572016][T19281] RAX: ffffffffffffffda RBX: 00007fc0ed7c5fa0 RCX: 00007fc0ed58d5fc [ 931.580083][T19281] RDX: 000000000000000f RSI: 00007fc0ee34e0a0 RDI: 0000000000000009 [ 931.588155][T19281] RBP: 00007fc0ee34e090 R08: 0000000000000000 R09: 0000000000000000 [ 931.596218][T19281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 931.604247][T19281] R13: 00007fc0ed7c6038 R14: 00007fc0ed7c5fa0 R15: 00007ffc2062ccd8 [ 931.612348][T19281] [ 934.649714][T19345] device pim6reg1 entered promiscuous mode [ 934.726939][T19350] device pim6reg1 entered promiscuous mode [ 934.914514][T19361] FAULT_INJECTION: forcing a failure. [ 934.914514][T19361] name failslab, interval 1, probability 0, space 0, times 0 [ 934.914797][T19359] device pim6reg1 entered promiscuous mode [ 934.927661][T19361] CPU: 1 PID: 19361 Comm: syz.1.6160 Not tainted syzkaller #0 [ 934.941472][T19361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 934.951583][T19361] Call Trace: [ 934.954900][T19361] [ 934.957866][T19361] __dump_stack+0x21/0x24 [ 934.962231][T19361] dump_stack_lvl+0xee/0x150 [ 934.966949][T19361] ? __cfi_dump_stack_lvl+0x8/0x8 [ 934.972185][T19361] ? stack_trace_save+0x98/0xe0 [ 934.977162][T19361] dump_stack+0x15/0x24 [ 934.981351][T19361] should_fail_ex+0x3d4/0x520 [ 934.986098][T19361] __should_failslab+0xac/0xf0 [ 934.990890][T19361] should_failslab+0x9/0x20 [ 934.995480][T19361] kmem_cache_alloc_node+0x42/0x340 [ 935.000750][T19361] ? dup_task_struct+0x5a/0x790 [ 935.005659][T19361] dup_task_struct+0x5a/0x790 [ 935.010758][T19361] ? __kasan_check_write+0x14/0x20 [ 935.016112][T19361] ? recalc_sigpending+0x168/0x1c0 [ 935.021353][T19361] copy_process+0x5b8/0x3480 [ 935.026074][T19361] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 935.032022][T19361] ? __kasan_check_write+0x14/0x20 [ 935.037270][T19361] ? idle_dummy+0x10/0x10 [ 935.041652][T19361] kernel_clone+0x23a/0x810 [ 935.046198][T19361] ? __cfi_kernel_clone+0x10/0x10 [ 935.051423][T19361] ? __kasan_check_write+0x14/0x20 [ 935.056752][T19361] ? mutex_unlock+0x89/0x220 [ 935.061554][T19361] __x64_sys_clone+0x168/0x1b0 [ 935.066419][T19361] ? __cfi___x64_sys_clone+0x10/0x10 [ 935.071788][T19361] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 935.077896][T19361] x64_sys_call+0x990/0x9a0 [ 935.082622][T19361] do_syscall_64+0x4c/0xa0 [ 935.087071][T19361] ? clear_bhb_loop+0x30/0x80 [ 935.091777][T19361] ? clear_bhb_loop+0x30/0x80 [ 935.096671][T19361] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 935.102683][T19361] RIP: 0033:0x7f573878ebe9 [ 935.107311][T19361] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 935.127293][T19361] RSP: 002b:00007f5739659fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 935.135847][T19361] RAX: ffffffffffffffda RBX: 00007f57389c5fa0 RCX: 00007f573878ebe9 [ 935.143880][T19361] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 935.151884][T19361] RBP: 00007f573965a090 R08: 0000000000000000 R09: 0000000000000000 [ 935.159899][T19361] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 935.168010][T19361] R13: 00007f57389c6038 R14: 00007f57389c5fa0 R15: 00007ffdc4d38a98 [ 935.176256][T19361] [ 935.318548][T19371] device veth0_vlan left promiscuous mode [ 935.343664][T19371] device veth0_vlan entered promiscuous mode [ 935.384193][T19374] device pim6reg1 entered promiscuous mode [ 935.553755][T19378] device pim6reg1 entered promiscuous mode [ 936.163855][T19395] device syzkaller0 entered promiscuous mode [ 936.164966][T19398] FAULT_INJECTION: forcing a failure. [ 936.164966][T19398] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 936.309179][T19398] CPU: 0 PID: 19398 Comm: syz.0.6176 Not tainted syzkaller #0 [ 936.316729][T19398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 936.326825][T19398] Call Trace: [ 936.330350][T19398] [ 936.333310][T19398] __dump_stack+0x21/0x24 [ 936.337674][T19398] dump_stack_lvl+0xee/0x150 [ 936.342445][T19398] ? __cfi_dump_stack_lvl+0x8/0x8 [ 936.347527][T19398] dump_stack+0x15/0x24 [ 936.351733][T19398] should_fail_ex+0x3d4/0x520 [ 936.356551][T19398] should_fail_alloc_page+0x61/0x90 [ 936.361926][T19398] prepare_alloc_pages+0x148/0x5f0 [ 936.367180][T19398] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 936.372457][T19398] ? _parse_integer+0x2a/0x40 [ 936.377327][T19398] __alloc_pages+0x124/0x450 [ 936.381964][T19398] ? kstrtouint+0x74/0xe0 [ 936.386424][T19398] ? __cfi___alloc_pages+0x10/0x10 [ 936.391600][T19398] ? kstrtouint_from_user+0xf7/0x150 [ 936.396941][T19398] __get_free_pages+0xe/0x30 [ 936.401579][T19398] mem_rw+0x8a/0x600 [ 936.405527][T19398] ? security_file_permission+0x8a/0xb0 [ 936.411124][T19398] mem_write+0x33/0x40 [ 936.415336][T19398] ? __cfi_mem_write+0x10/0x10 [ 936.420142][T19398] vfs_write+0x40c/0xca0 [ 936.424432][T19398] ? slab_free_freelist_hook+0xc2/0x190 [ 936.430186][T19398] ? __cfi_vfs_write+0x10/0x10 [ 936.435098][T19398] ? __kasan_check_write+0x14/0x20 [ 936.440345][T19398] ? mutex_lock+0x8d/0x1a0 [ 936.444797][T19398] ? __cfi_mutex_lock+0x10/0x10 [ 936.449687][T19398] ? __fdget_pos+0x2cd/0x380 [ 936.454321][T19398] ? ksys_write+0x71/0x240 [ 936.459134][T19398] ksys_write+0x140/0x240 [ 936.463944][T19398] ? __cfi_ksys_write+0x10/0x10 [ 936.468841][T19398] ? debug_smp_processor_id+0x17/0x20 [ 936.474463][T19398] __x64_sys_write+0x7b/0x90 [ 936.479211][T19398] x64_sys_call+0x27b/0x9a0 [ 936.483770][T19398] do_syscall_64+0x4c/0xa0 [ 936.488323][T19398] ? clear_bhb_loop+0x30/0x80 [ 936.493040][T19398] ? clear_bhb_loop+0x30/0x80 [ 936.497761][T19398] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 936.503703][T19398] RIP: 0033:0x7fe13ed8ebe9 [ 936.508193][T19398] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 936.528099][T19398] RSP: 002b:00007fe13d7f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 936.536562][T19398] RAX: ffffffffffffffda RBX: 00007fe13efc5fa0 RCX: 00007fe13ed8ebe9 [ 936.544553][T19398] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 936.552580][T19398] RBP: 00007fe13d7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 936.560671][T19398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 936.568653][T19398] R13: 00007fe13efc6038 R14: 00007fe13efc5fa0 R15: 00007ffc626e1b58 [ 936.576910][T19398] [ 936.726859][T19407] device pim6reg1 entered promiscuous mode [ 936.751490][T19416] device pim6reg1 entered promiscuous mode [ 936.874252][T19426] device veth0_vlan left promiscuous mode [ 936.910870][T19426] device veth0_vlan entered promiscuous mode [ 937.047586][T19436] device pim6reg1 entered promiscuous mode [ 937.435692][T19443] device pim6reg1 entered promiscuous mode [ 937.774756][T19458] device sit0 entered promiscuous mode [ 938.142350][T19469] device pim6reg1 entered promiscuous mode [ 938.402339][T19473] device pim6reg1 entered promiscuous mode [ 938.601019][T19480] bridge0: port 1(bridge_slave_0) entered blocking state [ 938.608256][T19480] bridge0: port 1(bridge_slave_0) entered disabled state [ 938.616448][T19480] device bridge_slave_0 entered promiscuous mode [ 938.624105][T19480] bridge0: port 2(bridge_slave_1) entered blocking state [ 938.631286][T19480] bridge0: port 2(bridge_slave_1) entered disabled state [ 938.639121][T19480] device bridge_slave_1 entered promiscuous mode [ 938.721944][T19480] bridge0: port 2(bridge_slave_1) entered blocking state [ 938.729056][T19480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 938.736398][T19480] bridge0: port 1(bridge_slave_0) entered blocking state [ 938.743532][T19480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 938.824072][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 938.832198][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 938.879093][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 938.891829][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 938.908864][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 938.917609][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 938.926685][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 938.933892][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 938.941635][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 938.950638][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 938.959144][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 938.966319][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 938.999811][T19480] device veth0_vlan entered promiscuous mode [ 939.014664][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 939.022921][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 939.031404][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 939.040647][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 939.049308][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 939.058074][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 939.066977][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 939.075255][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 939.083417][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 939.091880][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 939.100328][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 939.108119][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 939.116906][T19480] device veth1_macvtap entered promiscuous mode [ 939.132688][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 939.140769][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 939.149341][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 939.159649][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 939.168234][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 939.222012][T19510] device veth0_vlan left promiscuous mode [ 939.240241][T19510] device veth0_vlan entered promiscuous mode [ 939.666742][ T342] device dummy0 left promiscuous mode [ 939.672492][ T342] bridge0: port 3(dummy0) entered disabled state [ 939.708325][ T342] device bridge_slave_1 left promiscuous mode [ 939.807461][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 939.856784][ T342] device bridge_slave_0 left promiscuous mode [ 939.937783][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 940.008882][ T342] device veth1_macvtap left promiscuous mode [ 940.294383][T19543] FAULT_INJECTION: forcing a failure. [ 940.294383][T19543] name failslab, interval 1, probability 0, space 0, times 0 [ 940.307836][T19543] CPU: 0 PID: 19543 Comm: syz.0.6216 Not tainted syzkaller #0 [ 940.315443][T19543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 940.325515][T19543] Call Trace: [ 940.328936][T19543] [ 940.331870][T19543] __dump_stack+0x21/0x24 [ 940.336211][T19543] dump_stack_lvl+0xee/0x150 [ 940.340820][T19543] ? __cfi_dump_stack_lvl+0x8/0x8 [ 940.345870][T19543] ? stack_trace_save+0x98/0xe0 [ 940.350734][T19543] dump_stack+0x15/0x24 [ 940.354899][T19543] should_fail_ex+0x3d4/0x520 [ 940.359586][T19543] __should_failslab+0xac/0xf0 [ 940.364394][T19543] should_failslab+0x9/0x20 [ 940.369161][T19543] kmem_cache_alloc_node+0x42/0x340 [ 940.374433][T19543] ? dup_task_struct+0x5a/0x790 [ 940.379417][T19543] dup_task_struct+0x5a/0x790 [ 940.384302][T19543] ? __kasan_check_write+0x14/0x20 [ 940.389447][T19543] ? recalc_sigpending+0x168/0x1c0 [ 940.394601][T19543] copy_process+0x5b8/0x3480 [ 940.399220][T19543] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 940.405022][T19543] ? __kasan_check_write+0x14/0x20 [ 940.410290][T19543] ? idle_dummy+0x10/0x10 [ 940.414643][T19543] kernel_clone+0x23a/0x810 [ 940.419171][T19543] ? __cfi_kernel_clone+0x10/0x10 [ 940.424305][T19543] ? __kasan_check_write+0x14/0x20 [ 940.429437][T19543] ? mutex_unlock+0x89/0x220 [ 940.434047][T19543] __x64_sys_clone+0x168/0x1b0 [ 940.438864][T19543] ? __cfi___x64_sys_clone+0x10/0x10 [ 940.444228][T19543] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 940.450349][T19543] x64_sys_call+0x990/0x9a0 [ 940.454939][T19543] do_syscall_64+0x4c/0xa0 [ 940.459363][T19543] ? clear_bhb_loop+0x30/0x80 [ 940.464163][T19543] ? clear_bhb_loop+0x30/0x80 [ 940.468859][T19543] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 940.474866][T19543] RIP: 0033:0x7fe13ed8ebe9 [ 940.479306][T19543] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 940.498942][T19543] RSP: 002b:00007fe13d7f6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 940.507382][T19543] RAX: ffffffffffffffda RBX: 00007fe13efc5fa0 RCX: 00007fe13ed8ebe9 [ 940.515365][T19543] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 940.523346][T19543] RBP: 