last executing test programs: 6.523547414s ago: executing program 4 (id=6779): bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sys_enter\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x0, 0x2}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x3000000, 0x12, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200}, 0x28) 6.487952485s ago: executing program 0 (id=6780): bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80000000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x4}, 0x50) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x0, 0x0, 0x0, 0x9, 0xfd, &(0x7f0000000280)=""/253, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3ff}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x0, 0x0, 0x27, 0x0, &(0x7f0000000540)=""/39, 0x77, 0x0, 0x9, 0x92, &(0x7f0000000580)="66f82c32b0030305f0", &(0x7f0000000680)="e87e0c48196362ba8fbf015bd3825c4b957a93b76d2f16a99d909ca245f9e0b357e3a58c8191b5fd3dc088a4d25c70449145a52f5416012257b5307bf956e6a04ec736c28b4ce45be855778b9b37889b97e04f07bf094b0a44588bc9324d075a0fdd259a1ed49ef5b883dbf3cf867eaca970fcc909d0eed869c69ab9983fc5822342e6804d54d0f5480de966dc4f42800d83", 0x4, 0x0, 0xffd}, 0x50) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a00000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="0000b4150000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000020b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x24008081}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x20000000000001d1, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x0, 0x1, 0x40}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x26, 0x2, 0xa, &(0x7f00000004c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r0, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000640)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f00000007c0)=[0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8e, &(0x7f0000000840)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x76, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f0000000b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x15b, 0x15b, 0xc, [@enum={0x10, 0x4, 0x0, 0x6, 0x4, [{0x10, 0x2127}, {0x6, 0x9}, {0x3, 0x5}, {0xa, 0xd}]}, @const={0x3, 0x0, 0x0, 0xa, 0x2}, @typedef={0xc, 0x0, 0x0, 0x8, 0x3}, @type_tag={0xf, 0x0, 0x0, 0x12, 0x1}, @union={0x1, 0x3, 0x0, 0x5, 0x0, 0xddd, [{0x7, 0x0, 0x4}, {0x0, 0x1, 0x10001}, {0x0, 0x2, 0x4357800}]}, @datasec={0x5, 0x9, 0x0, 0xf, 0x3, [{0x2, 0x1, 0x6}, {0x1, 0x1f41, 0x4}, {0x3, 0x7, 0x1}, {0x2, 0xff, 0xffffffff}, {0x1, 0x3, 0x5}, {0x4, 0x7, 0x7}, {0x1, 0xe, 0x8}, {0x1, 0x2}, {0x3, 0x80000000, 0x8000}], "3ce839"}, @fwd={0x5}, @struct={0xf, 0x3, 0x0, 0x4, 0x1, 0x6, [{0x4}, {0x6, 0x1, 0x401}, {0x0, 0x1}]}, @enum={0x4, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x3}]}, @var={0xa, 0x0, 0x0, 0xe, 0x2, 0x2}]}, {0x0, [0x30, 0x30, 0x2e, 0x0, 0x1e, 0x5f, 0x30, 0x5f, 0x0, 0x2e]}}, &(0x7f0000000cc0)=""/4096, 0x180, 0x1000, 0x0, 0x2, 0x10000}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000001d80)={0x11, 0x7, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2efe}, [@jmp={0x5, 0x0, 0x7, 0x2, 0x1, 0xfffffffffffffffc, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x10}]}, &(0x7f00000001c0)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x63, '\x00', r6, @fallback=0x30, r7, 0x8, &(0x7f0000000ac0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000001cc0)=[r1, r3], &(0x7f0000001d00)=[{0x2, 0x3, 0xa, 0x5}, {0x2, 0x5, 0x5, 0x8}, {0x1, 0x1, 0xd, 0x1}, {0x0, 0x3, 0x6, 0x3}, {0x5, 0x3, 0xb}, {0x5, 0x4, 0x2, 0x4}, {0x2, 0x1, 0x2, 0x2}], 0x10, 0x6}, 0x94) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) 5.913906756s ago: executing program 4 (id=6783): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) 5.757747909s ago: executing program 4 (id=6784): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000feffffff00000000000000001801000020646c4200000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000002300000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r0}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 5.657092601s ago: executing program 4 (id=6785): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x12, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, 0xb}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@fallback=r0, 0x15, 0x0, 0x1, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f0000000400), 0x0}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@ifindex=r2, r0, 0x29, 0x16, 0x0, @void, @value=r0, @void, @void, r1}, 0x20) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x87, 0x87, 0xb, [@struct={0xe, 0x3, 0x0, 0x4, 0x0, 0x1ff, [{0xc, 0x3, 0x7e1}, {0x3, 0x4, 0x401}, {0xc, 0x4, 0x4}]}, @ptr={0x8, 0x0, 0x0, 0x2, 0x2}, @struct={0xc, 0x3, 0x0, 0x4, 0x0, 0x5, [{0x1, 0x1, 0x8001}, {0x6, 0x0, 0x6}, {0xb, 0x4, 0x1b}]}, @datasec={0x9, 0x1, 0x0, 0xf, 0x3, [{0x3, 0x2, 0x1}], "d17657"}]}, {0x0, [0x2e, 0x30, 0x30, 0x5f, 0x30, 0x0, 0x61, 0x71, 0x61]}}, &(0x7f00000004c0)=""/180, 0xab, 0xb4, 0x0, 0x1}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x8, &(0x7f0000000040)=@raw=[@alu={0x4, 0x1, 0xc, 0xe, 0x0, 0x4, 0x10}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x4}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}, @exit, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffd}], &(0x7f00000001c0)='syzkaller\x00', 0x5, 0xca, &(0x7f00000005c0)=""/202, 0x41100, 0x6, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000280)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x5, 0x101, 0x8}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000006c0)=[0x1], &(0x7f0000000780)=[{0x5, 0x1, 0x4, 0xc}, {0x4, 0x5, 0x7, 0x6}, {0x3, 0x3, 0x3, 0x7}, {0x1, 0x1, 0xd, 0x8}, {0x2, 0x5, 0xe, 0x4}, {0x1, 0x2, 0x3, 0x5}], 0x10, 0xfa}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xbd, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r7, &(0x7f0000000980), 0x20000992) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) 5.318154247s ago: executing program 0 (id=6786): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000340)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @sk_skb}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000300)={0x0, r1}, 0x8) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x10, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) close(r5) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00'}, 0x10) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x10) syz_clone(0x500, 0x0, 0x0, 0x0, 0x0, 0x0) 4.68030445s ago: executing program 2 (id=6789): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa1000000000000e1090000f8ffffffb702000008000000b703000000000000850000000600000085000000070000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b707000008000000850000006900000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) sendmsg$sock(r5, &(0x7f0000000540)={&(0x7f0000000140)=@generic={0x26, "81eb69a718a31f897028afcb71c794d5bde11e80a45e12b43275bce5d2ed534b34dd0d80bd0f5ea9239c861be7f5039b699fc4868260849da3ec932d78298f08854fe817ab1185a31da01edaa1a0584b627f59976ad954fe1041ee6b40af9c31ed38bf99a0dc31ed0c27d8787c2e16f22d1d3759392ddeae2c188c3e1734"}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000400)}, {&(0x7f0000000480)="8eb80d61b0931e52ce90079dad5e4f4c280d395aef06f58a1602aec9a8136920f28a98eeaaf1e6d35db7a63c5f920017e441c17235cf9ec38d05bf899c81c056de84f1ae0172abf57edb86a7d814dcec116f5fabcd05c537", 0x58}], 0x2}, 0x40004) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="09000000070000000080000001", @ANYRES64=r3, @ANYRES64=r3, @ANYRES16=r4, @ANYBLOB="abee0ad91fe53c96e90290d6b18c9af914e9935bc7234f918cbe8f3daaf221fc5653a66db847677b7520952baf774322660ff5f7cee04668ce36111661cb61498f1bb7112380c1ae3b0d7f6be74f9d30068e522a106bf8502489413c12e10e7ad38e89b7fb79080935624ba35777f5eb319d3d8ba382e443bf2512b0fa6e344ed01d885dfa1f84cd59bb733e583c89a6fd2e6e465065cb9b0da5d21fbe416dd4fa1cc422788fb190445ddf347996b31087e579128623a94e481f31b4755dec0f8ec15c1a94021ddb5a730463847ecbfca9fdd4ee92ebf7ddef6efdd55066c3c9cf233bfc722d3154c282e1", @ANYBLOB, @ANYRESDEC=r3], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r8}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000000)='kmem_cache_free\x00', r9}, 0x18) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r10, 0xffffffffffffffff, 0x4, r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1c, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="85100000640d0040"], &(0x7f00000001c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r12}, 0x94) ioctl$SIOCSIFHWADDR(r11, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r13, 0x702, 0xe, 0xff0f, &(0x7f0000000540)="e460334470b8d480eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000001c0)) 4.597286171s ago: executing program 4 (id=6790): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000150000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) close(r0) 4.370735206s ago: executing program 4 (id=6791): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8148}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.empty_time\x00', 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1801000000050000000000000000ea04850000000700000095"], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000001c0), 