00007fe13d7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 940.531334][T19543] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 940.539405][T19543] R13: 00007fe13efc6038 R14: 00007fe13efc5fa0 R15: 00007ffc626e1b58 [ 940.547395][T19543] [ 940.557463][T19530] device sit0 left promiscuous mode [ 940.599150][T19549] device veth0_vlan left promiscuous mode [ 940.611666][T19549] device veth0_vlan entered promiscuous mode [ 940.633019][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 940.644609][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 940.662146][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 941.170396][T19562] device pim6reg1 entered promiscuous mode [ 941.554169][T19574] device pim6reg1 entered promiscuous mode [ 941.657707][T19580] device pim6reg1 entered promiscuous mode [ 941.849653][T19584] bridge0: port 1(bridge_slave_0) entered blocking state [ 941.874661][T19584] bridge0: port 1(bridge_slave_0) entered disabled state [ 941.938567][T19584] device bridge_slave_0 entered promiscuous mode [ 942.000381][T19584] bridge0: port 2(bridge_slave_1) entered blocking state [ 942.072735][T19584] bridge0: port 2(bridge_slave_1) entered disabled state [ 942.094505][T19584] device bridge_slave_1 entered promiscuous mode [ 942.500484][T19605] device pim6reg1 entered promiscuous mode [ 942.567404][T19584] bridge0: port 2(bridge_slave_1) entered blocking state [ 942.574658][T19584] bridge0: port 2(bridge_slave_1) entered forwarding state [ 942.582051][T19584] bridge0: port 1(bridge_slave_0) entered blocking state [ 942.589269][T19584] bridge0: port 1(bridge_slave_0) entered forwarding state [ 942.688455][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 942.704827][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 942.859396][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 942.871410][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 942.926245][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 942.941429][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 942.953611][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 942.960928][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 942.970963][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 942.989454][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 943.009699][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 943.016963][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 943.026286][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 943.034607][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 943.042837][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 943.051334][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 943.077028][ T342] device bridge_slave_1 left promiscuous mode [ 943.083418][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 943.093274][ T342] device bridge_slave_0 left promiscuous mode [ 943.099557][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 943.118910][ T342] device veth1_macvtap left promiscuous mode [ 943.250451][T19634] device pim6reg1 entered promiscuous mode [ 943.257131][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 943.267089][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 943.285924][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 943.300095][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 943.346463][T19584] device veth0_vlan entered promiscuous mode [ 943.354687][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 943.362649][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 943.393687][T19584] device veth1_macvtap entered promiscuous mode [ 943.401769][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 943.411264][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 943.419831][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 943.440567][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 943.461800][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 943.478823][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 943.500633][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 943.559802][T19647] device pim6reg1 entered promiscuous mode [ 943.725856][T19656] bridge0: port 1(bridge_slave_0) entered disabled state [ 944.097749][T19672] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 944.152910][T19677] FAULT_INJECTION: forcing a failure. [ 944.152910][T19677] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 944.157821][T19672] device syzkaller0 entered promiscuous mode [ 944.205753][T19674] device pim6reg1 entered promiscuous mode [ 944.293028][T19677] CPU: 0 PID: 19677 Comm: syz.0.6256 Not tainted syzkaller #0 [ 944.301180][T19677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 944.311264][T19677] Call Trace: [ 944.314570][T19677] [ 944.318045][T19677] __dump_stack+0x21/0x24 [ 944.322491][T19677] dump_stack_lvl+0xee/0x150 [ 944.327122][T19677] ? __cfi_dump_stack_lvl+0x8/0x8 [ 944.332192][T19677] dump_stack+0x15/0x24 [ 944.336376][T19677] should_fail_ex+0x3d4/0x520 [ 944.341100][T19677] should_fail+0xb/0x10 [ 944.345299][T19677] should_fail_usercopy+0x1a/0x20 [ 944.350364][T19677] _copy_from_user+0x1e/0xc0 [ 944.354979][T19677] sock_do_ioctl+0x186/0x310 [ 944.359679][T19677] ? sock_show_fdinfo+0xb0/0xb0 [ 944.364545][T19677] ? selinux_file_ioctl+0x377/0x480 [ 944.369759][T19677] sock_ioctl+0x4d8/0x6e0 [ 944.374116][T19677] ? __cfi_sock_ioctl+0x10/0x10 [ 944.378979][T19677] ? __fget_files+0x2d5/0x330 [ 944.383668][T19677] ? security_file_ioctl+0x95/0xc0 [ 944.388814][T19677] ? __cfi_sock_ioctl+0x10/0x10 [ 944.393679][T19677] __se_sys_ioctl+0x12f/0x1b0 [ 944.398366][T19677] __x64_sys_ioctl+0x7b/0x90 [ 944.402963][T19677] x64_sys_call+0x58b/0x9a0 [ 944.407493][T19677] do_syscall_64+0x4c/0xa0 [ 944.411930][T19677] ? clear_bhb_loop+0x30/0x80 [ 944.416617][T19677] ? clear_bhb_loop+0x30/0x80 [ 944.421324][T19677] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 944.427316][T19677] RIP: 0033:0x7fe13ed8ebe9 [ 944.432017][T19677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 944.451655][T19677] RSP: 002b:00007fe13d7d6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 944.460176][T19677] RAX: ffffffffffffffda RBX: 00007fe13efc6090 RCX: 00007fe13ed8ebe9 [ 944.468266][T19677] RDX: 0000200000002280 RSI: 0000000000008943 RDI: 0000000000000004 [ 944.476261][T19677] RBP: 00007fe13d7d6090 R08: 0000000000000000 R09: 0000000000000000 [ 944.484280][T19677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 944.492346][T19677] R13: 00007fe13efc6128 R14: 00007fe13efc6090 R15: 00007ffc626e1b58 [ 944.500416][T19677] [ 944.507990][T19680] device pim6reg1 entered promiscuous mode [ 944.553596][T19680] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 944.572486][T19680] device syzkaller0 entered promiscuous mode [ 945.595109][T19726] device pim6reg1 entered promiscuous mode [ 945.780745][T19733] device pim6reg1 entered promiscuous mode [ 945.807162][T19735] FAULT_INJECTION: forcing a failure. [ 945.807162][T19735] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 945.879725][T19735] CPU: 0 PID: 19735 Comm: syz.4.6277 Not tainted syzkaller #0 [ 945.887343][T19735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 945.897455][T19735] Call Trace: [ 945.900756][T19735] [ 945.903723][T19735] __dump_stack+0x21/0x24 [ 945.908096][T19735] dump_stack_lvl+0xee/0x150 [ 945.912752][T19735] ? __cfi_dump_stack_lvl+0x8/0x8 [ 945.917921][T19735] dump_stack+0x15/0x24 [ 945.922091][T19735] should_fail_ex+0x3d4/0x520 [ 945.926806][T19735] should_fail+0xb/0x10 [ 945.930987][T19735] should_fail_usercopy+0x1a/0x20 [ 945.936081][T19735] _copy_from_user+0x1e/0xc0 [ 945.940786][T19735] __sys_bpf+0x277/0x780 [ 945.945046][T19735] ? bpf_link_show_fdinfo+0x320/0x320 [ 945.950546][T19735] ? irqentry_exit+0x37/0x40 [ 945.955164][T19735] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 945.961003][T19735] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 945.967205][T19735] __x64_sys_bpf+0x7c/0x90 [ 945.971683][T19735] x64_sys_call+0x488/0x9a0 [ 945.976290][T19735] do_syscall_64+0x4c/0xa0 [ 945.980723][T19735] ? clear_bhb_loop+0x30/0x80 [ 945.985413][T19735] ? clear_bhb_loop+0x30/0x80 [ 945.990102][T19735] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 945.996003][T19735] RIP: 0033:0x7fc0ed58ebe9 [ 946.000423][T19735] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 946.020242][T19735] RSP: 002b:00007fc0ee34e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 946.028749][T19735] RAX: ffffffffffffffda RBX: 00007fc0ed7c5fa0 RCX: 00007fc0ed58ebe9 [ 946.036729][T19735] RDX: 0000000000000050 RSI: 0000200000000640 RDI: 000000000000000a [ 946.044707][T19735] RBP: 00007fc0ee34e090 R08: 0000000000000000 R09: 0000000000000000 [ 946.052682][T19735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 946.060747][T19735] R13: 00007fc0ed7c6038 R14: 00007fc0ed7c5fa0 R15: 00007ffc2062ccd8 [ 946.068735][T19735] [ 946.979837][T19779] FAULT_INJECTION: forcing a failure. [ 946.979837][T19779] name failslab, interval 1, probability 0, space 0, times 0 [ 946.993255][T19779] CPU: 0 PID: 19779 Comm: syz.1.6291 Not tainted syzkaller #0 [ 947.000763][T19779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 947.010838][T19779] Call Trace: [ 947.014142][T19779] [ 947.017109][T19779] __dump_stack+0x21/0x24 [ 947.021461][T19779] dump_stack_lvl+0xee/0x150 [ 947.026083][T19779] ? __cfi_dump_stack_lvl+0x8/0x8 [ 947.031135][T19779] dump_stack+0x15/0x24 [ 947.035302][T19779] should_fail_ex+0x3d4/0x520 [ 947.040022][T19779] __should_failslab+0xac/0xf0 [ 947.044888][T19779] ? kernfs_fop_write_iter+0x156/0x410 [ 947.050357][T19779] should_failslab+0x9/0x20 [ 947.054867][T19779] __kmem_cache_alloc_node+0x3d/0x2c0 [ 947.060270][T19779] ? kernfs_fop_write_iter+0x156/0x410 [ 947.065800][T19779] __kmalloc+0xa1/0x1e0 [ 947.070011][T19779] kernfs_fop_write_iter+0x156/0x410 [ 947.075433][T19779] vfs_write+0x5db/0xca0 [ 947.079726][T19779] ? slab_free_freelist_hook+0xc2/0x190 [ 947.085321][T19779] ? __cfi_vfs_write+0x10/0x10 [ 947.090195][T19779] ? __cfi_mutex_lock+0x10/0x10 [ 947.095077][T19779] ? __fdget_pos+0x2cd/0x380 [ 947.099696][T19779] ? ksys_write+0x71/0x240 [ 947.104156][T19779] ksys_write+0x140/0x240 [ 947.108543][T19779] ? __cfi_ksys_write+0x10/0x10 [ 947.113445][T19779] ? debug_smp_processor_id+0x17/0x20 [ 947.118932][T19779] __x64_sys_write+0x7b/0x90 [ 947.123537][T19779] x64_sys_call+0x27b/0x9a0 [ 947.128272][T19779] do_syscall_64+0x4c/0xa0 [ 947.132697][T19779] ? clear_bhb_loop+0x30/0x80 [ 947.137479][T19779] ? clear_bhb_loop+0x30/0x80 [ 947.142166][T19779] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 947.148077][T19779] RIP: 0033:0x7f733038ebe9 [ 947.152614][T19779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 947.172240][T19779] RSP: 002b:00007f7331121038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 947.180681][T19779] RAX: ffffffffffffffda RBX: 00007f73305c5fa0 RCX: 00007f733038ebe9 [ 947.188661][T19779] RDX: 0000000000000012 RSI: 00002000000005c0 RDI: 0000000000000007 [ 947.196729][T19779] RBP: 00007f7331121090 R08: 0000000000000000 R09: 0000000000000000 [ 947.204708][T19779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 947.212680][T19779] R13: 00007f73305c6038 R14: 00007f73305c5fa0 R15: 00007ffef3841ae8 [ 947.220803][T19779] [ 947.386571][T19783] device syzkaller0 entered promiscuous mode [ 947.511494][T19798] device pim6reg1 entered promiscuous mode [ 947.604711][T19802] FAULT_INJECTION: forcing a failure. [ 947.604711][T19802] name failslab, interval 1, probability 0, space 0, times 0 [ 947.620766][T19802] CPU: 0 PID: 19802 Comm: syz.2.6301 Not tainted syzkaller #0 [ 947.628332][T19802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 947.638536][T19802] Call Trace: [ 947.641848][T19802] [ 947.644790][T19802] __dump_stack+0x21/0x24 [ 947.649329][T19802] dump_stack_lvl+0xee/0x150 [ 947.653969][T19802] ? __cfi_dump_stack_lvl+0x8/0x8 [ 947.659110][T19802] ? stack_trace_save+0x98/0xe0 [ 947.664007][T19802] dump_stack+0x15/0x24 [ 947.668773][T19802] should_fail_ex+0x3d4/0x520 [ 947.673484][T19802] __should_failslab+0xac/0xf0 [ 947.678380][T19802] should_failslab+0x9/0x20 [ 947.682897][T19802] kmem_cache_alloc_node+0x42/0x340 [ 947.688115][T19802] ? dup_task_struct+0x5a/0x790 [ 947.692995][T19802] dup_task_struct+0x5a/0x790 [ 947.697712][T19802] ? __kasan_check_write+0x14/0x20 [ 947.702854][T19802] ? recalc_sigpending+0x168/0x1c0 [ 947.708089][T19802] copy_process+0x5b8/0x3480 [ 