0x12) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) 4.301557137s ago: executing program 3 (id=6793): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='task_newtask\x00', r1}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x803e, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000210000000000000504000000002e"], 0x0, 0x37}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0, 0x8}, 0x512b, 0x5, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={@map, 0x31, 0x1, 0x6, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)}, 0x40) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r4}, 0x38) 4.051199572s ago: executing program 2 (id=6794): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000940)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0], 0x0, 0x63, &(0x7f0000000400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x93, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00"/20, @ANYRES32=r0, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0500000004000201f8749dfefff50000001000c753bdb4000000"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x9, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0xa64e0a074e29c63f, 0x4, 0x0, 0x8}, @ldst={0x2, 0x3, 0x3, 0x0, 0x1, 0x8, 0x4}, @generic={0x10, 0x7, 0x5, 0x9, 0xb}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xb5}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @jmp={0x5, 0x0, 0x1, 0xb, 0x3, 0xfffffffffffffffe, 0x4}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x6f, &(0x7f0000000180)=""/111, 0x41100, 0xa, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000007c0)=[r2], &(0x7f00000008c0)=[{0x4, 0x5, 0x8, 0x8}, {0x3, 0x5, 0x1}, {0x5, 0x4, 0x8, 0x6}, {0x2, 0x2, 0x4}, {0x0, 0x3, 0x10, 0x2}, {0x0, 0x5, 0xd, 0x2}, {0x4, 0x5, 0xf, 0x6}, {0x0, 0x3, 0x5, 0xa}], 0x10, 0x80000000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x2}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000b00)=@generic={&(0x7f0000000ac0)='./file0\x00', r0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0xc001}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x17) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r7}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 3.938457754s ago: executing program 1 (id=6795): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000feffffff00000000000000001801000020646c4200000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000002300000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r0}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 3.877568635s ago: executing program 1 (id=6796): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001040)={0x2, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000001000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000500)={r1, 0x2000000, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000000000020519b193904f00000", @ANYRESDEC=r0, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000400008d0000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r6}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="180200008100000000000000a08100008500000027000000b7080000000000007b8af8ff00000000b7080000feffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000800000085000000a5000000950000000000f8"], &(0x7f0000000080)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000001280), 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000300009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 3.864458755s ago: executing program 2 (id=6797): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000300)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) (fail_nth: 70) 3.721573318s ago: executing program 2 (id=6798): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa1000000000000e1090000f8ffffffb702000008000000b703000000000000850000000600000085000000070000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b707000008000000850000006900000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) sendmsg$sock(r5, &(0x7f0000000540)={&(0x7f0000000140)=@generic={0x26, "81eb69a718a31f897028afcb71c794d5bde11e80a45e12b43275bce5d2ed534b34dd0d80bd0f5ea9239c861be7f5039b699fc4868260849da3ec932d78298f08854fe817ab1185a31da01edaa1a0584b627f59976ad954fe1041ee6b40af9c31ed38bf99a0dc31ed0c27d8787c2e16f22d1d3759392ddeae2c188c3e1734"}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000400)}, {&(0x7f0000000480)="8eb80d61b0931e52ce90079dad5e4f4c280d395aef06f58a1602aec9a8136920f28a98eeaaf1e6d35db7a63c5f920017e441c17235cf9ec38d05bf899c81c056de84f1ae0172abf57edb86a7d814dcec116f5fabcd05c537", 0x58}], 0x2}, 0x40004) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="09000000070000000080000001", @ANYRES64=r3, @ANYRES64=r3, @ANYRES16=r4, @ANYBLOB="abee0ad91fe53c96e90290d6b18c9af914e9935bc7234f918cbe8f3daaf221fc5653a66db847677b7520952baf774322660ff5f7cee04668ce36111661cb61498f1bb7112380c1ae3b0d7f6be74f9d30068e522a106bf8502489413c12e10e7ad38e89b7fb79080935624ba35777f5eb319d3d8ba382e443bf2512b0fa6e344ed01d885dfa1f84cd59bb733e583c89a6fd2e6e465065cb9b0da5d21fbe416dd4fa1cc422788fb190445ddf347996b31087e579128623a94e481f31b4755dec0f8ec15c1a94021ddb5a730463847ecbfca9fdd4ee92ebf7ddef6efdd55066c3c9cf233bfc722d3154c282e1", @ANYBLOB, @ANYRESDEC=r3], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r8}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000000)='kmem_cache_free\x00', r9}, 0x18) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r10, 0xffffffffffffffff, 0x4, r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1c, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="85100000640d0040"], &(0x7f00000001c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r12}, 0x94) ioctl$SIOCSIFHWADDR(r11, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r13, 0x702, 0xe, 0xff0f, &(0x7f0000000540)="e460334470b8d480eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000001c0)) 3.393164535s ago: executing program 3 (id=6799): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x599, 0x1, 0x0, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r0, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0], 0x0, 0x4a, &(0x7f0000000580)=[{}, {}], 0x10, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x7e, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_pid(r4, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0xfff, '\x00', r3, r4, 0x4, 0x5, 0x3}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r2, 0x0, 0x1ba8847c99}, 0x38) sendmsg(r4, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000980)="8ed270ad79df3a968a5beccfb5fe7fb673142faf60efe73e93830063e1183ab8e34fe00b2f9b7252a1b36eb79c703062452a0e3b6fbdc6728295a94c8a32ad55d6bae441622d70e61842f339fc93e552d55065fa75777e35e53672562cd5", 0x5e}], 0x1, &(0x7f0000001340)=[{0xc0, 0x11, 0x4, "00d27db8de982503d99a460bcef349628ef85b0d1552bd741bc608cfd6b52201a3a0ad8aa91a048ef72deb8fa9525b691015117f0467e697f73e6a7bd3085f8e680d657c021428e34ada4579a339d29f4e92727f3860350682659e50a04f7d079b36332377413680522022ee198f1f134e7c2dde6073506eb28c5242fe841ee924f741c260a47f5db5ca39798dc9e6c62fcf9301d72980b453caabf64d7d531bcebd5dd33fef70cf16dfa3ab4c"}, {0x1010, 0x117, 0x1, "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"}, {0x38, 0x113, 0xfffff249, "ca918353e704564ef4e33263c9f796ffae1a8b2c73bb9a8bca753783698403a2d1ed"}, {0x28, 0x0, 0x7ff, "e34255aefa820ce912f913b3217593751dd7b708eeef3ed4"}, {0xd0, 0x118, 0xb, "d53bfa32c86d265d9f7737c8210dbdf1f82f7a381e15c95ee90c02514e8561e5ae54f8fa08be24f2e52dbb6021edfa020fe0a2f23108f06f54e04496a09b0b9e07e0ebbbb33e378bd1b1a1b8dab6b8fc60a6d66d416514882ed303eaaa38e52e724fc2b145b3d4402f7a71eacb6cb8d948d24c464a1fe1d55f2759e383163080d41861c7c9e042e32418d956c77ae66f4d396c0df35cd0ef6d7617d9860ea3dd7a8150001aa10a9a60182f1537e74dac9a212aa9a80470b7a1d433bb56424660"}, {0x10, 0x115, 0x100}], 0x1210}, 0x20008802) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4, 0x0, 0x0, 0x504}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff0000001100a200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0xffffffff}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7d}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r7, 0x800454e0, &(0x7f0000000280)=r6) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r8}, 0x10) close(r5) 1.06554457s ago: executing program 1 (id=6800): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x5, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000004c0)={0x2, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x12, 0x12, &(0x7f00000003c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @ldst={0x0, 0x1, 0x1, 0x2, 0x7, 0x0, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0xdb, 0x1000, &(0x7f0000000a00)=""/4096, 0x41000, 0x26, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x0, 0x0, 0x9d, 0x7}, 0x10, r3, r1, 0x0, &(0x7f0000000500)=[r0], 0x0, 0x10, 