947.712925][T19802] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 947.718747][T19802] ? __kasan_check_write+0x14/0x20 [ 947.723906][T19802] ? idle_dummy+0x10/0x10 [ 947.728321][T19802] kernel_clone+0x23a/0x810 [ 947.732858][T19802] ? __cfi_kernel_clone+0x10/0x10 [ 947.737921][T19802] ? __kasan_check_write+0x14/0x20 [ 947.743059][T19802] ? mutex_unlock+0x89/0x220 [ 947.747689][T19802] __x64_sys_clone+0x168/0x1b0 [ 947.752594][T19802] ? __cfi___x64_sys_clone+0x10/0x10 [ 947.758001][T19802] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 947.764135][T19802] x64_sys_call+0x990/0x9a0 [ 947.768662][T19802] do_syscall_64+0x4c/0xa0 [ 947.773104][T19802] ? clear_bhb_loop+0x30/0x80 [ 947.777884][T19802] ? clear_bhb_loop+0x30/0x80 [ 947.782618][T19802] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 947.788542][T19802] RIP: 0033:0x7f6afd98ebe9 [ 947.792997][T19802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 947.812769][T19802] RSP: 002b:00007f6afe8effe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 947.821205][T19802] RAX: ffffffffffffffda RBX: 00007f6afdbc5fa0 RCX: 00007f6afd98ebe9 [ 947.829250][T19802] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000042000000 [ 947.837251][T19802] RBP: 00007f6afe8f0090 R08: 0000000000000000 R09: 0000000000000000 [ 947.845269][T19802] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 947.853594][T19802] R13: 00007f6afdbc6038 R14: 00007f6afdbc5fa0 R15: 00007ffe3a92b8c8 [ 947.861796][T19802] [ 947.880768][ T28] audit: type=1400 audit(1756881309.206:134): avc: denied { create } for pid=19800 comm="syz.0.6300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 948.540417][T19821] device pim6reg1 entered promiscuous mode [ 949.946147][T19844] device veth0_vlan left promiscuous mode [ 949.993062][T19844] device veth0_vlan entered promiscuous mode [ 950.044775][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 950.070870][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 950.094887][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 950.786005][T19861] device pim6reg1 entered promiscuous mode [ 950.987165][T19866] device pim6reg1 entered promiscuous mode [ 951.163540][T19874] device pim6reg1 entered promiscuous mode [ 951.209248][T19876] device veth0_vlan left promiscuous mode [ 951.218972][T19876] device veth0_vlan entered promiscuous mode [ 951.242094][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 951.250807][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 951.258999][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 951.718579][T19891] device pim6reg1 entered promiscuous mode [ 952.348216][T19911] device pim6reg1 entered promiscuous mode [ 952.445195][T19913] device pim6reg1 entered promiscuous mode [ 952.563243][T19915] FAULT_INJECTION: forcing a failure. [ 952.563243][T19915] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 952.584413][T19915] CPU: 0 PID: 19915 Comm: syz.1.6341 Not tainted syzkaller #0 [ 952.592300][T19915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 952.602471][T19915] Call Trace: [ 952.605967][T19915] [ 952.608994][T19915] __dump_stack+0x21/0x24 [ 952.613457][T19915] dump_stack_lvl+0xee/0x150 [ 952.618392][T19915] ? __cfi_dump_stack_lvl+0x8/0x8 [ 952.623560][T19915] ? __kasan_check_write+0x14/0x20 [ 952.628720][T19915] dump_stack+0x15/0x24 [ 952.632987][T19915] should_fail_ex+0x3d4/0x520 [ 952.637700][T19915] should_fail+0xb/0x10 [ 952.641887][T19915] should_fail_usercopy+0x1a/0x20 [ 952.646936][T19915] _copy_from_user+0x1e/0xc0 [ 952.651553][T19915] perf_copy_attr+0x15e/0x880 [ 952.656262][T19915] __se_sys_perf_event_open+0xcb/0x1b80 [ 952.661850][T19915] ? __kasan_check_write+0x14/0x20 [ 952.667120][T19915] ? mutex_unlock+0x89/0x220 [ 952.671741][T19915] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 952.677439][T19915] ? __cfi_ksys_write+0x10/0x10 [ 952.682326][T19915] __x64_sys_perf_event_open+0xbf/0xd0 [ 952.687844][T19915] x64_sys_call+0x385/0x9a0 [ 952.692379][T19915] do_syscall_64+0x4c/0xa0 [ 952.696819][T19915] ? clear_bhb_loop+0x30/0x80 [ 952.701521][T19915] ? clear_bhb_loop+0x30/0x80 [ 952.706216][T19915] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 952.712130][T19915] RIP: 0033:0x7f733038ebe9 [ 952.716651][T19915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 952.736528][T19915] RSP: 002b:00007f7331121038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 952.744954][T19915] RAX: ffffffffffffffda RBX: 00007f73305c5fa0 RCX: 00007f733038ebe9 [ 952.752938][T19915] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 952.761027][T19915] RBP: 00007f7331121090 R08: 0000000000000000 R09: 0000000000000000 [ 952.769014][T19915] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 952.776999][T19915] R13: 00007f73305c6038 R14: 00007f73305c5fa0 R15: 00007ffef3841ae8 [ 952.785080][T19915] [ 953.010765][T19931] device sit0 entered promiscuous mode [ 953.514600][T19950] device veth0_vlan left promiscuous mode [ 953.588245][T19950] device veth0_vlan entered promiscuous mode [ 953.815770][T19961] FAULT_INJECTION: forcing a failure. [ 953.815770][T19961] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 953.923885][T19961] CPU: 0 PID: 19961 Comm: syz.3.6356 Not tainted syzkaller #0 [ 953.931440][T19961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 953.941706][T19961] Call Trace: [ 953.945104][T19961] [ 953.948062][T19961] __dump_stack+0x21/0x24 [ 953.952428][T19961] dump_stack_lvl+0xee/0x150 [ 953.957059][T19961] ? __cfi_dump_stack_lvl+0x8/0x8 [ 953.962131][T19961] dump_stack+0x15/0x24 [ 953.966415][T19961] should_fail_ex+0x3d4/0x520 [ 953.971130][T19961] should_fail+0xb/0x10 [ 953.975329][T19961] should_fail_usercopy+0x1a/0x20 [ 953.980522][T19961] _copy_from_user+0x1e/0xc0 [ 953.985161][T19961] sock_do_ioctl+0x186/0x310 [ 953.989879][T19961] ? sock_show_fdinfo+0xb0/0xb0 [ 953.994775][T19961] ? selinux_file_ioctl+0x377/0x480 [ 954.000178][T19961] sock_ioctl+0x4d8/0x6e0 [ 954.004644][T19961] ? __cfi_sock_ioctl+0x10/0x10 [ 954.009539][T19961] ? __fget_files+0x2d5/0x330 [ 954.014281][T19961] ? security_file_ioctl+0x95/0xc0 [ 954.019521][T19961] ? __cfi_sock_ioctl+0x10/0x10 [ 954.024402][T19961] __se_sys_ioctl+0x12f/0x1b0 [ 954.029111][T19961] __x64_sys_ioctl+0x7b/0x90 [ 954.033821][T19961] x64_sys_call+0x58b/0x9a0 [ 954.038367][T19961] do_syscall_64+0x4c/0xa0 [ 954.043034][T19961] ? clear_bhb_loop+0x30/0x80 [ 954.047744][T19961] ? clear_bhb_loop+0x30/0x80 [ 954.052457][T19961] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 954.058558][T19961] RIP: 0033:0x7f46b3d8ebe9 [ 954.063100][T19961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 954.083116][T19961] RSP: 002b:00007f46b4c5b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 954.091561][T19961] RAX: ffffffffffffffda RBX: 00007f46b3fc5fa0 RCX: 00007f46b3d8ebe9 [ 954.099830][T19961] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 000000000000000b [ 954.108101][T19961] RBP: 00007f46b4c5b090 R08: 0000000000000000 R09: 0000000000000000 [ 954.116186][T19961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 954.124338][T19961] R13: 00007f46b3fc6038 R14: 00007f46b3fc5fa0 R15: 00007ffd409e90a8 [ 954.132332][T19961] [ 954.490897][T19979] device sit0 entered promiscuous mode [ 954.716345][T19983] device pim6reg1 entered promiscuous mode [ 954.828108][ T28] audit: type=1400 audit(1756881316.146:135): avc: denied { create } for pid=19986 comm="syz.1.6366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 955.446955][T19999] device pim6reg1 entered promiscuous mode [ 956.080898][T20021] device pim6reg1 entered promiscuous mode [ 956.167831][T20014] device sit0 left promiscuous mode [ 956.531360][T20035] device pim6reg1 entered promiscuous mode [ 956.962885][ T28] audit: type=1400 audit(1756881318.286:136): avc: denied { create } for pid=20049 comm="syz.4.6389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 957.030506][T20052] device pim6reg1 entered promiscuous mode [ 957.247331][T20062] device pim6reg1 entered promiscuous mode [ 957.378074][T20066] device veth0_vlan left promiscuous mode [ 957.421114][T20066] device veth0_vlan entered promiscuous mode [ 957.516577][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 957.537219][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 957.575324][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 957.982954][T20076] device pim6reg1 entered promiscuous mode [ 958.770967][T20094] device pim6reg1 entered promiscuous mode [ 958.820543][T20097] device pim6reg1 entered promiscuous mode [ 959.041533][T20101] device veth0_vlan left promiscuous mode [ 959.081439][T20101] device veth0_vlan entered promiscuous mode [ 959.142412][T20103] device pim6reg1 entered promiscuous mode [ 959.660054][T20123] device pim6reg1 entered promiscuous mode [ 959.701337][T20125] device pim6reg1 entered promiscuous mode [ 960.481979][T20140] device sit0 left promiscuous mode [ 961.462203][T20167] device pim6reg1 entered promiscuous mode [ 961.684364][T20169] device pim6reg1 entered promiscuous mode [ 961.794221][T20175] device veth0_vlan left promiscuous mode [ 961.854916][T20175] device veth0_vlan entered promiscuous mode [ 961.906453][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 961.926043][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 962.005559][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 962.460412][T20202] device pim6reg1 entered promiscuous mode [ 963.725187][T20232] FAULT_INJECTION: forcing a failure. [ 963.725187][T20232] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 963.786425][T20232] CPU: 0 PID: 20232 Comm: syz.0.6448 Not tainted syzkaller #0 [ 963.794124][T20232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 963.804301][T20232] Call Trace: [ 963.807632][T20232] [ 963.810586][T20232] __dump_stack+0x21/0x24 [ 963.815035][T20232] dump_stack_lvl+0xee/0x150 [ 963.819771][T20232] ? __cfi_dump_stack_lvl+0x8/0x8 [ 963.824833][T20232] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 963.830941][T20232] dump_stack+0x15/0x24 [ 963.835128][T20232] should_fail_ex+0x3d4/0x520 [ 963.839910][T20232] should_fail+0xb/0x10 [ 963.844103][T20232] should_fail_usercopy+0x1a/0x20 [ 963.849164][T20232] _copy_from_user+0x1e/0xc0 [ 963.853788][T20232] sk_setsockopt+0x294/0x2590 [ 963.858518][T20232] ? __cfi_sk_setsockopt+0x10/0x10 [ 963.863665][T20232] ? proc_fail_nth_write+0x17a/0x1f0 [ 963.869492][T20232] ? selinux_socket_setsockopt+0x21c/0x300 [ 963.875331][T20232] ? slab_free_freelist_hook+0xc2/0x190 [ 963.880911][T20232] ? __fget_files+0x2d5/0x330 [ 963.885614][T20232] sock_setsockopt+0x5a/0x70 [ 963.890259][T20232] __sys_setsockopt+0x270/0x4e0 [ 963.895255][T20232] ? __cfi___sys_setsockopt+0x10/0x10 [ 963.900652][T20232] ? ksys_write+0x1eb/0x240 [ 963.905186][T20232] ? __cfi_ksys_write+0x10/0x10 [ 963.910164][T20232] ? __bpf_trace_sys_enter+0x62/0x70 [ 963.915482][T20232] __x64_sys_setsockopt+0xbf/0xd0 [ 963.920531][T20232] x64_sys_call+0x124/0x9a0 [ 963.925071][T20232] do_syscall_64+0x4c/0xa0 [ 963.929591][T20232] ? clear_bhb_loop+0x30/0x80 [ 963.934301][T20232] ? clear_bhb_loop+0x30/0x80 [ 963.939066][T20232] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 963.945009][T20232] RIP: 0033:0x7fe13ed8ebe9 [ 963.949454][T20232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 963.969093][T20232] RSP: 002b:00007fe13d7f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 963.977717][T20232] RAX: ffffffffffffffda RBX: 00007fe13efc5fa0 RCX: 00007fe13ed8ebe9 [ 963.985718][T20232] RDX: 000000000000001d RSI: 0000000000000001 RDI: 0000000000000006 [ 963.993986][T20232] RBP: 00007fe13d7f7090 R08: 0000000000000004 R09: 0000000000000000 [ 964.001999][T20232] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 964.010164][T20232] R13: 00007fe13efc6038 R14: 00007fe13efc5fa0 R15: 00007ffc626e1b58 [ 964.018174][T20232] [ 964.077358][T20248] syz.4.6453[20248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 964.077439][T20248] syz.4.6453[20248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 964.207645][T20248] FAULT_INJECTION: forcing a failure. [ 964.207645][T20248] name failslab, interval 1, probability 0, space 0, times 0 [ 964.231946][T20248] CPU: 1 PID: 20248 Comm: syz.4.6453 Not tainted syzkaller #0 [ 964.239522][T20248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 964.249690][T20248] Call Trace: [ 964.252992][T20248] [ 964.255940][T20248] __dump_stack+0x21/0x24 [ 964.260481][T20248] dump_stack_lvl+0xee/0x150 [ 964.265280][T20248] ? __cfi_dump_stack_lvl+0x8/0x8 [ 964.270353][T20248] ? _parse_integer+0x2a/0x40 [ 964.275077][T20248] dump_stack+0x15/0x24 [ 964.279274][T20248] should_fail_ex+0x3d4/0x520 [ 964.283979][T20248] ? __sigqueue_alloc+0x13f/0x210 [ 964.289040][T20248] __should_failslab+0xac/0xf0 [ 964.293845][T20248] should_failslab+0x9/0x20 [ 964.298380][T20248] kmem_cache_alloc+0x3b/0x330 [ 964.303270][T20248] __sigqueue_alloc+0x13f/0x210 [ 964.308168][T20248] __send_signal_locked+0x19d/0xb70 [ 964.313435][T20248] ? __kasan_check_write+0x14/0x20 [ 964.318674][T20248] ? __task_pid_nr_ns+0x1dd/0x280 [ 964.323730][T20248] send_signal_locked+0x422/0x580 [ 964.328809][T20248] force_sig_info_to_task+0x31c/0x3f0 [ 964.334292][T20248] force_sig+0xb7/0x100 [ 964.338460][T20248] ? __cfi_force_sig+0x10/0x10 [ 964.343232][T20248] ? __kasan_check_write+0x14/0x20 [ 964.348461][T20248] ? cond_local_irq_disable+0x40/0x40 [ 964.353932][T20248] gp_user_force_sig_segv+0xc2/0x1f0 [ 964.359311][T20248] ? __cfi_ksys_write+0x10/0x10 [ 964.364290][T20248] exc_general_protection+0xb9/0x1e0 [ 964.369585][T20248] ? debug_smp_processor_id+0x17/0x20 [ 964.374990][T20248] ? do_syscall_64+0x58/0xa0 [ 964.379580][T20248] asm_exc_general_protection+0x27/0x30 [ 964.385129][T20248] RIP: 0033:0x7fc0ed567739 [ 964.389545][T20248] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 964.409156][T20248] RSP: 002b:00007fc0ee34d7c8 EFLAGS: 00010283 [ 964.415226][T20248] RAX: 0000000000000999 RBX: 00007fc0ee34dd30 RCX: 00007fc0ed788120 [ 964.423203][T20248] RDX: 9999999999999999 RSI: 00007fc0ed611b31 RDI: 9999999999999999 [ 964.431184][T20248] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 964.439210][T20248] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 964.447210][T20248] R13: 00007fc0ee34deb0 R14: 9999999999999999 R15: 0000000000000000 [ 964.455198][T20248] [ 966.087466][T20301] device pim6reg1 entered promiscuous mode [ 967.346698][T20343] device sit0 entered promiscuous mode [ 967.367875][T20340] FAULT_INJECTION: forcing a failure. [ 967.367875][T20340] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 967.492660][T20340] CPU: 1 PID: 20340 Comm: syz.0.6484 Not tainted syzkaller #0 [ 967.500208][T20340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 967.510350][T20340] Call Trace: [ 967.513665][T20340] [ 967.516628][T20340] __dump_stack+0x21/0x24 [ 967.520991][T20340] dump_stack_lvl+0xee/0x150 [ 967.525638][T20340] ? __cfi_dump_stack_lvl+0x8/0x8 [ 967.530884][T20340] dump_stack+0x15/0x24 [ 967.535070][T20340] should_fail_ex+0x3d4/0x520 [ 967.539893][T20340] should_fail+0xb/0x10 [ 967.544205][T20340] should_fail_usercopy+0x1a/0x20 [ 967.549462][T20340] _copy_from_user+0x1e/0xc0 [ 967.554090][T20340] __sys_bpf+0x277/0x780 [ 967.558397][T20340] ? bpf_link_show_fdinfo+0x320/0x320 [ 967.563995][T20340] __x64_sys_bpf+0x7c/0x90 [ 967.568499][T20340] x64_sys_call+0x488/0x9a0 [ 967.573134][T20340] do_syscall_64+0x4c/0xa0 [ 967.577619][T20340] ? clear_bhb_loop+0x30/0x80 [ 967.582334][T20340] ? clear_bhb_loop+0x30/0x80 [ 967.587057][T20340] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 967.592992][T20340] RIP: 0033:0x7fe13ed8ebe9 [ 967.597619][T20340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 967.617374][T20340] RSP: 002b:00007fe13d7f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 967.625830][T20340] RAX: ffffffffffffffda RBX: 00007fe13efc5fa0 RCX: 00007fe13ed8ebe9 [ 967.633919][T20340] RDX: 0000000000000048 RSI: 00002000000003c0 RDI: 000000000000000a [ 967.642099][T20340] RBP: 00007fe13d7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 967.650113][T20340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 967.658113][T20340] R13: 00007fe13efc6038 R14: 00007fe13efc5fa0 R15: 00007ffc626e1b58 [ 967.666125][T20340] [ 968.958017][T20386] FAULT_INJECTION: forcing a failure. [ 968.958017][T20386] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 968.980879][T20386] CPU: 1 PID: 20386 Comm: syz.0.6500 Not tainted syzkaller #0 [ 968.988465][T20386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 968.998551][T20386] Call Trace: [ 969.001858][T20386] [ 969.004816][T20386] __dump_stack+0x21/0x24 [ 969.009185][T20386] dump_stack_lvl+0xee/0x150 [ 969.013900][T20386] ? __cfi_dump_stack_lvl+0x8/0x8 [ 969.019051][T20386] dump_stack+0x15/0x24 [ 969.023376][T20386] should_fail_ex+0x3d4/0x520 [ 969.028111][T20386] should_fail+0xb/0x10 [ 969.032385][T20386] should_fail_usercopy+0x1a/0x20 [ 969.037453][T20386] _copy_from_user+0x1e/0xc0 [ 969.042167][T20386] __sys_bpf+0x277/0x780 [ 969.046434][T20386] ? bpf_link_show_fdinfo+0x320/0x320 [ 969.051838][T20386] ? __cfi_ksys_write+0x10/0x10 [ 969.056727][T20386] ? debug_smp_processor_id+0x17/0x20 [ 969.062158][T20386] __x64_sys_bpf+0x7c/0x90 [ 969.066711][T20386] x64_sys_call+0x488/0x9a0 [ 969.071248][T20386] do_syscall_64+0x4c/0xa0 [ 969.075690][T20386] ? clear_bhb_loop+0x30/0x80 [ 969.080494][T20386] ? clear_bhb_loop+0x30/0x80 [ 969.085303][T20386] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 969.091237][T20386] RIP: 0033:0x7fe13ed8ebe9 [ 969.095772][T20386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 969.115578][T20386] RSP: 002b:00007fe13d7f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 969.124117][T20386] RAX: ffffffffffffffda RBX: 00007fe13efc5fa0 RCX: 00007fe13ed8ebe9 [ 969.132122][T20386] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 969.140117][T20386] RBP: 00007fe13d7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 969.148116][T20386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 969.156211][T20386] R13: 00007fe13efc6038 R14: 00007fe13efc5fa0 R15: 00007ffc626e1b58 [ 969.164304][T20386] [ 969.252804][T20398] device pim6reg1 entered promiscuous mode [ 969.308674][T20401] device pim6reg1 entered promiscuous mode [ 969.420957][T20409] FAULT_INJECTION: forcing a failure. [ 969.420957][T20409] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 969.434235][T20409] CPU: 1 PID: 20409 Comm: syz.1.6508 Not tainted syzkaller #0 [ 969.441747][T20409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 969.452020][T20409] Call Trace: [ 969.455397][T20409] [ 969.458348][T20409] __dump_stack+0x21/0x24 [ 969.462685][T20409] dump_stack_lvl+0xee/0x150 [ 969.467298][T20409] ? __cfi_dump_stack_lvl+0x8/0x8 [ 969.472342][T20409] dump_stack+0x15/0x24 [ 969.476520][T20409] should_fail_ex+0x3d4/0x520 [ 969.481326][T20409] should_fail+0xb/0x10 [ 969.485603][T20409] should_fail_usercopy+0x1a/0x20 [ 969.490677][T20409] _copy_from_user+0x1e/0xc0 [ 969.495335][T20409] sock_do_ioctl+0x186/0x310 [ 969.499948][T20409] ? sock_show_fdinfo+0xb0/0xb0 [ 969.504907][T20409] ? selinux_file_ioctl+0x377/0x480 [ 969.510139][T20409] sock_ioctl+0x4d8/0x6e0 [ 969.514479][T20409] ? __cfi_sock_ioctl+0x10/0x10 [ 969.519356][T20409] ? __fget_files+0x2d5/0x330 [ 969.524038][T20409] ? security_file_ioctl+0x95/0xc0 [ 969.529244][T20409] ? __cfi_sock_ioctl+0x10/0x10 [ 969.534189][T20409] __se_sys_ioctl+0x12f/0x1b0 [ 969.538877][T20409] __x64_sys_ioctl+0x7b/0x90 [ 969.543473][T20409] x64_sys_call+0x58b/0x9a0 [ 969.547988][T20409] do_syscall_64+0x4c/0xa0 [ 969.552495][T20409] ? clear_bhb_loop+0x30/0x80 [ 969.557182][T20409] ? clear_bhb_loop+0x30/0x80 [ 969.561879][T20409] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 969.567790][T20409] RIP: 0033:0x7f733038ebe9 [ 969.572297][T20409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 969.592086][T20409] RSP: 002b:00007f7331121038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 969.600595][T20409] RAX: ffffffffffffffda RBX: 00007f73305c5fa0 RCX: 00007f733038ebe9 [ 969.608580][T20409] RDX: 0000200000000080 RSI: 0000000000008922 RDI: 0000000000000009 [ 969.616567][T20409] RBP: 00007f7331121090 R08: 0000000000000000 R09: 0000000000000000 [ 969.624649][T20409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 969.632728][T20409] R13: 00007f73305c6038 R14: 00007f73305c5fa0 R15: 00007ffef3841ae8 [ 969.640837][T20409] [ 969.748207][T20416] bond_slave_1: mtu less than device minimum [ 969.845400][T20418] FAULT_INJECTION: forcing a failure. [ 969.845400][T20418] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 969.874793][T20418] CPU: 0 PID: 20418 Comm: syz.3.6513 Not tainted syzkaller #0 [ 969.882332][T20418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 969.892612][T20418] Call Trace: [ 969.895925][T20418] [ 969.899068][T20418] __dump_stack+0x21/0x24 [ 969.903489][T20418] dump_stack_lvl+0xee/0x150 [ 969.908140][T20418] ? __cfi_dump_stack_lvl+0x8/0x8 [ 969.913227][T20418] ? __get_user_nocheck_8+0x6/0x13 [ 969.918395][T20418] dump_stack+0x15/0x24 [ 969.922606][T20418] should_fail_ex+0x3d4/0x520 [ 969.927490][T20418] should_fail_alloc_page+0x61/0x90 [ 969.932746][T20418] prepare_alloc_pages+0x148/0x5f0 [ 969.937917][T20418] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 969.943171][T20418] ? kasan_check_range+0x8d/0x290 [ 969.948419][T20418] __alloc_pages+0x124/0x450 [ 969.953058][T20418] ? __cfi___alloc_pages+0x10/0x10 [ 969.958226][T20418] ? percpu_counter_add_batch+0x13c/0x160 [ 969.964007][T20418] __folio_alloc+0x12/0x40 [ 969.968603][T20418] shmem_alloc_and_acct_folio+0x650/0x870 [ 969.974464][T20418] ? shmem_replace_folio+0x590/0x590 [ 969.979890][T20418] ? xas_load+0x390/0x3b0 [ 969.984363][T20418] ? __filemap_get_folio+0x93e/0x980 [ 969.989693][T20418] ? debug_smp_processor_id+0x17/0x20 [ 969.995122][T20418] ? __cfi___filemap_get_folio+0x10/0x10 [ 970.000804][T20418] ? __cfi_shmem_write_begin+0x10/0x10 [ 970.006366][T20418] ? shmem_get_folio_gfp+0x2b1/0x2230 [ 970.011970][T20418] ? __filemap_get_folio+0x6/0x980 [ 970.017133][T20418] shmem_get_folio_gfp+0x119f/0x2230 [ 970.022563][T20418] shmem_write_begin+0xea/0x2c0 [ 970.027595][T20418] generic_perform_write+0x2f6/0x6d0 [ 970.032932][T20418] ? __cfi_generic_perform_write+0x10/0x10 [ 970.038788][T20418] ? __generic_file_write_iter+0x20e/0x580 [ 970.044730][T20418] __generic_file_write_iter+0x227/0x580 [ 970.050421][T20418] ? __cfi___generic_file_write_iter+0x10/0x10 [ 970.056666][T20418] ? rwsem_write_trylock+0x130/0x300 [ 970.062097][T20418] ? generic_write_checks_count+0x3c6/0x4a0 [ 970.068132][T20418] ? generic_write_checks+0xca/0x100 [ 970.073561][T20418] generic_file_write_iter+0xae/0x310 [ 970.078995][T20418] vfs_write+0x5db/0xca0 [ 970.083329][T20418] ? __cfi_vfs_write+0x10/0x10 [ 970.088145][T20418] ? __cfi_mutex_lock+0x10/0x10 [ 970.093129][T20418] ? __fdget_pos+0x2cd/0x380 [ 970.097732][T20418] ? ksys_write+0x71/0x240 [ 970.102171][T20418] ksys_write+0x140/0x240 [ 970.106523][T20418] ? __cfi_ksys_write+0x10/0x10 [ 970.111452][T20418] __x64_sys_write+0x7b/0x90 [ 970.116077][T20418] x64_sys_call+0x27b/0x9a0 [ 970.120599][T20418] do_syscall_64+0x4c/0xa0 [ 970.125308][T20418] ? clear_bhb_loop+0x30/0x80 [ 970.130105][T20418] ? clear_bhb_loop+0x30/0x80 [ 970.134791][T20418] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 970.141046][T20418] RIP: 0033:0x7f46b3d8ebe9 [ 970.145465][T20418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 970.165252][T20418] RSP: 002b:00007f46b4c5b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 970.173763][T20418] RAX: ffffffffffffffda RBX: 00007f46b3fc5fa0 RCX: 00007f46b3d8ebe9 [ 970.181783][T20418] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 0000000000000008 [ 970.189776][T20418] RBP: 00007f46b4c5b090 R08: 0000000000000000 R09: 0000000000000000 [ 970.197775][T20418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 970.205756][T20418] R13: 00007f46b3fc6038 R14: 00007f46b3fc5fa0 R15: 00007ffd409e90a8 [ 970.213921][T20418] [ 970.543412][T20443] device pim6reg1 entered promiscuous mode [ 970.566858][T20441] device sit0 entered promiscuous mode [ 971.445331][T20468] device pim6reg1 entered promiscuous mode [ 971.888583][T20475] device pim6reg1 entered promiscuous mode [ 972.119651][T20481] FAULT_INJECTION: forcing a failure. [ 972.119651][T20481] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 972.181070][T20481] CPU: 1 PID: 20481 Comm: syz.3.6538 Not tainted syzkaller #0 [ 972.188679][T20481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 972.198939][T20481] Call Trace: [ 972.202248][T20481] [ 972.205227][T20481] __dump_stack+0x21/0x24 [ 972.209587][T20481] dump_stack_lvl+0xee/0x150 [ 972.214225][T20481] ? __cfi_dump_stack_lvl+0x8/0x8 [ 972.219381][T20481] dump_stack+0x15/0x24 [ 972.223567][T20481] should_fail_ex+0x3d4/0x520 [ 972.228288][T20481] should_fail+0xb/0x10 [ 