0x7fffffff}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="10000000040000000800000007000000000500001087ba807347e6b63a785d242958ef57f208e96cd61d02bde86425457967fa9de3a73e8f44e04b974e10ccd3dcc5d715753676910ece123634825648d0be7f80c261aba3efc579898f116b7d09238218df91bbc0a6bc7e40e186b0bab214b1d58f020d1e43d8dc05a53b31ce3556f308e764fb2d386b9edf244ab1790db1c2aa22ae01563497a3119621fb71da3e58d05cad676c9bac14871f7be2b161ead56fd031d3716bd3f1b7f78093829149a214a3c228e3ef3a4d2117853b9d4ff6c7f7c212a23dea2bd8cf994ce15b68da48", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=r4, @ANYRESOCT=r1, @ANYBLOB="00000000000000000000010000000000060000000100000000000000"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r5}, &(0x7f00000008c0), &(0x7f0000000900)=r4}, 0x20) 1.005078331s ago: executing program 2 (id=6801): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000015000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) close(r0) 944.147322ms ago: executing program 1 (id=6802): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0b00000008000000000400000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x130, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 943.475452ms ago: executing program 3 (id=6803): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000015000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) close(r0) 942.760692ms ago: executing program 2 (id=6804): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8148}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000007495"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x4, 0xb1, 0x80000000, 0xf, 0x48000, r0, 0x7fffffff, '\x00', r2, r0, 0x2, 0x1, 0x3, 0x0, @value=r0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1e, 0x0, 0x0, 0x0, 0x5, 0xb6, &(0x7f0000000680)=""/182, 0x40f00, 0x0, '\x00', r2, @fallback=0x14, 0xffffffffffffffff, 0x6}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3}, &(0x7f0000000540), &(0x7f0000000580)=r4}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r5}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r6}, 0x38) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x300}, @generic={0x66, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000000}, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.empty_time\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r7, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000b4df00000000000000000000000000000000000000000099f64239b7b2cc6fb5e0ce553e29e18fde617cb36f996bd4b950a74a8ba02fd11657cdce0de1fb9a6d8942420a08a16089ef3028845fe7c0c7eae3abee21"], 0x48) 896.744323ms ago: executing program 1 (id=6805): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa1000000000000e1090000f8ffffffb702000008000000b703000000000000850000000600000085000000070000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b707000008000000850000006900000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) sendmsg$sock(r5, &(0x7f0000000540)={&(0x7f0000000140)=@generic={0x26, "81eb69a718a31f897028afcb71c794d5bde11e80a45e12b43275bce5d2ed534b34dd0d80bd0f5ea9239c861be7f5039b699fc4868260849da3ec932d78298f08854fe817ab1185a31da01edaa1a0584b627f59976ad954fe1041ee6b40af9c31ed38bf99a0dc31ed0c27d8787c2e16f22d1d3759392ddeae2c188c3e1734"}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000400)}, {&(0x7f0000000480)="8eb80d61b0931e52ce90079dad5e4f4c280d395aef06f58a1602aec9a8136920f28a98eeaaf1e6d35db7a63c5f920017e441c17235cf9ec38d05bf899c81c056de84f1ae0172abf57edb86a7d814dcec116f5fabcd05c537", 0x58}], 0x2}, 0x40004) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYRES16=0x0, @ANYRES64=r3, @ANYRES64=r3, @ANYRES16=r4, @ANYBLOB="abee0ad91fe53c96e90290d6b18c9af914e9935bc7234f918cbe8f3daaf221fc5653a66db847677b7520952baf774322660ff5f7cee04668ce36111661cb61498f1bb7112380c1ae3b0d7f6be74f9d30068e522a106bf8502489413c12e10e7ad38e89b7fb79080935624ba35777f5eb319d3d8ba382e443bf2512b0fa6e344ed01d885dfa1f84cd59bb733e583c89a6fd2e6e465065cb9b0da5d21fbe416dd4fa1cc422788fb190445ddf347996b31087e579128623a94e481f31b4755dec0f8ec15c1a94021ddb5a730463847ecbfca9fdd4ee92ebf7ddef6efdd55066c3c9cf233bfc722d3154c282e1", @ANYBLOB, @ANYRESDEC=r3], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r8}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000000)='kmem_cache_free\x00', r9}, 0x18) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r10, 0xffffffffffffffff, 0x4, r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1c, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="85100000640d0040"], &(0x7f00000001c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r12}, 0x94) ioctl$SIOCSIFHWADDR(r11, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r13, 0x702, 0xe, 0xff0f, &(0x7f0000000540)="e460334470b8d480eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000001c0)) 896.160843ms ago: executing program 3 (id=6806): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000feffffff00000000000000001801000020646c4200000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000002300000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r0}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 759.412926ms ago: executing program 0 (id=6807): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x10044}, 0x0, 0xdfefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x4, 0x6, 0x9, 0x4a, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffd, 0x6}, 0x50) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000d00)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f086dd", 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x50) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0x36) 670.668787ms ago: executing program 3 (id=6808): r0 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000140), 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x4, [@int={0x3, 0x0, 0x0, 0x1, 0x0, 0x56, 0x0, 0x31, 0x6}, @int={0xa, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x19, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x9, 0x1}, {0xd, 0x4}, {0xc, 0x4}]}]}, {0x0, [0x61, 0x2e]}}, &(0x7f0000000080)=""/124, 0x60, 0x7c, 0x1, 0x1, 0x10000, @value=r0}, 0x28) r1 = syz_clone(0x1000000, &(0x7f0000000200)="51d81cf5252db4b9086a5c4842185dc28b06685226eef8e4672fb8e3fc3a51abc5ba7ad13ef25f0730aff94cd8e4532f5711d6047f32b05c44b75b5f0168d186399050ea88b18037af1940b129fb662ad1eb58c30b2bbbeffc97cd57ebec5c3b858d4b1481723d82fd1f792e13e55b744df386e798874af1fd829ab72fca246aac09f44b53321ffb1cd748fb1c88cd0af2467dcd3396d27f7c4c012939323495a6ed117d7fbdc56ed4915e9f66eece1027df", 0xb2, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="26e285c42f577e716bbe568b2d9f66ae0fa17d3d1e1f1c8af9e6e3d428f22cf93776c826ae002c6fa09554227eb50b729a5d7141efb1fad0e6b56c59d26dc0a16412b9cd41c32c0453ce31bd5693d7b862f0f0097bf478b934419e9382ce289f4a3c7990652928decdd5") perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x3, 0x7, 0xff, 0xc, 0x0, 0x4, 0xa640, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc9f, 0x1, @perf_config_ext={0x1}, 0x80, 0x7f, 0x9, 0x8, 0x5, 0x8001, 0x8, 0x0, 0x6, 0x0, 0x100000001}, r1, 0x8, 0xffffffffffffffff, 0xa) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000400), 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x404480, 0x0) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0xe, 0x0, 0x1, 0xab8, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x12, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @jmp={0x5, 0x1, 0xd, 0x5, 0x1, 0xfffffffffffffff4, 0xffffffffffffffff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000005c0)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xe, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000680)=[{0x4, 0x1, 0x1, 0x6}, {0x3, 0x3, 0x2, 0x1}, {0x3, 0x1, 0x4, 0x8}, {0x5, 0x5, 0x8, 0x5}, {0x2, 0x4, 0x0, 0xa}, {0x3, 0x5, 0x2, 0x4}, {0x0, 0x1, 0xa, 0xb}, {0x5, 0x2, 0x2, 0x1}], 0x10, 0x80000001}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r8 = perf_event_open$cgroup(&(0x7f0000000840)={0x4, 0x80, 0xca, 0xa8, 0x98, 0x0, 0x0, 0x5, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f0000000800)}, 0x350c, 0x6, 0x1, 0x4, 0x61d, 0x0, 0xc, 0x0, 0x5, 0x0, 0x4}, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r5) recvmsg$unix(r2, &(0x7f0000001f80)={&(0x7f0000000900)=@abs, 0x6e, &(0x7f0000001e80)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/241, 0xf1}, {&(0x7f0000001a80)=""/204, 0xcc}, {&(0x7f0000001b80)=""/80, 0x50}, {&(0x7f0000001c00)=""/54, 0x36}, {&(0x7f0000001c40)=""/174, 0xae}, {&(0x7f0000001d00)=""/162, 0xa2}, {&(0x7f0000001dc0)=""/105, 0x69}, {&(0x7f0000001e40)}], 0x9, &(0x7f0000001f40)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x40}, 0x0) openat$cgroup_subtree(r10, &(0x7f0000001fc0), 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000002000)=r10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002140)={@ifindex=0x0, 0x2f, 0x0, 0x0, &(0x7f0000002040)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000002080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000020c0)=[0x0, 0x0], &(0x7f0000002100)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002200)={r12, r11, 0x0, 0x1, &(0x7f00000021c0)='\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000002180)={@map=r9, r5, 0x13, 0x35, r9, @void, @void, @void, @value=r17, r16}, 0x20) sendmsg$unix(r10, &(0x7f00000038c0)={&(0x7f0000002240)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f00000037c0)=[{&(0x7f00000022c0)="25bc7e4ec148e49297a0c3faaac3848b151c3689a60df8268b1973cd26df170aa4", 0x21}, {&(0x7f0000002300)="45c4", 