972.232495][T20481] should_fail_usercopy+0x1a/0x20 [ 972.237666][T20481] _copy_from_user+0x1e/0xc0 [ 972.242479][T20481] __sys_bpf+0x277/0x780 [ 972.246749][T20481] ? bpf_link_show_fdinfo+0x320/0x320 [ 972.252245][T20481] ? __cfi_ksys_write+0x10/0x10 [ 972.257149][T20481] ? debug_smp_processor_id+0x17/0x20 [ 972.262574][T20481] __x64_sys_bpf+0x7c/0x90 [ 972.267031][T20481] x64_sys_call+0x488/0x9a0 [ 972.271576][T20481] do_syscall_64+0x4c/0xa0 [ 972.276023][T20481] ? clear_bhb_loop+0x30/0x80 [ 972.280731][T20481] ? clear_bhb_loop+0x30/0x80 [ 972.285457][T20481] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 972.291408][T20481] RIP: 0033:0x7f46b3d8ebe9 [ 972.295942][T20481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 972.315670][T20481] RSP: 002b:00007f46b4c5b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 972.324222][T20481] RAX: ffffffffffffffda RBX: 00007f46b3fc5fa0 RCX: 00007f46b3d8ebe9 [ 972.332316][T20481] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 972.340319][T20481] RBP: 00007f46b4c5b090 R08: 0000000000000000 R09: 0000000000000000 [ 972.348323][T20481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 972.356543][T20481] R13: 00007f46b3fc6038 R14: 00007f46b3fc5fa0 R15: 00007ffd409e90a8 [ 972.364566][T20481] [ 972.762659][T20493] FAULT_INJECTION: forcing a failure. [ 972.762659][T20493] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 972.862174][T20493] CPU: 0 PID: 20493 Comm: syz.2.6543 Not tainted syzkaller #0 [ 972.869714][T20493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 972.879911][T20493] Call Trace: [ 972.883398][T20493] [ 972.886356][T20493] __dump_stack+0x21/0x24 [ 972.890740][T20493] dump_stack_lvl+0xee/0x150 [ 972.895372][T20493] ? __cfi_dump_stack_lvl+0x8/0x8 [ 972.900539][T20493] dump_stack+0x15/0x24 [ 972.904730][T20493] should_fail_ex+0x3d4/0x520 [ 972.909533][T20493] should_fail+0xb/0x10 [ 972.913791][T20493] should_fail_usercopy+0x1a/0x20 [ 972.918880][T20493] _copy_from_user+0x1e/0xc0 [ 972.923503][T20493] __sys_bpf+0x277/0x780 [ 972.927789][T20493] ? bpf_link_show_fdinfo+0x320/0x320 [ 972.933176][T20493] ? __cfi_ksys_write+0x10/0x10 [ 972.938043][T20493] ? debug_smp_processor_id+0x17/0x20 [ 972.943427][T20493] __x64_sys_bpf+0x7c/0x90 [ 972.947867][T20493] x64_sys_call+0x488/0x9a0 [ 972.952383][T20493] do_syscall_64+0x4c/0xa0 [ 972.956825][T20493] ? clear_bhb_loop+0x30/0x80 [ 972.961520][T20493] ? clear_bhb_loop+0x30/0x80 [ 972.966207][T20493] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 972.972193][T20493] RIP: 0033:0x7f6afd98ebe9 [ 972.976617][T20493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 972.996316][T20493] RSP: 002b:00007f6afe8f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 973.004822][T20493] RAX: ffffffffffffffda RBX: 00007f6afdbc5fa0 RCX: 00007f6afd98ebe9 [ 973.012813][T20493] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 973.021051][T20493] RBP: 00007f6afe8f0090 R08: 0000000000000000 R09: 0000000000000000 [ 973.029206][T20493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 973.037707][T20493] R13: 00007f6afdbc6038 R14: 00007f6afdbc5fa0 R15: 00007ffe3a92b8c8 [ 973.045747][T20493] [ 973.265416][T20499] FAULT_INJECTION: forcing a failure. [ 973.265416][T20499] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 973.289112][T20499] CPU: 1 PID: 20499 Comm: syz.2.6546 Not tainted syzkaller #0 [ 973.296743][T20499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 973.307001][T20499] Call Trace: [ 973.310464][T20499] [ 973.313432][T20499] __dump_stack+0x21/0x24 [ 973.317805][T20499] dump_stack_lvl+0xee/0x150 [ 973.322548][T20499] ? __cfi_dump_stack_lvl+0x8/0x8 [ 973.327794][T20499] dump_stack+0x15/0x24 [ 973.331987][T20499] should_fail_ex+0x3d4/0x520 [ 973.336711][T20499] should_fail+0xb/0x10 [ 973.340945][T20499] should_fail_usercopy+0x1a/0x20 [ 973.346004][T20499] _copy_from_user+0x1e/0xc0 [ 973.350624][T20499] __sys_bpf+0x277/0x780 [ 973.354991][T20499] ? bpf_link_show_fdinfo+0x320/0x320 [ 973.360420][T20499] ? fpregs_restore_userregs+0x128/0x260 [ 973.366090][T20499] __x64_sys_bpf+0x7c/0x90 [ 973.370672][T20499] x64_sys_call+0x488/0x9a0 [ 973.375336][T20499] do_syscall_64+0x4c/0xa0 [ 973.379778][T20499] ? clear_bhb_loop+0x30/0x80 [ 973.384485][T20499] ? clear_bhb_loop+0x30/0x80 [ 973.389194][T20499] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 973.395126][T20499] RIP: 0033:0x7f6afd98ebe9 [ 973.399584][T20499] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 973.419312][T20499] RSP: 002b:00007f6afe8f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 973.427776][T20499] RAX: ffffffffffffffda RBX: 00007f6afdbc5fa0 RCX: 00007f6afd98ebe9 [ 973.435880][T20499] RDX: 0000000000000028 RSI: 00002000000000c0 RDI: 0000000000000012 [ 973.443936][T20499] RBP: 00007f6afe8f0090 R08: 0000000000000000 R09: 0000000000000000 [ 973.451933][T20499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 973.460024][T20499] R13: 00007f6afdbc6038 R14: 00007f6afdbc5fa0 R15: 00007ffe3a92b8c8 [ 973.468040][T20499] [ 973.667102][T20506] device pim6reg1 entered promiscuous mode [ 974.005127][T20521] bridge0: port 2(bridge_slave_1) entered disabled state [ 974.013857][T20521] bridge0: port 1(bridge_slave_0) entered disabled state [ 974.111877][T20518] device sit0 left promiscuous mode [ 974.266809][T20529] ÿÿÿÿÿÿþ€: renamed from vlan1 [ 974.321475][T20531] device pim6reg1 entered promiscuous mode [ 974.626243][T20543] FAULT_INJECTION: forcing a failure. [ 974.626243][T20543] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 974.711427][T20543] CPU: 0 PID: 20543 Comm: syz.4.6562 Not tainted syzkaller #0 [ 974.719394][T20543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 974.729585][T20543] Call Trace: [ 974.732897][T20543] [ 974.735861][T20543] __dump_stack+0x21/0x24 [ 974.740310][T20543] dump_stack_lvl+0xee/0x150 [ 974.744968][T20543] ? __cfi_dump_stack_lvl+0x8/0x8 [ 974.750046][T20543] dump_stack+0x15/0x24 [ 974.754252][T20543] should_fail_ex+0x3d4/0x520 [ 974.758975][T20543] should_fail+0xb/0x10 [ 974.763176][T20543] should_fail_usercopy+0x1a/0x20 [ 974.768330][T20543] _copy_from_user+0x1e/0xc0 [ 974.772964][T20543] sock_do_ioctl+0x186/0x310 [ 974.777599][T20543] ? sock_show_fdinfo+0xb0/0xb0 [ 974.782489][T20543] ? selinux_file_ioctl+0x377/0x480 [ 974.787822][T20543] sock_ioctl+0x4d8/0x6e0 [ 974.792278][T20543] ? __cfi_sock_ioctl+0x10/0x10 [ 974.797164][T20543] ? __fget_files+0x2d5/0x330 [ 974.801884][T20543] ? security_file_ioctl+0x95/0xc0 [ 974.807047][T20543] ? __cfi_sock_ioctl+0x10/0x10 [ 974.812149][T20543] __se_sys_ioctl+0x12f/0x1b0 [ 974.816874][T20543] __x64_sys_ioctl+0x7b/0x90 [ 974.821516][T20543] x64_sys_call+0x58b/0x9a0 [ 974.826065][T20543] do_syscall_64+0x4c/0xa0 [ 974.830528][T20543] ? clear_bhb_loop+0x30/0x80 [ 974.835262][T20543] ? clear_bhb_loop+0x30/0x80 [ 974.839980][T20543] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 974.845955][T20543] RIP: 0033:0x7fc0ed58ebe9 [ 974.850407][T20543] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 974.870053][T20543] RSP: 002b:00007fc0ee34e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 974.878554][T20543] RAX: ffffffffffffffda RBX: 00007fc0ed7c5fa0 RCX: 00007fc0ed58ebe9 [ 974.886583][T20543] RDX: 0000200000000080 RSI: 00000000000089a2 RDI: 000000000000000f [ 974.894599][T20543] RBP: 00007fc0ee34e090 R08: 0000000000000000 R09: 0000000000000000 [ 974.902607][T20543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 974.910795][T20543] R13: 00007fc0ed7c6038 R14: 00007fc0ed7c5fa0 R15: 00007ffc2062ccd8 [ 974.918813][T20543] [ 975.154525][T20555] device pim6reg1 entered promiscuous mode [ 975.729527][T20569] device sit0 left promiscuous mode [ 975.850134][T20580] device pim6reg1 entered promiscuous mode [ 976.080932][T20588] bridge0: port 2(bridge_slave_1) entered disabled state [ 976.091540][T20588] bridge0: port 1(bridge_slave_0) entered disabled state [ 976.177397][T20592] FAULT_INJECTION: forcing a failure. [ 976.177397][T20592] name failslab, interval 1, probability 0, space 0, times 0 [ 976.191053][T20592] CPU: 0 PID: 20592 Comm: syz.0.6578 Not tainted syzkaller #0 [ 976.198563][T20592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 976.208650][T20592] Call Trace: [ 976.211952][T20592] [ 976.214906][T20592] __dump_stack+0x21/0x24 [ 976.219279][T20592] dump_stack_lvl+0xee/0x150 [ 976.223993][T20592] ? __cfi_dump_stack_lvl+0x8/0x8 [ 976.229236][T20592] dump_stack+0x15/0x24 [ 976.233423][T20592] should_fail_ex+0x3d4/0x520 [ 976.238152][T20592] __should_failslab+0xac/0xf0 [ 976.242953][T20592] ? kernfs_fop_write_iter+0x156/0x410 [ 976.248443][T20592] should_failslab+0x9/0x20 [ 976.252970][T20592] __kmem_cache_alloc_node+0x3d/0x2c0 [ 976.258395][T20592] ? kernfs_fop_write_iter+0x156/0x410 [ 976.263890][T20592] __kmalloc+0xa1/0x1e0 [ 976.268106][T20592] kernfs_fop_write_iter+0x156/0x410 [ 976.273435][T20592] vfs_write+0x5db/0xca0 [ 976.277843][T20592] ? __cfi_vfs_write+0x10/0x10 [ 976.282653][T20592] ? __cfi_mutex_lock+0x10/0x10 [ 976.287580][T20592] ? __fdget_pos+0x2cd/0x380 [ 976.292290][T20592] ? ksys_write+0x71/0x240 [ 976.296840][T20592] ksys_write+0x140/0x240 [ 976.301209][T20592] ? __cfi_ksys_write+0x10/0x10 [ 976.306141][T20592] __x64_sys_write+0x7b/0x90 [ 976.310850][T20592] x64_sys_call+0x27b/0x9a0 [ 976.315382][T20592] do_syscall_64+0x4c/0xa0 [ 976.319828][T20592] ? clear_bhb_loop+0x30/0x80 [ 976.324622][T20592] ? clear_bhb_loop+0x30/0x80 [ 976.329329][T20592] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 976.335283][T20592] RIP: 0033:0x7fe13ed8ebe9 [ 976.339724][T20592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 976.359477][T20592] RSP: 002b:00007fe13d7f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 976.368021][T20592] RAX: ffffffffffffffda RBX: 00007fe13efc5fa0 RCX: 00007fe13ed8ebe9 [ 976.376025][T20592] RDX: 0000000000000001 RSI: 0000200000000040 RDI: 000000000000000b [ 976.384109][T20592] RBP: 00007fe13d7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 976.392110][T20592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 976.400118][T20592] R13: 00007fe13efc6038 R14: 00007fe13efc5fa0 R15: 00007ffc626e1b58 [ 976.408130][T20592] [ 976.483227][T20598] syzkaller: port 1(erspan0) entered blocking state [ 976.501341][T20598] syzkaller: port 1(erspan0) entered disabled state [ 976.587967][T20598] device erspan0 entered promiscuous mode [ 976.985736][T20617] device pim6reg1 entered promiscuous mode [ 977.924317][T20645] device pim6reg1 entered promiscuous mode [ 978.799881][T20675] device pim6reg1 entered promiscuous mode [ 980.516348][T20719] device pim6reg1 entered promiscuous mode [ 982.944601][T20767] FAULT_INJECTION: forcing a failure. [ 982.944601][T20767] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 982.959880][T20767] CPU: 0 PID: 20767 Comm: syz.3.6639 Not tainted syzkaller #0 [ 982.967397][T20767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 982.977584][T20767] Call Trace: [ 982.980891][T20767] [ 982.983846][T20767] __dump_stack+0x21/0x24 [ 982.988204][T20767] dump_stack_lvl+0xee/0x150 [ 982.992836][T20767] ? __cfi_dump_stack_lvl+0x8/0x8 [ 982.997900][T20767] dump_stack+0x15/0x24 [ 983.002075][T20767] should_fail_ex+0x3d4/0x520 [ 983.006793][T20767] should_fail+0xb/0x10 [ 983.010981][T20767] should_fail_usercopy+0x1a/0x20 [ 983.016040][T20767] _copy_from_user+0x1e/0xc0 [ 983.020663][T20767] ___sys_recvmsg+0x12b/0x510 [ 983.025373][T20767] ? __sys_recvmsg+0x270/0x270 [ 983.030188][T20767] ? security_file_permission+0x94/0xb0 [ 983.035888][T20767] ? __fget_files+0x2d5/0x330 [ 983.040597][T20767] ? __fdget+0x19c/0x220 [ 983.044892][T20767] __x64_sys_recvmsg+0x1ed/0x2c0 [ 983.049863][T20767] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 983.055356][T20767] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 983.061473][T20767] x64_sys_call+0x75/0x9a0 [ 983.066013][T20767] do_syscall_64+0x4c/0xa0 [ 983.070453][T20767] ? clear_bhb_loop+0x30/0x80 [ 983.075175][T20767] ? clear_bhb_loop+0x30/0x80 [ 983.079889][T20767] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 983.085892][T20767] RIP: 0033:0x7f46b3d8ebe9 [ 983.090332][T20767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 983.110152][T20767] RSP: 002b:00007f46b4c3a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 983.118647][T20767] RAX: ffffffffffffffda RBX: 00007f46b3fc6090 RCX: 00007f46b3d8ebe9 [ 983.126653][T20767] RDX: 0000000040000100 RSI: 0000200000001140 RDI: 0000000000000004 [ 983.135002][T20767] RBP: 00007f46b4c3a090 R08: 0000000000000000 R09: 0000000000000000 [ 983.143003][T20767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 983.151181][T20767] R13: 00007f46b3fc6128 R14: 00007f46b3fc6090 R15: 00007ffd409e90a8 [ 983.159190][T20767] [ 983.830560][T20786] device pim6reg1 entered promiscuous mode [ 984.518179][T20803] device pim6reg1 entered promiscuous mode [ 985.434227][T20827] device pim6reg1 entered promiscuous mode [ 986.576531][T20866] device pim6reg1 entered promiscuous mode [ 990.582540][T20975] FAULT_INJECTION: forcing a failure. [ 990.582540][T20975] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 990.714371][T20975] CPU: 0 PID: 20975 Comm: syz.2.6708 Not tainted syzkaller #0 [ 990.721930][T20975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 990.732386][T20975] Call Trace: [ 990.735768][T20975] [ 990.738724][T20975] __dump_stack+0x21/0x24 [ 990.743161][T20975] dump_stack_lvl+0xee/0x150 [ 990.747868][T20975] ? __cfi_dump_stack_lvl+0x8/0x8 [ 990.752953][T20975] dump_stack+0x15/0x24 [ 990.757128][T20975] should_fail_ex+0x3d4/0x520 [ 990.762095][T20975] should_fail+0xb/0x10 [ 990.766372][T20975] should_fail_usercopy+0x1a/0x20 [ 990.771509][T20975] _copy_from_user+0x1e/0xc0 [ 990.776305][T20975] __sys_bpf+0x277/0x780 [ 990.780557][T20975] ? bpf_link_show_fdinfo+0x320/0x320 [ 990.786038][T20975] ? __cfi_ksys_write+0x10/0x10 [ 990.791031][T20975] ? debug_smp_processor_id+0x17/0x20 [ 990.796537][T20975] __x64_sys_bpf+0x7c/0x90 [ 990.800994][T20975] x64_sys_call+0x488/0x9a0 [ 990.805523][T20975] do_syscall_64+0x4c/0xa0 [ 990.809958][T20975] ? clear_bhb_loop+0x30/0x80 [ 990.815084][T20975] ? clear_bhb_loop+0x30/0x80 [ 990.819774][T20975] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 990.825938][T20975] RIP: 0033:0x7f6afd98ebe9 [ 990.830362][T20975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 990.850159][T20975] RSP: 002b:00007f6afe8cf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 990.858687][T20975] RAX: ffffffffffffffda RBX: 00007f6afdbc6090 RCX: 00007f6afd98ebe9 [ 990.866693][T20975] RDX: 0000000000000020 RSI: 0000200000001800 RDI: 0000000000000004 [ 990.874682][T20975] RBP: 00007f6afe8cf090 R08: 0000000000000000 R09: 0000000000000000 [ 990.882658][T20975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 990.890644][T20975] R13: 00007f6afdbc6128 R14: 00007f6afdbc6090 R15: 00007ffe3a92b8c8 [ 990.898714][T20975] [ 992.414044][T21060] FAULT_INJECTION: forcing a failure. [ 992.414044][T21060] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 992.443764][T21060] CPU: 0 PID: 21060 Comm: syz.1.6738 Not tainted syzkaller #0 [ 992.451323][T21060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 992.461412][T21060] Call Trace: [ 992.464817][T21060] [ 992.467775][T21060] __dump_stack+0x21/0x24 [ 992.472261][T21060] dump_stack_lvl+0xee/0x150 [ 992.476907][T21060] ? __cfi_dump_stack_lvl+0x8/0x8 [ 992.481986][T21060] dump_stack+0x15/0x24 [ 992.486211][T21060] should_fail_ex+0x3d4/0x520 [ 992.490954][T21060] should_fail+0xb/0x10 [ 992.495168][T21060] should_fail_usercopy+0x1a/0x20 [ 992.500388][T21060] _copy_from_user+0x1e/0xc0 [ 992.505020][T21060] __sys_bpf+0x277/0x780 [ 992.509308][T21060] ? bpf_link_show_fdinfo+0x320/0x320 [ 992.514765][T21060] ? __cfi_ksys_write+0x10/0x10 [ 992.519693][T21060] ? debug_smp_processor_id+0x17/0x20 [ 992.525112][T21060] __x64_sys_bpf+0x7c/0x90 [ 992.529569][T21060] x64_sys_call+0x488/0x9a0 [ 992.534110][T21060] do_syscall_64+0x4c/0xa0 [ 992.538551][T21060] ? clear_bhb_loop+0x30/0x80 [ 992.543371][T21060] ? clear_bhb_loop+0x30/0x80 [ 992.548117][T21060] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 992.554508][T21060] RIP: 0033:0x7f733038ebe9 [ 992.559161][T21060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 992.579232][T21060] RSP: 002b:00007f7331121038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 992.587782][T21060] RAX: ffffffffffffffda RBX: 00007f73305c5fa0 RCX: 00007f733038ebe9 [ 992.596398][T21060] RDX: 0000000000000020 RSI: 0000200000000040 RDI: 0000000000000004 [ 992.604499][T21060] RBP: 00007f7331121090 R08: 0000000000000000 R09: 0000000000000000 [ 992.612507][T21060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 992.620512][T21060] R13: 00007f73305c6038 R14: 00007f73305c5fa0 R15: 00007ffef3841ae8 [ 992.628623][T21060] [ 993.575945][T21105] FAULT_INJECTION: forcing a failure. [ 993.575945][T21105] name failslab, interval 1, probability 0, space 0, times 0 [ 993.703975][T21105] CPU: 1 PID: 21105 Comm: syz.0.6754 Not tainted syzkaller #0 [ 993.711762][T21105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 993.721945][T21105] Call Trace: [ 993.725255][T21105] [ 993.728210][T21105] __dump_stack+0x21/0x24 [ 993.732578][T21105] dump_stack_lvl+0xee/0x150 [ 993.737294][T21105] ? __cfi_dump_stack_lvl+0x8/0x8 [ 993.742434][T21105] ? stack_trace_save+0x98/0xe0 [ 993.747400][T21105] dump_stack+0x15/0x24 [ 993.751583][T21105] should_fail_ex+0x3d4/0x520 [ 993.756393][T21105] __should_failslab+0xac/0xf0 [ 993.761183][T21105] should_failslab+0x9/0x20 [ 993.765730][T21105] kmem_cache_alloc_node+0x42/0x340 [ 993.770966][T21105] ? dup_task_struct+0x5a/0x790 [ 993.775969][T21105] ? cgroup_freezing+0x86/0xb0 [ 993.780765][T21105] dup_task_struct+0x5a/0x790 [ 993.785482][T21105] ? __kasan_check_write+0x14/0x20 [ 993.790647][T21105] ? recalc_sigpending+0x168/0x1c0 [ 993.795817][T21105] copy_process+0x5b8/0x3480 [ 993.800447][T21105] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 993.806328][T21105] ? __kasan_check_write+0x14/0x20 [ 993.811561][T21105] ? idle_dummy+0x10/0x10 [ 993.815921][T21105] kernel_clone+0x23a/0x810 [ 993.820458][T21105] ? __cfi_kernel_clone+0x10/0x10 [ 993.825612][T21105] ? __kasan_check_write+0x14/0x20 [ 993.830922][T21105] ? mutex_unlock+0x89/0x220 [ 993.835526][T21105] __x64_sys_clone+0x168/0x1b0 [ 993.840336][T21105] ? __cfi___x64_sys_clone+0x10/0x10 [ 993.845669][T21105] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 993.851932][T21105] x64_sys_call+0x990/0x9a0 [ 993.856457][T21105] do_syscall_64+0x4c/0xa0 [ 993.860887][T21105] ? clear_bhb_loop+0x30/0x80 [ 993.865592][T21105] ? clear_bhb_loop+0x30/0x80 [ 993.870313][T21105] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 993.876245][T21105] RIP: 0033:0x7fe13ed8ebe9 [ 993.880758][T21105] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 993.900373][T21105] RSP: 002b:00007fe13d7f6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 993.908801][T21105] RAX: ffffffffffffffda RBX: 00007fe13efc5fa0 RCX: 00007fe13ed8ebe9 [ 993.916820][T21105] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 993.924896][T21105] RBP: 00007fe13d7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 993.932968][T21105] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 993.941029][T21105] R13: 00007fe13efc6038 R14: 00007fe13efc5fa0 R15: 00007ffc626e1b58 [ 993.949020][T21105] [ 996.350270][T21183] device pim6reg1 entered promiscuous mode [ 996.516963][T21194] device pim6reg1 entered promiscuous mode [ 996.620346][T21193] device wg2 entered promiscuous mode [ 997.428977][T21229] device wg2 entered promiscuous mode [ 997.532383][ T28] audit: type=1400 audit(1756881358.856:137): avc: denied { create } for pid=21228 comm="syz.2.6794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 997.623734][T21236] device pim6reg1 entered promiscuous mode [ 997.895177][T21253] device pim6reg1 entered promiscuous mode [ 999.579117][T21301] device pim6reg1 entered promiscuous mode [ 999.943562][ T28] audit: type=1400 audit(1756881361.266:138): avc: denied { create } for pid=21310 comm="syz.4.6822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1000.238071][T21323] device pim6reg1 entered promiscuous mode [ 1000.895597][T21336] FAULT_INJECTION: forcing a failure. [ 1000.895597][T21336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1000.910543][T21336] CPU: 0 PID: 21336 Comm: syz.3.6833 Not tainted syzkaller #0 [ 1000.918084][T21336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1000.928164][T21336] Call Trace: [ 1000.931576][T21336] [ 1000.934520][T21336] __dump_stack+0x21/0x24 [ 1000.938957][T21336] dump_stack_lvl+0xee/0x150 [ 1000.943592][T21336] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1000.948723][T21336] dump_stack+0x15/0x24 [ 1000.953056][T21336] should_fail_ex+0x3d4/0x520 [ 1000.957927][T21336] should_fail+0xb/0x10 [ 1000.962141][T21336] should_fail_usercopy+0x1a/0x20 [ 1000.967192][T21336] _copy_to_user+0x1e/0x90 [ 1000.971626][T21336] simple_read_from_buffer+0xe9/0x160 [ 1000.977009][T21336] proc_fail_nth_read+0x19a/0x210 [ 1000.982140][T21336] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 1000.987698][T21336] ? security_file_permission+0x94/0xb0 [ 1000.993256][T21336] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 1000.998806][T21336] vfs_read+0x26e/0x8c0 [ 1001.002995][T21336] ? __cfi_vfs_read+0x10/0x10 [ 1001.007708][T21336] ? __kasan_check_write+0x14/0x20 [ 1001.012901][T21336] ? mutex_lock+0x8d/0x1a0 [ 1001.017416][T21336] ? __cfi_mutex_lock+0x10/0x10 [ 1001.022378][T21336] ? __fdget_pos+0x2cd/0x380 [ 1001.027027][T21336] ? ksys_read+0x71/0x240 [ 1001.031422][T21336] ksys_read+0x140/0x240 [ 1001.035871][T21336] ? __cfi_ksys_read+0x10/0x10 [ 1001.040673][T21336] ? __bpf_trace_sys_enter+0x62/0x70 [ 1001.045976][T21336] __x64_sys_read+0x7b/0x90 [ 1001.050857][T21336] x64_sys_call+0x2f/0x9a0 [ 1001.055334][T21336] do_syscall_64+0x4c/0xa0 [ 1001.059775][T21336] ? clear_bhb_loop+0x30/0x80 [ 1001.064559][T21336] ? clear_bhb_loop+0x30/0x80 [ 1001.069427][T21336] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1001.075373][T21336] RIP: 0033:0x7f46b3d8d5fc [ 1001.079802][T21336] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1001.099678][T21336] RSP: 002b:00007f46b4c5b030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1001.108304][T21336] RAX: ffffffffffffffda RBX: 00007f46b3fc5fa0 RCX: 00007f46b3d8d5fc [ 1001.116397][T21336] RDX: 000000000000000f RSI: 00007f46b4c5b0a0 RDI: 0000000000000006 [ 1001.124382][T21336] RBP: 00007f46b4c5b090 R08: 0000000000000000 R09: 0000000000000000 [ 1001.132378][T21336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1001.140374][T21336] R13: 00007f46b3fc6038 R14: 00007f46b3fc5fa0 R15: 00007ffd409e90a8 [ 1001.148497][T21336] [ 1001.163335][T21342] device pim6reg1 entered promiscuous mode [ 1001.298556][T21350] device pim6reg1 entered promiscuous mode [ 1001.726476][T21361] device pim6reg1 entered promiscuous mode [ 1002.244123][T21378] device pim6reg1 entered promiscuous mode [ 1002.322694][T21382] device pim6reg1 entered promiscuous mode [ 1002.610834][T21393] device pim6reg1 entered promiscuous mode [ 1002.638486][T21396] device pim6reg1 entered promiscuous mode [ 1002.872452][T21402] device pim6reg1 entered promiscuous mode [ 1003.205668][T21414] device pim6reg1 entered promiscuous mode [ 1003.600563][T21427] device pim6reg1 entered promiscuous mode [ 1003.624961][T21429] device pim6reg1 entered promiscuous mode [ 1003.705280][T21435] device pim6reg1 entered promiscuous mode [ 1003.840731][T21444] device pim6reg1 entered promiscuous mode [ 1004.310075][T21465] device pim6reg1 entered promiscuous mode [ 1004.627461][T21478] device pim6reg1 entered promiscuous mode [ 1004.634593][T21484] device pim6reg1 entered promiscuous mode [ 1005.159588][T21508] device pim6reg1 entered promiscuous mode [ 1005.392334][T21514] FAULT_INJECTION: forcing a failure. [ 1005.392334][T21514] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1005.473963][T21514] CPU: 1 PID: 21514 Comm: syz.2.6896 Not tainted syzkaller #0 [ 1005.481500][T21514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1005.491771][T21514] Call Trace: [ 1005.495505][T21514] [ 1005.498444][T21514] __dump_stack+0x21/0x24 [ 1005.502839][T21514] dump_stack_lvl+0xee/0x150 [ 1005.507558][T21514] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1005.512606][T21514] ? queue_stack_map_push_elem+0x336/0x530 [ 1005.518517][T21514] ? _parse_integer+0x2a/0x40 [ 1005.523248][T21514] dump_stack+0x15/0x24 [ 1005.527412][T21514] should_fail_ex+0x3d4/0x520 [ 1005.532104][T21514] should_fail+0xb/0x10 [ 1005.536532][T21514] should_fail_usercopy+0x1a/0x20 [ 1005.541663][T21514] _copy_from_user+0x1e/0xc0 [ 1005.546271][T21514] ___sys_sendmsg+0x155/0x290 [ 1005.551144][T21514] ? __sys_sendmsg+0x270/0x270 [ 1005.556000][T21514] ? timerqueue_add+0x20e/0x230 [ 1005.560874][T21514] ? __fdget+0x19c/0x220 [ 1005.565218][T21514] __x64_sys_sendmsg+0x1f0/0x2c0 [ 1005.570162][T21514] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 1005.575653][T21514] x64_sys_call+0x171/0x9a0 [ 1005.580196][T21514] do_syscall_64+0x4c/0xa0 [ 1005.584749][T21514] ? clear_bhb_loop+0x30/0x80 [ 1005.589530][T21514] ? clear_bhb_loop+0x30/0x80 [ 1005.594228][T21514] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1005.600138][T21514] RIP: 0033:0x7f6afd98ebe9 [ 1005.604675][T21514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1005.624477][T21514] RSP: 002b:00007f6afe8f0038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1005.633089][T21514] RAX: ffffffffffffffda RBX: 00007f6afdbc5fa0 RCX: 00007f6afd98ebe9 [ 1005.641265][T21514] RDX: 0000000000000000 RSI: 0000200000000980 RDI: 0000000000000007 [ 1005.649347][T21514] RBP: 00007f6afe8f0090 R08: 0000000000000000 R09: 0000000000000000 [ 1005.657374][T21514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1005.665450][T21514] R13: 00007f6afdbc6038 R14: 00007f6afdbc5fa0 R15: 00007ffe3a92b8c8 [ 1005.673619][T21514] [ 1005.716938][T21526] device pim6reg1 entered promiscuous mode [ 1005.821921][T21535] device pim6reg1 entered promiscuous mode [ 1006.372389][T21546] device pim6reg1 entered promiscuous mode [ 1006.410698][T21548] device pim6reg1 entered promiscuous mode [ 1006.736045][T21571] FAULT_INJECTION: forcing a failure. [ 1006.736045][T21571] name failslab, interval 1, probability 0, space 0, times 0 [ 1006.755083][T21569] device pim6reg1 entered promiscuous mode [ 1006.779759][T21571] CPU: 0 PID: 21571 Comm: syz.1.6918 Not tainted syzkaller #0 [ 1006.787396][T21571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1006.797613][T21571] Call Trace: [ 1006.800939][T21571] [ 1006.804063][T21571] __dump_stack+0x21/0x24 [ 1006.808500][T21571] dump_stack_lvl+0xee/0x150 [ 1006.813177][T21571] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1006.818346][T21571] ? stack_trace_save+0x98/0xe0 [ 1006.823413][T21571] dump_stack+0x15/0x24 [ 1006.827618][T21571] should_fail_ex+0x3d4/0x520 [ 1006.832425][T21571] __should_failslab+0xac/0xf0 [ 1006.837343][T21571] should_failslab+0x9/0x20 [ 1006.842106][T21571] kmem_cache_alloc_node+0x42/0x340 [ 1006.847346][T21571] ? dup_task_struct+0x5a/0x790 [ 1006.852235][T21571] ? cgroup_freezing+0x86/0xb0 [ 1006.857036][T21571] dup_task_struct+0x5a/0x790 [ 1006.861759][T21571] ? __kasan_check_write+0x14/0x20 [ 1006.866913][T21571] ? recalc_sigpending+0x168/0x1c0 [ 1006.872062][T21571] copy_process+0x5b8/0x3480 [ 1006.876703][T21571] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 1006.882464][T21571] ? __kasan_check_write+0x14/0x20 [ 1006.887624][T21571] ? idle_dummy+0x10/0x10 [ 1006.892077][T21571] kernel_clone+0x23a/0x810 [ 1006.896617][T21571] ? __cfi_kernel_clone+0x10/0x10 [ 1006.901697][T21571] ? __kasan_check_write+0x14/0x20 [ 1006.906877][T21571] ? mutex_unlock+0x89/0x220 [ 1006.911963][T21571] __x64_sys_clone+0x168/0x1b0 [ 1006.916776][T21571] ? __cfi___x64_sys_clone+0x10/0x10 [ 1006.922194][T21571] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 1006.928301][T21571] x64_sys_call+0x990/0x9a0 [ 1006.932846][T21571] do_syscall_64+0x4c/0xa0 [ 1006.937470][T21571] ? clear_bhb_loop+0x30/0x80 [ 1006.942267][T21571] ? clear_bhb_loop+0x30/0x80 [ 1006.947195][T21571] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1006.953122][T21571] RIP: 0033:0x7f733038ebe9 [ 1006.957655][T21571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1006.977994][T21571] RSP: 002b:00007f7331120fe8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 1006.986438][T21571] RAX: ffffffffffffffda RBX: 00007f73305c5fa0 RCX: 00007f733038ebe9 [ 1006.994437][T21571] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000160480 [ 1007.002505][T21571] RBP: 00007f7331121090 R08: 0000000000000000 R09: 0000000000000000 [ 1007.010571][T21571] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 1007.018557][T21571] R13: 00007f73305c6038 R14: 00007f73305c5fa0 R15: 00007ffef3841ae8 [ 1007.026552][T21571] [ 1007.127710][T21575] device sit0 entered promiscuous mode [ 1007.254251][T21584] device pim6reg1 entered promiscuous mode [ 1007.382858][T21590] FAULT_INJECTION: forcing a failure. [ 1007.382858][T21590] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1007.422032][T21590] CPU: 0 PID: 21590 Comm: syz.1.6925 Not tainted syzkaller #0 [ 1007.429754][T21590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1007.439839][T21590] Call Trace: [ 1007.443136][T21590] [ 1007.446082][T21590] __dump_stack+0x21/0x24 [ 1007.450431][T21590] dump_stack_lvl+0xee/0x150 [ 1007.455145][T21590] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1007.460205][T21590] dump_stack+0x15/0x24 [ 1007.464579][T21590] should_fail_ex+0x3d4/0x520 [ 1007.469291][T21590] should_fail+0xb/0x10 [ 1007.473553][T21590] should_fail_usercopy+0x1a/0x20 [ 1007.478608][T21590] _copy_to_user+0x1e/0x90 [ 1007.483130][T21590] simple_read_from_buffer+0xe9/0x160 [ 1007.488515][T21590] proc_fail_nth_read+0x19a/0x210 [ 1007.493755][T21590] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 1007.499438][T21590] ? security_file_permission+0x94/0xb0 [ 1007.505102][T21590] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 1007.510658][T21590] vfs_read+0x26e/0x8c0 [ 1007.514833][T21590] ? __cfi_vfs_read+0x10/0x10 [ 1007.519631][T21590] ? __kasan_check_write+0x14/0x20 [ 1007.524864][T21590] ? mutex_lock+0x8d/0x1a0 [ 1007.529469][T21590] ? __cfi_mutex_lock+0x10/0x10 [ 1007.534419][T21590] ? __fdget_pos+0x2cd/0x380 [ 1007.539034][T21590] ? ksys_read+0x71/0x240 [ 1007.543385][T21590] ksys_read+0x140/0x240 [ 1007.547679][T21590] ? __cfi_ksys_read+0x10/0x10 [ 1007.552459][T21590] ? fpregs_restore_userregs+0x128/0x260 [ 1007.558110][T21590] __x64_sys_read+0x7b/0x90 [ 1007.562724][T21590] x64_sys_call+0x2f/0x9a0 [ 1007.567249][T21590] do_syscall_64+0x4c/0xa0 [ 1007.571688][T21590] ? clear_bhb_loop+0x30/0x80 [ 1007.576509][T21590] ? clear_bhb_loop+0x30/0x80 [ 1007.581311][T21590] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1007.587840][T21590] RIP: 0033:0x7f733038d5fc [ 1007.592349][T21590] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1007.612312][T21590] RSP: 002b:00007f7331121030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1007.620848][T21590] RAX: ffffffffffffffda RBX: 00007f73305c5fa0 RCX: 00007f733038d5fc [ 1007.628961][T21590] RDX: 000000000000000f RSI: 00007f73311210a0 RDI: 0000000000000009 [ 1007.636958][T21590] RBP: 00007f7331121090 R08: 0000000000000000 R09: 0000000000000000 [ 1007.644941][T21590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1007.653186][T21590] R13: 00007f73305c6038 R14: 00007f73305c5fa0 R15: 00007ffef3841ae8 [ 1007.661196][T21590] [ 1007.704378][T21603] FAULT_INJECTION: forcing a failure. [ 1007.704378][T21603] name failslab, interval 1, probability 0, space 0, times 0 [ 1007.718032][T21603] CPU: 1 PID: 21603 Comm: syz.4.6931 Not tainted syzkaller #0 [ 1007.725638][T21603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1007.735808][T21603] Call Trace: [ 1007.739113][T21603] [ 1007.742067][T21603] __dump_stack+0x21/0x24 [ 1007.746516][T21603] dump_stack_lvl+0xee/0x150 [ 1007.751284][T21603] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1007.756403][T21603] dump_stack+0x15/0x24 [ 1007.760629][T21603] should_fail_ex+0x3d4/0x520 [ 1007.765504][T21603] __should_failslab+0xac/0xf0 [ 1007.770382][T21603] ? slhc_init+0x77/0x770 [ 1007.774734][T21603] should_failslab+0x9/0x20 [ 1007.779262][T21603] __kmem_cache_alloc_node+0x3d/0x2c0 [ 1007.784649][T21603] ? security_file_permission+0x94/0xb0 [ 1007.790299][T21603] ? slhc_init+0x77/0x770 [ 1007.794659][T21603] kmalloc_trace+0x29/0xb0 [ 1007.799114][T21603] slhc_init+0x77/0x770 [ 1007.803403][T21603] ppp_ioctl+0x126d/0x1690 [ 1007.807930][T21603] ? mutex_unlock+0x89/0x220 [ 1007.812563][T21603] ? __cfi_mutex_unlock+0x10/0x10 [ 1007.817621][T21603] ? __cfi_ppp_ioctl+0x10/0x10 [ 1007.822413][T21603] ? __fget_files+0x2d5/0x330 [ 1007.827103][T21603] ? security_file_ioctl+0x95/0xc0 [ 1007.832244][T21603] ? __cfi_ppp_ioctl+0x10/0x10 [ 1007.837285][T21603] __se_sys_ioctl+0x12f/0x1b0 [ 1007.841988][T21603] __x64_sys_ioctl+0x7b/0x90 [ 1007.846598][T21603] x64_sys_call+0x58b/0x9a0 [ 1007.851152][T21603] do_syscall_64+0x4c/0xa0 [ 1007.855612][T21603] ? clear_bhb_loop+0x30/0x80 [ 1007.860424][T21603] ? clear_bhb_loop+0x30/0x80 [ 1007.865293][T21603] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1007.871397][T21603] RIP: 0033:0x7fc0ed58ebe9 [ 1007.875827][T21603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1007.895968][T21603] RSP: 002b:00007fc0ee34e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1007.904751][T21603] RAX: ffffffffffffffda RBX: 00007fc0ed7c5fa0 RCX: 00007fc0ed58ebe9 [ 1007.912925][T21603] RDX: 0000200000000180 RSI: 0000000040047451 RDI: 0000000000000003 [ 1007.920908][T21603] RBP: 00007fc0ee34e090 R08: 0000000000000000 R09: 0000000000000000 [ 1007.928888][T21603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1007.936956][T21603] R13: 00007fc0ed7c6038 R14: 00007fc0ed7c5fa0 R15: 00007ffc2062ccd8 [ 1007.944949][T21603] [ 1008.220552][T21625] device pim6reg1 entered promiscuous mode [ 1008.235150][T21619] device pim6reg1 entered promiscuous mode [ 1008.399456][T21633] device pim6reg1 entered promiscuous mode [ 1008.473436][T21636] FAULT_INJECTION: forcing a failure. [ 1008.473436][T21636] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1008.508604][T21636] CPU: 1 PID: 21636 Comm: syz.4.6944 Not tainted syzkaller #0 [ 1008.516315][T21636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1008.526418][T21636] Call Trace: [ 1008.529736][T21636] [ 1008.532712][T21636] __dump_stack+0x21/0x24 [ 1008.537098][T21636] dump_stack_lvl+0xee/0x150 [ 1008.541763][T21636] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1008.546879][T21636] dump_stack+0x15/0x24 [ 1008.551150][T21636] should_fail_ex+0x3d4/0x520 [ 1008.556072][T21636] should_fail+0xb/0x10 [ 1008.560577][T21636] should_fail_usercopy+0x1a/0x20 [ 1008.565754][T21636] _copy_to_user+0x1e/0x90 [ 1008.570224][T21636] simple_read_from_buffer+0xe9/0x160 [ 1008.575847][T21636] proc_fail_nth_read+0x19a/0x210 [ 1008.580933][T21636] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 1008.586631][T21636] ? security_file_permission+0x94/0xb0 [ 1008.592248][T21636] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 1008.597953][T21636] vfs_read+0x26e/0x8c0 [ 1008.602347][T21636] ? __cfi_vfs_read+0x10/0x10 [ 1008.607119][T21636] ? __kasan_check_write+0x14/0x20 [ 1008.612381][T21636] ? mutex_lock+0x8d/0x1a0 [ 1008.616946][T21636] ? __cfi_mutex_lock+0x10/0x10 [ 1008.622117][T21636] ? __fdget_pos+0x2cd/0x380 [ 1008.626765][T21636] ? ksys_read+0x71/0x240 [ 1008.631174][T21636] ksys_read+0x140/0x240 [ 1008.635560][T21636] ? __cfi_ksys_read+0x10/0x10 [ 1008.640479][T21636] ? debug_smp_processor_id+0x17/0x20 [ 1008.645994][T21636] __x64_sys_read+0x7b/0x90 [ 1008.650654][T21636] x64_sys_call+0x2f/0x9a0 [ 1008.655123][T21636] do_syscall_64+0x4c/0xa0 [ 1008.659675][T21636] ? clear_bhb_loop+0x30/0x80 [ 1008.664419][T21636] ? clear_bhb_loop+0x30/0x80 [ 1008.669244][T21636] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1008.675204][T21636] RIP: 0033:0x7fc0ed58d5fc [ 1008.679761][T21636] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1008.699544][T21636] RSP: 002b:00007fc0ee34e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1008.708204][T21636] RAX: ffffffffffffffda RBX: 00007fc0ed7c5fa0 RCX: 00007fc0ed58d5fc [ 1008.716490][T21636] RDX: 000000000000000f RSI: 00007fc0ee34e0a0 RDI: 0000000000000008 [ 1008.724686][T21636] RBP: 00007fc0ee34e090 R08: 0000000000000000 R09: 0000000000000000 [ 1008.732790][T21636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1008.740899][T21636] R13: 00007fc0ed7c6038 R14: 00007fc0ed7c5fa0 R15: 00007ffc2062ccd8 [ 1008.748943][T21636] [ 1008.783091][T21643] FAULT_INJECTION: forcing a failure. [ 1008.783091][T21643] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1008.873902][T21643] CPU: 0 PID: 21643 Comm: syz.2.6947 Not tainted syzkaller #0 [ 1008.881532][T21643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1008.891636][T21643] Call Trace: [ 1008.895034][T21643] [ 1008.898013][T21643] __dump_stack+0x21/0x24 [ 1008.902388][T21643] dump_stack_lvl+0xee/0x150 [ 1008.907181][T21643] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1008.912447][T21643] dump_stack+0x15/0x24 [ 1008.916871][T21643] should_fail_ex+0x3d4/0x520 [ 1008.921609][T21643] should_fail+0xb/0x10 [ 1008.925894][T21643] should_fail_usercopy+0x1a/0x20 [ 1008.930976][T21643] _copy_from_user+0x1e/0xc0 [ 1008.935631][T21643] __sys_bpf+0x277/0x780 [ 1008.939907][T21643] ? bpf_link_show_fdinfo+0x320/0x320 [ 1008.945413][T21643] ? __cfi_ksys_write+0x10/0x10 [ 1008.950313][T21643] ? debug_smp_processor_id+0x17/0x20 [ 1008.955735][T21643] __x64_sys_bpf+0x7c/0x90 [ 1008.960242][T21643] x64_sys_call+0x488/0x9a0 [ 1008.964793][T21643] do_syscall_64+0x4c/0xa0 [ 1008.969244][T21643] ? clear_bhb_loop+0x30/0x80 [ 1008.973959][T21643] ? clear_bhb_loop+0x30/0x80 [ 1008.978678][T21643] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1008.984610][T21643] RIP: 0033:0x7f6afd98ebe9 [ 1008.989064][T21643] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1009.008792][T21643] RSP: 002b:00007f6afe8f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1009.017333][T21643] RAX: ffffffffffffffda RBX: 00007f6afdbc5fa0 RCX: 00007f6afd98ebe9 [ 1009.025470][T21643] RDX: 0000000000000038 RSI: 0000200000000340 RDI: 000000000000001a [ 1009.033545][T21643] RBP: 00007f6afe8f0090 R08: 0000000000000000 R09: 0000000000000000 [ 1009.041560][T21643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1009.049655][T21643] R13: 00007f6afdbc6038 R14: 00007f6afdbc5fa0 R15: 00007ffe3a92b8c8 [ 1009.057846][T21643] [ 1009.153522][T21657] device pim6reg1 entered promiscuous mode [ 1009.161193][T21655] device pim6reg1 entered promiscuous mode [ 1009.184326][T21659] device pim6reg1 entered promiscuous mode [ 1009.294858][T21672] FAULT_INJECTION: forcing a failure. [ 1009.294858][T21672] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1009.309330][T21672] CPU: 1 PID: 21672 Comm: syz.3.6959 Not tainted syzkaller #0 [ 1009.316863][T21672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1009.326957][T21672] Call Trace: [ 1009.330261][T21672] [ 1009.333214][T21672] __dump_stack+0x21/0x24 [ 1009.337573][T21672] dump_stack_lvl+0xee/0x150 [ 1009.342224][T21672] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1009.347292][T21672] dump_stack+0x15/0x24 [ 1009.351470][T21672] should_fail_ex+0x3d4/0x520 [ 1009.356430][T21672] should_fail+0xb/0x10 [ 1009.360595][T21672] should_fail_usercopy+0x1a/0x20 [ 1009.365659][T21672] _copy_from_user+0x1e/0xc0 [ 1009.370442][T21672] __sys_bpf+0x277/0x780 [ 1009.374821][T21672] ? bpf_link_show_fdinfo+0x320/0x320 [ 1009.380225][T21672] ? __cfi_ksys_write+0x10/0x10 [ 1009.385189][T21672] ? debug_smp_processor_id+0x17/0x20 [ 1009.390660][T21672] __x64_sys_bpf+0x7c/0x90 [ 1009.395107][T21672] x64_sys_call+0x488/0x9a0 [ 1009.399623][T21672] do_syscall_64+0x4c/0xa0 [ 1009.404052][T21672] ? clear_bhb_loop+0x30/0x80 [ 1009.408832][T21672] ? clear_bhb_loop+0x30/0x80 [ 1009.413962][T21672] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1009.419976][T21672] RIP: 0033:0x7f46b3d8ebe9 [ 1009.424416][T21672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1009.444460][T21672] RSP: 002b:00007f46b4c5b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1009.453016][T21672] RAX: ffffffffffffffda RBX: 00007f46b3fc5fa0 RCX: 00007f46b3d8ebe9 [ 1009.461270][T21672] RDX: 0000000000000010 RSI: 0000200000000040 RDI: 0000000000000011 [ 1009.469508][T21672] RBP: 00007f46b4c5b090 R08: 0000000000000000 R09: 0000000000000000 [ 1009.477610][T21672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1009.485790][T21672] R13: 00007f46b3fc6038 R14: 00007f46b3fc5fa0 R15: 00007ffd409e90a8 [ 1009.494254][T21672] [ 1009.692374][T21691] device pim6reg1 entered promiscuous mode [ 1009.725976][T21695] FAULT_INJECTION: forcing a failure. [ 1009.725976][T21695] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1009.745884][T21693] device pim6reg1 entered promiscuous mode [ 1009.803785][T21695] CPU: 0 PID: 21695 Comm: syz.4.6968 Not tainted syzkaller #0 [ 1009.811333][T21695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1009.821859][T21695] Call Trace: [ 1009.825179][T21695] [ 1009.828225][T21695] __dump_stack+0x21/0x24 [ 1009.832687][T21695] dump_stack_lvl+0xee/0x150 [ 1009.837485][T21695] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1009.842742][T21695] dump_stack+0x15/0x24 [ 1009.847018][T21695] should_fail_ex+0x3d4/0x520 [ 1009.852006][T21695] should_fail+0xb/0x10 [ 1009.856295][T21695] should_fail_usercopy+0x1a/0x20 [ 1009.861401][T21695] _copy_from_user+0x1e/0xc0 [ 1009.866038][T21695] __sys_bpf+0x277/0x780 [ 1009.870357][T21695] ? bpf_link_show_fdinfo+0x320/0x320 [ 1009.875768][T21695] ? __cfi_ksys_write+0x10/0x10 [ 1009.880665][T21695] ? debug_smp_processor_id+0x17/0x20 [ 1009.886079][T21695] __x64_sys_bpf+0x7c/0x90 [ 1009.890544][T21695] x64_sys_call+0x488/0x9a0 [ 1009.895185][T21695] do_syscall_64+0x4c/0xa0 [ 1009.899642][T21695] ? clear_bhb_loop+0x30/0x80 [ 1009.904407][T21695] ? clear_bhb_loop+0x30/0x80 [ 1009.909224][T21695] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1009.915252][T21695] RIP: 0033:0x7fc0ed58ebe9 [ 1009.919708][T21695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1009.939868][T21695] RSP: 002b:00007fc0ee34e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1009.948765][T21695] RAX: ffffffffffffffda RBX: 00007fc0ed7c5fa0 RCX: 00007fc0ed58ebe9 [ 1009.956883][T21695] RDX: 0000000000000010 RSI: 0000200000000040 RDI: 0000000000000011 [ 1009.965004][T21695] RBP: 00007fc0ee34e090 R08: 0000000000000000 R09: 0000000000000000 [ 1009.973053][T21695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1009.981235][T21695] R13: 00007fc0ed7c6038 R14: 00007fc0ed7c5fa0 R15: 00007ffc2062ccd8 [ 1009.989255][T21695] [ 1010.157199][T21707] device pim6reg1 entered promiscuous mode [ 1010.644583][T21727] FAULT_INJECTION: forcing a failure. [ 1010.644583][T21727] name failslab, interval 1, probability 0, space 0, times 0 [ 1010.693760][T21727] CPU: 1 PID: 21727 Comm: syz.2.6979 Not tainted syzkaller #0 [ 1010.701344][T21727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1010.711703][T21727] Call Trace: [ 1010.715101][T21727] [ 1010.718216][T21727] __dump_stack+0x21/0x24 [ 1010.722675][T21727] dump_stack_lvl+0xee/0x150 [ 1010.727401][T21727] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1010.732522][T21727] ? stack_trace_save+0x98/0xe0 [ 1010.737432][T21727] dump_stack+0x15/0x24 [ 1010.741643][T21727] should_fail_ex+0x3d4/0x520 [ 1010.746556][T21727] __should_failslab+0xac/0xf0 [ 1010.751377][T21727] should_failslab+0x9/0x20 [ 1010.756102][T21727] kmem_cache_alloc_node+0x42/0x340 [ 1010.761349][T21727] ? dup_task_struct+0x5a/0x790 [ 1010.766366][T21727] ? cgroup_freezing+0x86/0xb0 [ 1010.771790][T21727] dup_task_struct+0x5a/0x790 [ 1010.776695][T21727] ? __kasan_check_write+0x14/0x20 [ 1010.781874][T21727] ? recalc_sigpending+0x168/0x1c0 [ 1010.787080][T21727] copy_process+0x5b8/0x3480 [ 1010.791812][T21727] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 1010.797592][T21727] ? __kasan_check_write+0x14/0x20 [ 1010.802760][T21727] ? idle_dummy+0x10/0x10 [ 1010.807155][T21727] kernel_clone+0x23a/0x810 [ 1010.811726][T21727] ? __cfi_kernel_clone+0x10/0x10 [ 1010.816866][T21727] ? __kasan_check_write+0x14/0x20 [ 1010.822016][T21727] ? mutex_unlock+0x89/0x220 [ 1010.826729][T21727] __x64_sys_clone+0x168/0x1b0 [ 1010.831598][T21727] ? __cfi___x64_sys_clone+0x10/0x10 [ 1010.836910][T21727] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 1010.843078][T21727] x64_sys_call+0x990/0x9a0 [ 1010.847607][T21727] do_syscall_64+0x4c/0xa0 [ 1010.852035][T21727] ? clear_bhb_loop+0x30/0x80 [ 1010.856722][T21727] ? clear_bhb_loop+0x30/0x80 [ 1010.861413][T21727] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1010.867330][T21727] RIP: 0033:0x7f6afd98ebe9 [ 1010.871750][T21727] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1010.891379][T21727] RSP: 002b:00007f6afe8effe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1010.899842][T21727] RAX: ffffffffffffffda RBX: 00007f6afdbc5fa0 RCX: 00007f6afd98ebe9 [ 1010.908016][T21727] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 1010.916000][T21727] RBP: 00007f6afe8f0090 R08: 0000000000000000 R09: 0000000000000000 [ 1010.924109][T21727] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1010.932284][T21727] R13: 00007f6afdbc6038 R14: 00007f6afdbc5fa0 R15: 00007ffe3a92b8c8 [ 1010.940271][T21727] [ 1010.967822][T21738] device pim6reg1 entered promiscuous mode [ 1011.205483][T21752] device pim6reg1 entered promiscuous mode [ 1011.277442][T21756] device sit0 left promiscuous mode [ 1011.478348][T21754] device pim6reg1 entered promiscuous mode [ 1011.700316][T21786] FAULT_INJECTION: forcing a failure. [ 1011.700316][T21786] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1011.777499][T21786] CPU: 1 PID: 21786 Comm: syz.2.6999 Not tainted syzkaller #0 [ 1011.785030][T21786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1011.795310][T21786] Call Trace: [ 1011.798612][T21786] [ 1011.801590][T21786] __dump_stack+0x21/0x24 [ 1011.805951][T21786] dump_stack_lvl+0xee/0x150 [ 1011.810590][T21786] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1011.815677][T21786] dump_stack+0x15/0x24 [ 1011.819853][T21786] should_fail_ex+0x3d4/0x520 [ 1011.824661][T21786] should_fail+0xb/0x10 [ 1011.828855][T21786] should_fail_usercopy+0x1a/0x20 [ 1011.834090][T21786] _copy_from_user+0x1e/0xc0 [ 1011.838721][T21786] __sys_bpf+0x277/0x780 [ 1011.843081][T21786] ? bpf_link_show_fdinfo+0x320/0x320 [ 1011.848656][T21786] ? __cfi_ksys_write+0x10/0x10 [ 1011.853565][T21786] ? debug_smp_processor_id+0x17/0x20 [ 1011.859070][T21786] __x64_sys_bpf+0x7c/0x90 [ 1011.863542][T21786] x64_sys_call+0x488/0x9a0 [ 1011.868096][T21786] do_syscall_64+0x4c/0xa0 [ 1011.872551][T21786] ? clear_bhb_loop+0x30/0x80 [ 1011.877263][T21786] ? clear_bhb_loop+0x30/0x80 [ 1011.881993][T21786] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1011.887926][T21786] RIP: 0033:0x7f6afd98ebe9 [ 1011.892375][T21786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1011.912342][T21786] RSP: 002b:00007f6afe8f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1011.920875][T21786] RAX: ffffffffffffffda RBX: 00007f6afdbc5fa0 RCX: 00007f6afd98ebe9 [ 1011.928875][T21786] RDX: 0000000000000050 RSI: 0000200000000340 RDI: 000000000000000a [ 1011.936952][T21786] RBP: 00007f6afe8f0090 R08: 0000000000000000 R09: 0000000000000000 [ 1011.944943][T21786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1011.953297][T21786] R13: 00007f6afdbc6038 R14: 00007f6afdbc5fa0 R15: 00007ffe3a92b8c8 [ 1011.961465][T21786] [ 1012.324476][T21809] FAULT_INJECTION: forcing a failure. [ 1012.324476][T21809] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1012.470880][T21809] CPU: 1 PID: 21809 Comm: syz.3.7006 Not tainted syzkaller #0 [ 1012.478482][T21809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1012.488677][T21809] Call Trace: [ 1012.492076][T21809] [ 1012.495032][T21809] __dump_stack+0x21/0x24 [ 1012.499393][T21809] dump_stack_lvl+0xee/0x150 [ 1012.504065][T21809] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1012.509312][T21809] dump_stack+0x15/0x24 [ 1012.513506][T21809] should_fail_ex+0x3d4/0x520 [ 1012.518345][T21809] should_fail+0xb/0x10 [ 1012.522554][T21809] should_fail_usercopy+0x1a/0x20 [ 1012.527789][T21809] _copy_from_user+0x1e/0xc0 [ 1012.532423][T21809] __sys_bpf+0x277/0x780 [ 1012.536869][T21809] ? bpf_link_show_fdinfo+0x320/0x320 [ 1012.542278][T21809] ? __cfi_sched_clock_cpu+0x10/0x10 [ 1012.547616][T21809] __x64_sys_bpf+0x7c/0x90 [ 1012.552365][T21809] x64_sys_call+0x488/0x9a0 [ 1012.556929][T21809] do_syscall_64+0x4c/0xa0 [ 1012.561372][T21809] ? clear_bhb_loop+0x30/0x80 [ 1012.566088][T21809] ? clear_bhb_loop+0x30/0x80 [ 1012.570925][T21809] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1012.577024][T21809] RIP: 0033:0x7f46b3d8ebe9 [ 1012.581564][T21809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1012.601805][T21809] RSP: 002b:00007f46b4c3a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1012.610353][T21809] RAX: ffffffffffffffda RBX: 00007f46b3fc6090 RCX: 00007f46b3d8ebe9 [ 1012.618471][T21809] RDX: 0000000000000094 RSI: 0000200000000840 RDI: 0000000000000005 [ 1012.626471][T21809] RBP: 00007f46b4c3a090 R08: 0000000000000000 R09: 0000000000000000 [ 1012.634473][T21809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1012.642660][T21809] R13: 00007f46b3fc6128 R14: 00007f46b3fc6090 R15: 00007ffd409e90a8 [ 1012.650663][T21809] [ 1012.696413][T21818] device pim6reg1 entered promiscuous mode