0x2}, {&(0x7f0000002340)="cb6c42257d9c103aaa4faf24eba5600a0635b8f598e94bfe9dabb2435a21ac91aec7ca3676a9f4585ffe3d2d12a1769985d62886394cf99eead5d1d4fb1222749de60871812eb9abf18076e022af887c525a02ef04fbccc76affb1a9d6c489d6081aecf98934d480eee40b1dc24ac5ab2c376bb3b55e7c9b1a6ce7a98d23ce9d508f703927b7", 0x86}, {&(0x7f0000002400)="d5170d7a7f39220a0084745b6c5ebfd652bf8567e992e2e9352ca93d1d6bb3efbb78688239b86d4305e6eaff4c55ff46a4fabe2eabbe2b0d", 0x38}, {&(0x7f0000002440)="e628d278fa44b1221fb5604d1bd06878c40201d9d66b0023020e544076217d1cb8b3a59681712ef8d01ab4b7198534f048dc9cee07f89656337149fcb250149cd54e64aca89bfc5209c407614b9e1abf3437307c56c3686253c1bdf9a206428c8ce72e789cf61943c0c3268f6d2b3a757aafd3f336275ebe0d2aab066403174c94c72f4fd37f9d940a5fffe2a32c066090aab32c50a7b499ba470474bc", 0x9d}, {&(0x7f0000002500)="7cee3fe2223bfed1be1e8a48e2577889d5907b9c8b4fe3418726f6921b8045e8bc51db335a553111f82e7993ab42bf367853ae6d51a0fe6aff2a0a4446f92b1f35fdec218d3892336830422c7daeca7b4c7cfbe8a01fb5cecec296743de49b161a877b37c08125a03357031fee9538f916e744e270d6e4d592697e30e4652246a0d96db4c779ed351cef26c6752abd5aedf10c757b3b4bae5c", 0x99}, {&(0x7f00000025c0)="a441948d1a5a87da687bf805fcbd1569366711e5ee3815822c09aa7e436dcc8fde6a52db17c4ea79cb5c19ee31d2b4fba7016009ffad0cebf7eab76127535ac75268d5fef906c4f02ac0cd6bb734b6c57a3229f6649f6bd0e2d5c5627fc6e5cb4ee65184fda0e55e7b00cca03e1a510ba975f65383c7eddd8dd57e59f26baf390fad8def", 0x84}, {&(0x7f0000002680)="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", 0x1000}, {&(0x7f0000003680)="a38cc0cdc43612b6f9861e581fe8c141ed61cb826c90ced855c3663bb358cfddbf0cabcae2b4ef7e654abdac807d0d29ca8b23208d6280c1387ced86365e5d90d781b156bacc7902b6ed46d874f0e08d17f53824a96160c7799103c6668fdf045c2beab3c9e0376f7b017d2c540348d32de8c8fc459e2b53bb91b59be96f", 0x7e}, {&(0x7f0000003700)="f3be8bf5227b08fe24a484858a475786de6b4bc6f67cb3b23d7bb77fa246cfe352c306a9dd8f0f8d297903cc4c3aa628a6f9143912eec97df68bc35d5ff3975700ffe0ba0e381e13a1666c478bd073131e6fc6e1c00846854a94ca69706e8c6d764e0a0a50d164339f512604cdf35e9285739cae8283f78d22a4553e35fd9658c77525dc748605d723e16080bd57b9fee6f7eb01a2720d2fddb65b3fb163e3ceeb327903b7", 0xa5}], 0xa, &(0x7f0000003880)=[@cred={{0x1c, 0x1, 0x2, {r12, r13, r14}}}, @cred={{0x1c, 0x1, 0x2, {r12, r13, r14}}}], 0x40, 0x800}, 0x800) close(r5) sendmsg$unix(r9, &(0x7f0000003d00)={&(0x7f0000003900)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000003c80)=[{&(0x7f0000003980)="0430001ffe7aa52f8f1cdd0baaed2c6c3724f0f257d6c437fb4e85c778a28b0b6e05ea3cb8d6e2a9f19b8d6e09d871588409f8234939998e8a7545c8b05848fd87855368b78c29d3bd702bd5a7443143e1c1086a98c789d4eec50ab52445a42eca2b16692d990aecf950e8c200ad078b3a0b7d2907a5f315e8655a870eba47044d704ef1882d3df2bcc09f7e40e46f19c0d8618d9466c7fda06c07bd1a", 0x9d}, {&(0x7f0000003a40)="237b9ef01e1d6a23a814a65d2b70835c431d291cdee57859714621763f302afa2b9c8756c438a160317ef29c65a073af7d06e03b9b526e08c76a6ee84c5a8ab0156cb2bd10a6952adc925cad2a27ddae35f2fe156cdda72d92787de7d3796e56c9f793698caa39e74278bae522f85a6c9c28d484a588c2fcb66d8729d2a169df1e", 0x81}, {&(0x7f0000003b00)="71fa1d941b4e118b7055329a98977fed08041089d29895a2a71cc73ad57a94bc81a92c30e58a752583bf90671128ebc0b0425d9ce7dcdff2b6674c77c82b55d2d309361542651415bf751709616a7c3c6dfa8d687f7fc485718330fe195cafd3683da3896eafdb7f6483414cdc7152ae714584f7f0a2b88b80e2567c499e8ebdcd45c9abcb8b9f80c0d24e539ababfd67c12f7f3d533770a835122b17e1f9a017f2d77a0176fa9", 0xa7}, {&(0x7f0000003bc0)="c5ad7fc5d7a72b3851d640e3fa9ff9c867c5f2b37a5e41570579430318f3d2f42841e8cad67858568f9d246fdb18400906b01aa551667f9c84612be82a4b910d6b8def99856d", 0x46}, {&(0x7f0000003c40)="36298823", 0x4}], 0x5, 0x0, 0x0, 0x24048010}, 0x8080) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003f00)={0x6, 0x14, &(0x7f0000003d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x9}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r10}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}}]}, &(0x7f0000003e00)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x10, '\x00', r15, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000003e40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000003e80)={0x2, 0xa, 0xff, 0x4}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000003ec0)=[{0x2, 0x4, 0x4, 0x5}, {0x3, 0x2, 0x10, 0xb}, {0x1, 0x3, 0x6, 0x3}, {0x1, 0x1, 0x4, 0xb}], 0x10, 0x3ff}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000004080)={{r11, 0xffffffffffffffff}, &(0x7f0000004000), &(0x7f0000004040)='%ps \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000040c0)=@generic={&(0x7f0000003fc0)='./file0\x00', r18}, 0x18) socketpair(0x21, 0x2, 0x2000, &(0x7f0000004100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004180)={&(0x7f0000004140)='rpcgss_oid_to_mech\x00', r11, 0x0, 0x1}, 0x18) bpf$TOKEN_CREATE(0x24, &(0x7f00000041c0)={0x0, r6}, 0x8) close(0xffffffffffffffff) 467.748661ms ago: executing program 3 (id=6809): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1}, &(0x7f0000000280), &(0x7f00000002c0)=r2}, 0x20) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB="000000000000000000b412130000040000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000300"/28], 0x50) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}, 0x0) (async, rerun: 64) syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/net\x00') (async, rerun: 64) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x1}], 0x1}, 0x0) 301.456485ms ago: executing program 1 (id=6810): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x10044}, 0x0, 0xdfefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x4, 0x6, 0x9, 0x4a, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffd, 0x6}, 0x50) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000d00)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f086dd", 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x50) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0x36) 268.477145ms ago: executing program 0 (id=6811): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={0xffffffffffffffff, 0x0, &(0x7f0000001700)=""/44}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000700)='signal_deliver\x00', r0}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 71.640799ms ago: executing program 0 (id=6812): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x5, [@type_tag={0x5, 0x0, 0x0, 0x12, 0x4}, @fwd={0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3}}, @ptr={0x7, 0x0, 0x0, 0x2, 0x1}]}, {0x0, [0x2e, 0x0, 0x30]}}, &(0x7f0000000140)=""/74, 0x59, 0x4a, 0x0, 0x8c6, 0x10000}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x17, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40900000000000073110300000000008510000002000000850000006700000095000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, r0, 0x8, 0x0, 0x0, 0xe}, 0x94) 0s ago: executing program 0 (id=6813): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xa, 0x4, 0xdd, 0xa}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200009b1aecb600000000000000008d0000007500000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000040), &(0x7f0000000080)='%pI4 \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071104300000000009500496d40250000"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1000000}, 0x80) kernel console output (not intermixed with test programs): 0xb0/0x110 [ 306.011031][ T8080] dump_stack+0x15/0x24 [ 306.015186][ T8080] should_fail_ex+0x3d4/0x520 [ 306.019869][ T8080] __should_failslab+0xac/0xf0 [ 306.024645][ T8080] should_failslab+0x9/0x20 [ 306.029155][ T8080] kmem_cache_alloc_node+0x42/0x340 [ 306.034369][ T8080] ? __alloc_skb+0xea/0x4b0 [ 306.038874][ T8080] ? __cfi___wake_up+0x10/0x10 [ 306.043638][ T8080] ? kmem_cache_free+0x12d/0x300 [ 306.048576][ T8080] __alloc_skb+0xea/0x4b0 [ 306.052906][ T8080] ? _raw_write_lock+0x8e/0xe0 [ 306.057666][ T8080] __neigh_notify+0x84/0x130 [ 306.062257][ T8080] neigh_cleanup_and_release+0x2c/0x1a0 [ 306.067805][ T8080] neigh_flush_dev+0x7aa/0x960 [ 306.072565][ T8080] ? __kasan_check_write+0x14/0x20 [ 306.077680][ T8080] neigh_changeaddr+0x30/0x40 [ 306.082353][ T8080] ndisc_netdev_event+0x1fc/0x620 [ 306.087379][ T8080] raw_notifier_call_chain+0xa1/0x110 [ 306.092756][ T8080] dev_set_mac_address+0x329/0x430 [ 306.097865][ T8080] ? __cfi_dev_set_mac_address+0x10/0x10 [ 306.103497][ T8080] dev_set_mac_address_user+0x31/0x50 [ 306.108873][ T8080] dev_ifsioc+0x770/0xed0 [ 306.113211][ T8080] ? dev_ioctl+0xd10/0xd10 [ 306.117629][ T8080] ? __kasan_check_write+0x14/0x20 [ 306.122742][ T8080] ? mutex_lock+0x8d/0x1a0 [ 306.127156][ T8080] ? __cfi_mutex_lock+0x10/0x10 [ 306.132011][ T8080] ? dev_get_by_name_rcu+0xe5/0x130 [ 306.137224][ T8080] dev_ioctl+0x556/0xd10 [ 306.141475][ T8080] sock_do_ioctl+0x23f/0x310 [ 306.146065][ T8080] ? sock_show_fdinfo+0xb0/0xb0 [ 306.150921][ T8080] ? selinux_file_ioctl+0x377/0x480 [ 306.156126][ T8080] sock_ioctl+0x4d8/0x6e0 [ 306.160456][ T8080] ? __cfi_sock_ioctl+0x10/0x10 [ 306.165325][ T8080] ? __fget_files+0x2d5/0x330 [ 306.170006][ T8080] ? security_file_ioctl+0x95/0xc0 [ 306.175125][ T8080] ? __cfi_sock_ioctl+0x10/0x10 [ 306.179976][ T8080] __se_sys_ioctl+0x12f/0x1b0 [ 306.184657][ T8080] __x64_sys_ioctl+0x7b/0x90 [ 306.189250][ T8080] x64_sys_call+0x58b/0x9a0 [ 306.193757][ T8080] do_syscall_64+0x4c/0xa0 [ 306.198173][ T8080] ? clear_bhb_loop+0x30/0x80 [ 306.202853][ T8080] ? clear_bhb_loop+0x30/0x80 [ 306.207526][ T8080] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 306.213415][ T8080] RIP: 0033:0x7f430378eba9 [ 306.217823][ T8080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 306.237425][ T8080] RSP: 002b:00007f43046d5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 306.245844][ T8080] RAX: ffffffffffffffda RBX: 00007f43039d6090 RCX: 00007f430378eba9 [ 306.253818][ T8080] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000008 [ 306.261788][ T8080] RBP: 00007f43046d5090 R08: 0000000000000000 R09: 0000000000000000 [ 306.269762][ T8080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 306.277732][ T8080] R13: 00007f43039d6128 R14: 00007f43039d6090 R15: 00007ffc15ad5f88 [ 306.285709][ T8080] [ 306.601068][ T8091] device syzkaller0 entered promiscuous mode [ 307.023395][ T8103] bond_slave_1: mtu less than device minimum [ 307.200610][ T8119] bond_slave_1: mtu less than device minimum [ 308.856529][ T8154] bond_slave_1: mtu less than device minimum [ 310.195813][ T8200] bond_slave_1: mtu less than device minimum [ 310.357140][ T8214] device sit0 entered promiscuous mode [ 310.798319][ T8233] bond_slave_1: mtu less than device minimum [ 311.389233][ T8246] device syzkaller0 entered promiscuous mode [ 311.866361][ T8248] bond_slave_1: mtu less than device minimum [ 312.111444][ T8277] bond_slave_1: mtu less than device minimum [ 313.519052][ T8306] device syzkaller0 entered promiscuous mode [ 313.736091][ T8310] device pim6reg1 entered promiscuous mode [ 314.211313][ T8318] device syzkaller0 entered promiscuous mode [ 314.257063][ T8328] bond_slave_1: mtu less than device minimum [ 314.264470][ T8326] bond_slave_1: mtu less than device minimum [ 314.657477][ T8343] bond_slave_1: mtu less than device minimum [ 316.122821][ T8372] bond_slave_1: mtu less than device minimum [ 316.799965][ T8387] bond_slave_1: mtu less than device minimum [ 317.084207][ T8392] device syzkaller0 entered promiscuous mode [ 320.267808][ T8425] bond_slave_1: mtu less than device minimum [ 320.861171][ T8438] bond_slave_1: mtu less than device minimum [ 321.363270][ T8453] device syzkaller0 entered promiscuous mode [ 322.864553][ T8482] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.871765][ T8482] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.879264][ T8482] device bridge_slave_0 entered promiscuous mode [ 322.886415][ T8482] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.893520][ T8482] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.901287][ T8482] device bridge_slave_1 entered promiscuous mode [ 323.042633][ T1107] device veth1_macvtap left promiscuous mode [ 323.059684][ T1107] device veth0_vlan left promiscuous mode [ 323.610796][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 323.618418][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 323.716909][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 323.834124][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 323.965471][ T1107] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.972569][ T1107] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.180783][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 324.194276][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 324.203555][ T1107] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.210617][ T1107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.218310][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 324.226666][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 324.347198][ T8528] device syzkaller0 entered promiscuous mode [ 324.366362][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 324.458121][ T8482] device veth0_vlan entered promiscuous mode [ 324.467478][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 324.476292][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 324.493385][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 324.502017][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 324.538223][ T8482] device veth1_macvtap entered promiscuous mode [ 324.577450][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 324.590251][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 324.631459][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 324.756046][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 324.841048][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 324.927573][ T8559] bond_slave_1: mtu less than device minimum [ 325.068390][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 325.083585][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 325.114811][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 325.132907][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 325.177825][ T8573] ±ÿ: renamed from team_slave_1 [ 325.864293][ T8564] device syzkaller0 entered promiscuous mode [ 326.123057][ T8579] device syzkaller0 entered promiscuous mode [ 327.767083][ T8620] device syzkaller0 entered promiscuous mode [ 329.154723][ T8647] device sit0 left promiscuous mode [ 329.369031][ T8653] device sit0 entered promiscuous mode [ 329.383297][ T8652] device pim6reg1 entered promiscuous mode [ 329.660836][ T8660] FAULT_INJECTION: forcing a failure. [ 329.660836][ T8660] name failslab, interval 1, probability 0, space 0, times 0 [ 329.682777][ T8660] CPU: 0 PID: 8660 Comm: syz.4.2906 Not tainted syzkaller #0 [ 329.690200][ T8660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 329.700268][ T8660] Call Trace: [ 329.703553][ T8660] [ 329.706482][ T8660] __dump_stack+0x21/0x24 [ 329.710813][ T8660] dump_stack_lvl+0xee/0x150 [ 329.715401][ T8660] ? __cfi_dump_stack_lvl+0x8/0x8 [ 329.720425][ T8660] dump_stack+0x15/0x24 [ 329.724578][ T8660] should_fail_ex+0x3d4/0x520 [ 329.729339][ T8660] ? __kernfs_new_node+0xdb/0x680 [ 329.734370][ T8660] __should_failslab+0xac/0xf0 [ 329.739159][ T8660] should_failslab+0x9/0x20 [ 329.743658][ T8660] kmem_cache_alloc+0x3b/0x330 [ 329.748424][ T8660] __kernfs_new_node+0xdb/0x680 [ 329.753282][ T8660] ? clear_nonspinnable+0x60/0x60 [ 329.758322][ T8660] ? rwsem_write_trylock+0x130/0x300 [ 329.763616][ T8660] ? kernfs_new_node+0x260/0x260 [ 329.768567][ T8660] ? up_write+0x7b/0x290 [ 329.772817][ T8660] kernfs_new_node+0x150/0x260 [ 329.777587][ T8660] __kernfs_create_file+0x4e/0x270 [ 329.782717][ T8660] sysfs_add_file_mode_ns+0x1ce/0x270 [ 329.788096][ T8660] internal_create_group+0x495/0xd00 [ 329.793383][ T8660] ? sysfs_create_group+0x30/0x30 [ 329.798409][ T8660] ? up_write+0x7b/0x290 [ 329.802652][ T8660] ? kernfs_activate+0x1ea/0x200 [ 329.807607][ T8660] sysfs_create_groups+0x58/0x120 [ 329.812634][ T8660] device_add_attrs+0xdb/0x810 [ 329.817400][ T8660] ? get_device_parent+0x410/0x410 [ 329.822517][ T8660] ? sysfs_do_create_link_sd+0xe9/0x110 [ 329.828067][ T8660] device_add+0x5f1/0xef0 [ 329.832403][ T8660] netdev_register_kobject+0x179/0x320 [ 329.837860][ T8660] ? raw_notifier_call_chain+0xfa/0x110 [ 329.843411][ T8660] register_netdevice+0xe3d/0x14a0 [ 329.848530][ T8660] ? __cfi_register_netdevice+0x10/0x10 [ 329.854073][ T8660] ? mutex_unlock+0x89/0x220 [ 329.858661][ T8660] ? __cfi_mutex_unlock+0x10/0x10 [ 329.863681][ T8660] ? radix_tree_lookup+0x276/0x290 [ 329.868793][ T8660] ppp_dev_configure+0x7c1/0xa50 [ 329.873734][ T8660] ppp_ioctl+0x620/0x1690 [ 329.878067][ T8660] ? __cfi_ppp_ioctl+0x10/0x10 [ 329.882842][ T8660] ? __fget_files+0x2d5/0x330 [ 329.887534][ T8660] ? security_file_ioctl+0x95/0xc0 [ 329.892653][ T8660] ? __cfi_ppp_ioctl+0x10/0x10 [ 329.897426][ T8660] __se_sys_ioctl+0x12f/0x1b0 [ 329.902105][ T8660] __x64_sys_ioctl+0x7b/0x90 [ 329.906694][ T8660] x64_sys_call+0x58b/0x9a0 [ 329.911197][ T8660] do_syscall_64+0x4c/0xa0 [ 329.915611][ T8660] ? clear_bhb_loop+0x30/0x80 [ 329.920288][ T8660] ? clear_bhb_loop+0x30/0x80 [ 329.924971][ T8660] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 329.930864][ T8660] RIP: 0033:0x7f517618eba9 [ 329.935277][ T8660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 329.954881][ T8660] RSP: 002b:00007f5176fd0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 329.963300][ T8660] RAX: ffffffffffffffda RBX: 00007f51763d5fa0 RCX: 00007f517618eba9 [ 329.971272][ T8660] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000007 [ 329.979243][ T8660] RBP: 00007f5176fd0090 R08: 0000000000000000 R09: 0000000000000000 [ 329.987218][ T8660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 329.995195][ T8660] R13: 00007f51763d6038 R14: 00007f51763d5fa0 R15: 00007ffe521eff08 [ 330.003172][ T8660] [ 330.032953][ T8664] device syzkaller0 entered promiscuous mode [ 332.098122][ T8724] device syzkaller0 entered promiscuous mode [ 332.801452][ T8726] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.825974][ T8726] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.834386][ T8726] device bridge_slave_0 entered promiscuous mode [ 332.904137][ T8726] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.912084][ T8726] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.919623][ T8726] device bridge_slave_1 entered promiscuous mode [ 332.991108][ T8] device veth0_vlan left promiscuous mode [ 333.500169][ T8764] bond_slave_1: mtu less than device minimum [ 333.603766][ T8726] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.610850][ T8726] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.618137][ T8726] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.625186][ T8726] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.921839][ T2956] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.929400][ T2956] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.211079][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 334.220507][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 334.397639][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 334.490307][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 334.575176][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.582259][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.697615][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 334.780414][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 334.794124][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.801215][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.819138][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 334.934812][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 335.005401][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 335.075011][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 335.144128][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 335.155366][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 335.243102][ T8726] device veth0_vlan entered promiscuous mode [ 335.268183][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 335.371087][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 335.466746][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 335.580836][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 335.656005][ T8726] device veth1_macvtap entered promiscuous mode [ 335.816518][ T8799] bond_slave_1: mtu less than device minimum [ 335.831262][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 335.920432][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 335.956352][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 336.047645][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 336.058924][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 336.176568][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 336.190621][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 339.082262][ T8834] bond_slave_1: mtu less than device minimum [ 339.180141][ T8837] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.187282][ T8837] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.213696][ T8837] device bridge_slave_0 entered promiscuous mode [ 339.257039][ T8837] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.271341][ T8837] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.285310][ T8837] device bridge_slave_1 entered promiscuous mode [ 339.911086][ T10] device veth1_macvtap left promiscuous mode [ 340.824613][ T8865] device syzkaller0 entered promiscuous mode [ 340.881554][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 340.889698][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 340.897352][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 340.906205][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 340.915397][ T2956] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.922449][ T2956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.930649][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 340.941045][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 340.949214][ T2956] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.956300][ T2956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.969467][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 340.992388][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 341.000679][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 341.040859][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 341.070914][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 341.131925][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 341.160423][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 341.245529][ T8837] device veth0_vlan entered promiscuous mode [ 341.284849][ T8886] bond_slave_1: mtu less than device minimum [ 341.449650][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 341.500209][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 341.647595][ T8888] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.657818][ T8888] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.823674][ T8891] device bridge_slave_1 left promiscuous mode [ 341.830075][ T8891] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.844895][ T8891] device bridge_slave_0 left promiscuous mode [ 341.964311][ T8891] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.052972][ T8837] device veth1_macvtap entered promiscuous mode [ 342.100129][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 342.132293][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 342.170190][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 342.180317][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 342.198677][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 342.374217][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 342.386981][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 342.400160][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 342.426049][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 342.451889][ T8908] device syzkaller0 entered promiscuous mode [ 342.459680][ T8901] device sit0 entered promiscuous mode [ 347.221576][ T8991] bond_slave_1: mtu less than device minimum [ 349.316035][ T9027] bond_slave_1: mtu less than device minimum [ 349.620286][ T9033] bond_slave_1: mtu less than device minimum [ 351.490529][ T9067] bond_slave_1: mtu less than device minimum [ 351.733592][ T9073] bond_slave_1: mtu less than device minimum [ 353.419933][ T9112] bond_slave_1: mtu less than device minimum [ 353.688727][ T9121] device pim6reg1 entered promiscuous mode [ 354.010338][ T9132] device syzkaller0 entered promiscuous mode [ 354.819325][ T10] device veth1_macvtap left promiscuous mode [ 354.825418][ T10] device veth0_vlan left promiscuous mode [ 355.168299][ T9126] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.183120][ T9126] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.196105][ T9126] device bridge_slave_0 entered promiscuous mode [ 355.291162][ T9126] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.318856][ T9126] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.364802][ T9126] device bridge_slave_1 entered promiscuous mode [ 355.439114][ T9165] bond_slave_1: mtu less than device minimum [ 355.773066][ T9177] device wg2 entered promiscuous mode [ 356.149113][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 356.166061][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 356.304151][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 356.336499][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.401585][ T1107] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.408668][ T1107] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.527405][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 356.596553][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 356.664932][ T1107] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.672036][ T1107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.733267][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 356.748755][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 356.799041][ T9126] device veth0_vlan entered promiscuous mode [ 356.824963][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 356.832917][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 356.841901][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 356.851410][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 356.870288][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 356.925224][ T9207] FAULT_INJECTION: forcing a failure. [ 356.925224][ T9207] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 356.938421][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 356.966476][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 356.973295][ T9207] CPU: 1 PID: 9207 Comm: syz.0.3091 Not tainted syzkaller #0 [ 356.981055][ T9207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 356.991100][ T9207] Call Trace: [ 356.994446][ T9207] [ 356.997363][ T9207] __dump_stack+0x21/0x24 [ 357.001716][ T9207] dump_stack_lvl+0xee/0x150 [ 357.006285][ T9207] ? __cfi_dump_stack_lvl+0x8/0x8 [ 357.011309][ T9207] dump_stack+0x15/0x24 [ 357.015444][ T9207] should_fail_ex+0x3d4/0x520 [ 357.020164][ T9207] should_fail+0xb/0x10 [ 357.024302][ T9207] should_fail_usercopy+0x1a/0x20 [ 357.029307][ T9207] _copy_to_user+0x1e/0x90 [ 357.033747][ T9207] simple_read_from_buffer+0xe9/0x160 [ 357.039137][ T9207] proc_fail_nth_read+0x19a/0x210 [ 357.044172][ T9207] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 357.049697][ T9207] ? security_file_permission+0x94/0xb0 [ 357.055260][ T9207] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 357.060786][ T9207] vfs_read+0x26e/0x8c0 [ 357.064979][ T9207] ? __cfi_vfs_read+0x10/0x10 [ 357.069640][ T9207] ? __kasan_check_write+0x14/0x20 [ 357.074792][ T9207] ? mutex_lock+0x8d/0x1a0 [ 357.079223][ T9207] ? __cfi_mutex_lock+0x10/0x10 [ 357.084064][ T9207] ? __fdget_pos+0x2cd/0x380 [ 357.088719][ T9207] ? ksys_read+0x71/0x240 [ 357.093054][ T9207] ksys_read+0x140/0x240 [ 357.097285][ T9207] ? __cfi_ksys_read+0x10/0x10 [ 357.102038][ T9207] ? fpregs_restore_userregs+0x128/0x260 [ 357.107660][ T9207] __x64_sys_read+0x7b/0x90 [ 357.112152][ T9207] x64_sys_call+0x2f/0x9a0 [ 357.116555][ T9207] do_syscall_64+0x4c/0xa0 [ 357.120957][ T9207] ? clear_bhb_loop+0x30/0x80 [ 357.125681][ T9207] ? clear_bhb_loop+0x30/0x80 [ 357.130341][ T9207] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 357.136215][ T9207] RIP: 0033:0x7ffa8018d5bc [ 357.140660][ T9207] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 357.160277][ T9207] RSP: 002b:00007ffa80fd2030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 357.168729][ T9207] RAX: ffffffffffffffda RBX: 00007ffa803d5fa0 RCX: 00007ffa8018d5bc [ 357.176681][ T9207] RDX: 000000000000000f RSI: 00007ffa80fd20a0 RDI: 0000000000000007 [ 357.184629][ T9207] RBP: 00007ffa80fd2090 R08: 0000000000000000 R09: 0000000000000000 [ 357.192586][ T9207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 357.200548][ T9207] R13: 00007ffa803d6038 R14: 00007ffa803d5fa0 R15: 00007ffc5246a658 [ 357.208589][ T9207] [ 357.237536][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 357.245932][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 357.282847][ T9126] device veth1_macvtap entered promiscuous mode [ 357.345083][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 357.471602][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 357.502888][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 357.593098][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 357.645498][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 357.753086][ T9221] bond_slave_1: mtu less than device minimum [ 358.694254][ T9249] device syzkaller0 entered promiscuous mode [ 359.282663][ T9272] bond_slave_1: mtu less than device minimum [ 359.582949][ T9279] device veth1_macvtap left promiscuous mode [ 359.721214][ T9280] device veth1_macvtap entered promiscuous mode [ 359.738041][ T9280] device macsec0 entered promiscuous mode [ 359.828365][ T9287] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.839030][ T9287] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.005396][ T9290] device bridge_slave_1 left promiscuous mode [ 360.080101][ T9290] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.111342][ T9290] device bridge_slave_0 left promiscuous mode [ 360.216285][ T9290] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.374567][ T9298] bond_slave_1: mtu less than device minimum [ 360.862415][ T9320] device wg2 left promiscuous mode [ 360.913448][ T9321] bond_slave_1: mtu less than device minimum [ 361.042063][ T9323] device wg2 entered promiscuous mode [ 361.788420][ T9348] bond_slave_1: mtu less than device minimum [ 362.092951][ T9367] bond_slave_1: mtu less than device minimum [ 363.065995][ T9407] bond_slave_1: mtu less than device minimum [ 363.330110][ T9416] bond_slave_1: mtu less than device minimum [ 363.371144][ T9418] bond_slave_1: mtu less than device minimum [ 364.049483][ T9431] device syzkaller0 entered promiscuous mode [ 364.101415][ T9439] device macsec0 entered promiscuous mode [ 364.107492][ T9439] FAULT_INJECTION: forcing a failure. [ 364.107492][ T9439] name failslab, interval 1, probability 0, space 0, times 0 [ 364.199446][ T9439] CPU: 0 PID: 9439 Comm: syz.2.3172 Not tainted syzkaller #0 [ 364.206856][ T9439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 364.216909][ T9439] Call Trace: [ 364.220186][ T9439] [ 364.223111][ T9439] __dump_stack+0x21/0x24 [ 364.227441][ T9439] dump_stack_lvl+0xee/0x150 [ 364.232043][ T9439] ? __cfi_dump_stack_lvl+0x8/0x8 [ 364.237057][ T9439] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 364.242960][ T9439] dump_stack+0x15/0x24 [ 364.247111][ T9439] should_fail_ex+0x3d4/0x520 [ 364.251784][ T9439] __should_failslab+0xac/0xf0 [ 364.256544][ T9439] should_failslab+0x9/0x20 [ 364.261130][ T9439] kmem_cache_alloc_node+0x42/0x340 [ 364.266371][ T9439] ? __alloc_skb+0xea/0x4b0 [ 364.270928][ T9439] ? br_get_link_af_size_filtered+0xe0/0x180 [ 364.276971][ T9439] __alloc_skb+0xea/0x4b0 [ 364.281301][ T9439] rtmsg_ifinfo_build_skb+0x7c/0x190 [ 364.286637][ T9439] rtmsg_ifinfo+0x7a/0x130 [ 364.291050][ T9439] __dev_notify_flags+0xdb/0x500 [ 364.296029][ T9439] ? __cfi___dev_notify_flags+0x10/0x10 [ 364.301569][ T9439] ? vprintk_emit+0x11/0x410 [ 364.306155][ T9439] ? __kasan_check_read+0x11/0x20 [ 364.311187][ T9439] __dev_set_promiscuity+0x188/0x5f0 [ 364.316470][ T9439] dev_set_promiscuity+0x50/0xf0 [ 364.321402][ T9439] macsec_dev_change_rx_flags+0x12c/0x170 [ 364.327186][ T9439] ? __dev_set_promiscuity+0x42d/0x5f0 [ 364.332638][ T9439] ? __cfi_macsec_dev_change_rx_flags+0x10/0x10 [ 364.338874][ T9439] __dev_set_promiscuity+0x445/0x5f0 [ 364.344157][ T9439] __dev_change_flags+0x41f/0x6b0 [ 364.349176][ T9439] ? __cfi___dev_change_flags+0x10/0x10 [ 364.354715][ T9439] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 364.360523][ T9439] dev_change_flags+0x88/0x1a0 [ 364.365283][ T9439] dev_ifsioc+0x159/0xed0 [ 364.369723][ T9439] ? dev_ioctl+0xd10/0xd10 [ 364.374138][ T9439] ? __mutex_lock_slowpath+0xe/0x10 [ 364.379348][ T9439] ? mutex_lock+0xf8/0x1a0 [ 364.383774][ T9439] ? __cfi_mutex_lock+0x10/0x10 [ 364.388629][ T9439] ? dev_load+0x34/0xb0 [ 364.392798][ T9439] dev_ioctl+0x556/0xd10 [ 364.397047][ T9439] sock_do_ioctl+0x23f/0x310 [ 364.401734][ T9439] ? sock_show_fdinfo+0xb0/0xb0 [ 364.406587][ T9439] sock_ioctl+0x4d8/0x6e0 [ 364.410918][ T9439] ? __cfi_sock_ioctl+0x10/0x10 [ 364.415766][ T9439] ? __fget_files+0x2d5/0x330 [ 364.420441][ T9439] ? security_file_ioctl+0x95/0xc0 [ 364.425552][ T9439] ? __cfi_sock_ioctl+0x10/0x10 [ 364.430396][ T9439] __se_sys_ioctl+0x12f/0x1b0 [ 364.435158][ T9439] __x64_sys_ioctl+0x7b/0x90 [ 364.439740][ T9439] x64_sys_call+0x58b/0x9a0 [ 364.444243][ T9439] do_syscall_64+0x4c/0xa0 [ 364.448654][ T9439] ? clear_bhb_loop+0x30/0x80 [ 364.453331][ T9439] ? clear_bhb_loop+0x30/0x80 [ 364.458003][ T9439] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 364.463894][ T9439] RIP: 0033:0x7f867f78eba9 [ 364.468305][ T9439] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 364.487948][ T9439] RSP: 002b:00007f8680653038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 364.496367][ T9439] RAX: ffffffffffffffda RBX: 00007f867f9d5fa0 RCX: 00007f867f78eba9 [ 364.504343][ T9439] RDX: 0000200000000080 RSI: 0000000000008914 RDI: 000000000000000d [ 364.512320][ T9439] RBP: 00007f8680653090 R08: 0000000000000000 R09: 0000000000000000 [ 364.520296][ T9439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 364.528285][ T9439] R13: 00007f867f9d6038 R14: 00007f867f9d5fa0 R15: 00007ffdaf1708f8 [ 364.536277][ T9439] [ 364.744166][ T9450] device sit0 left promiscuous mode [ 364.857309][ T9461] bond_slave_1: mtu less than device minimum [ 365.124936][ T9471] bond_slave_1: mtu less than device minimum [ 365.861884][ T9477] device syzkaller0 entered promiscuous mode [ 366.313538][ T9512] bond_slave_1: mtu less than device minimum [ 367.102082][ T9515] bond_slave_1: mtu less than device minimum [ 367.171470][ T28] audit: type=1400 audit(1757548589.780:142): avc: denied { create } for pid=9513 comm="syz.2.3196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 367.602017][ T9538] @ÿ: renamed from bond_slave_0 [ 367.934864][ T9556] bond_slave_1: mtu less than device minimum [ 368.522916][ T9564] device pim6reg1 entered promiscuous mode [ 369.784238][ T9609] device syzkaller0 entered promiscuous mode [ 370.292148][ T9613] device syzkaller0 entered promiscuous mode [ 370.468378][ T9644] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.480423][ T9644] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.601551][ T9649] device bridge_slave_1 left promiscuous mode [ 370.644764][ T9649] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.670389][ T9649] device bridge_slave_0 left promiscuous mode [ 370.687143][ T9649] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.816210][ T9656] device wg2 left promiscuous mode [ 371.031064][ T9667] bond_slave_1: mtu less than device minimum [ 371.037680][ T9668] bond_slave_1: mtu less than device minimum [ 371.088086][ T9662] device pim6reg1 entered promiscuous mode [ 371.941634][ T9685] device sit0 entered promiscuous mode [ 372.217112][ T9697] device syzkaller0 entered promiscuous mode [ 372.605631][ T9706] bond_slave_1: mtu less than device minimum [ 372.961185][ T9718] bond_slave_1: mtu less than device minimum [ 374.582260][ T9749] bond_slave_1: mtu less than device minimum [ 374.919760][ T9756] device syzkaller0 entered promiscuous mode [ 375.445067][ T9766] bond_slave_1: mtu less than device minimum [ 375.451327][ T9771] bond_slave_1: mtu less than device minimum [ 375.603710][ T28] audit: type=1400 audit(1757548598.210:143): avc: denied { create } for pid=9780 comm="syz.2.3291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 375.633453][ T9786] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.644185][ T9786] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.931796][ T9788] device bridge_slave_1 left promiscuous mode [ 376.000409][ T9788] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.075717][ T9788] device bridge_slave_0 left promiscuous mode [ 377.081985][ T9788] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.601615][ T9807] bond_slave_1: mtu less than device minimum [ 378.513808][ T9828] device syzkaller0 entered promiscuous mode [ 379.192454][ T9838] device syzkaller0 entered promiscuous mode [ 379.247787][ T9845] bond_slave_1: mtu less than device minimum [ 380.071605][ T9861] device veth0_vlan left promiscuous mode [ 380.088101][ T9861] device veth0_vlan entered promiscuous mode [ 380.157179][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 380.184281][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 380.310150][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 380.567860][ T9880] device syzkaller0 entered promiscuous mode [ 380.578003][ T9883] bond_slave_1: mtu less than device minimum [ 380.906595][ T9891] device syzkaller0 entered promiscuous mode [ 381.917499][ T9925] bond_slave_1: mtu less than device minimum [ 382.657570][ T9934] device syzkaller0 entered promiscuous mode [ 382.728348][ T9953] device pim6reg1 entered promiscuous mode [ 383.640431][ T9986] device syzkaller0 entered promiscuous mode [ 383.894616][T10016] tun0: tun_chr_ioctl cmd 1074025692 [ 384.178036][T10028] device syzkaller0 entered promiscuous mode [ 384.526610][T10043] device pim6reg1 entered promiscuous mode [ 384.798866][T10054] device syzkaller0 entered promiscuous mode [ 385.338074][ T28] audit: type=1400 audit(1757548607.940:144): avc: denied { ioctl } for pid=10065 comm="syz.3.3393" path="pid:[4026532290]" dev="nsfs" ino=4026532290 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 386.624496][T10110] bond_slave_1: mtu less than device minimum [ 387.858907][T10140] bond_slave_1: mtu less than device minimum [ 388.062323][T10145] FAULT_INJECTION: forcing a failure. [ 388.062323][T10145] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 388.075636][T10145] CPU: 0 PID: 10145 Comm: syz.2.3422 Not tainted syzkaller #0 [ 388.083108][T10145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 388.093160][T10145] Call Trace: [ 388.096431][T10145] [ 388.099352][T10145] __dump_stack+0x21/0x24 [ 388.103677][T10145] dump_stack_lvl+0xee/0x150 [ 388.108261][T10145] ? __cfi_dump_stack_lvl+0x8/0x8 [ 388.113279][T10145] ? __cfi___sanitizer_cov_trace_const_cmp8+0x10/0x10 [ 388.120166][T10145] dump_stack+0x15/0x24 [ 388.124322][T10145] should_fail_ex+0x3d4/0x520 [ 388.128999][T10145] should_fail+0xb/0x10 [ 388.133153][T10145] should_fail_usercopy+0x1a/0x20 [ 388.138180][T10145] _copy_from_user+0x1e/0xc0 [ 388.142766][T10145] generic_map_update_batch+0x458/0x780 [ 388.148369][T10145] ? __cfi_generic_map_update_batch+0x10/0x10 [ 388.154423][T10145] ? __cfi_generic_map_update_batch+0x10/0x10 [ 388.160472][T10145] bpf_map_do_batch+0x48c/0x620 [ 388.165348][T10145] __sys_bpf+0x624/0x780 [ 388.169570][T10145] ? bpf_link_show_fdinfo+0x320/0x320 [ 388.174923][T10145] ? __cfi_sched_clock_cpu+0x10/0x10 [ 388.180191][T10145] __x64_sys_bpf+0x7c/0x90 [ 388.184593][T10145] x64_sys_call+0x488/0x9a0 [ 388.189077][T10145] do_syscall_64+0x4c/0xa0 [ 388.193473][T10145] ? clear_bhb_loop+0x30/0x80 [ 388.198132][T10145] ? clear_bhb_loop+0x30/0x80 [ 388.202792][T10145] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 388.208667][T10145] RIP: 0033:0x7f867f78eba9 [ 388.213062][T10145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 388.232668][T10145] RSP: 002b:00007f8680653038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 388.241064][T10145] RAX: ffffffffffffffda RBX: 00007f867f9d5fa0 RCX: 00007f867f78eba9 [ 388.249015][T10145] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 388.256965][T10145] RBP: 00007f8680653090 R08: 0000000000000000 R09: 0000000000000000 [ 388.264922][T10145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 388.272876][T10145] R13: 00007f867f9d6038 R14: 00007f867f9d5fa0 R15: 00007ffdaf1708f8 [ 388.280829][T10145] [ 388.388732][T10155] device macsec0 entered promiscuous mode [ 389.854643][ T334] device veth0_vlan left promiscuous mode [ 390.241209][T10169] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.320653][T10169] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.401014][T10169] device bridge_slave_0 entered promiscuous mode [ 390.510069][T10169] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.517126][T10169] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.541892][T10169] device bridge_slave_1 entered promiscuous mode [ 391.747362][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 391.771365][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 392.030154][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 392.062103][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 392.075427][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.082506][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.163124][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 392.171754][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 392.180046][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.187130][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.245729][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 392.267756][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 392.280724][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 392.289045][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 392.297573][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 392.313956][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 392.365155][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 392.377097][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 392.385326][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 392.393469][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 392.401385][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 392.411366][T10169] device veth0_vlan entered promiscuous mode [ 392.444429][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 392.453597][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 392.465895][T10169] device veth1_macvtap entered promiscuous mode [ 392.476786][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 392.585570][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 392.670402][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 392.735145][T10231] bond_slave_1: mtu less than device minimum [ 392.860628][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 392.868937][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 393.603069][T10274] bond_slave_1: mtu less than device minimum [ 394.378329][T10296] bond_slave_1: mtu less than device minimum [ 395.203504][T10320] bond_slave_1: mtu less than device minimum [ 395.220832][T10321] bond_slave_1: mtu less than device minimum [ 395.316557][T10330] device syzkaller0 entered promiscuous mode [ 395.698052][T10324] device syzkaller0 entered promiscuous mode [ 396.477581][T10350] bond_slave_1: mtu less than device minimum [ 397.453517][T10365] bond_slave_1: mtu less than device minimum [ 397.899465][T10387] device sit0 entered promiscuous mode [ 398.303716][T10391] device sit0 entered promiscuous mode [ 399.819232][T10427] bond_slave_1: mtu less than device minimum [ 399.899481][T10434] bond_slave_1: mtu less than device minimum [ 399.964114][T10437] device sit0 left promiscuous mode [ 400.183598][T10442] device sit0 entered promiscuous mode [ 400.578117][T10453] syzkaller1: tun_chr_ioctl cmd 2147767507 [ 400.590879][T10449] device pim6reg1 entered promiscuous mode [ 401.272293][T10477] bond_slave_1: mtu less than device minimum [ 401.691503][T10490] bond_slave_1: mtu less than device minimum [ 401.698085][T10489] device sit0 entered promiscuous mode [ 402.136367][T10500] bond_slave_1: mtu less than device minimum [ 402.156144][T10499] device sit0 entered promiscuous mode [ 402.342490][T10502] FAULT_INJECTION: forcing a failure. [ 402.342490][T10502] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 402.447005][T10502] CPU: 0 PID: 10502 Comm: syz.0.3542 Not tainted syzkaller #0 [ 402.454501][T10502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 402.464563][T10502] Call Trace: [ 402.467835][T10502] [ 402.470758][T10502] __dump_stack+0x21/0x24 [ 402.475083][T10502] dump_stack_lvl+0xee/0x150 [ 402.479651][T10502] ? __cfi_dump_stack_lvl+0x8/0x8 [ 402.484653][T10502] dump_stack+0x15/0x24 [ 402.488786][T10502] should_fail_ex+0x3d4/0x520 [ 402.493447][T10502] should_fail+0xb/0x10 [ 402.497587][T10502] should_fail_usercopy+0x1a/0x20 [ 402.502594][T10502] _copy_from_user+0x1e/0xc0 [ 402.507166][T10502] generic_map_update_batch+0x4b1/0x780 [ 402.512699][T10502] ? __cfi_generic_map_update_batch+0x10/0x10 [ 402.518752][T10502] ? bpf_map_do_batch+0x3e4/0x620 [ 402.523756][T10502] ? __cfi_generic_map_update_batch+0x10/0x10 [ 402.529805][T10502] bpf_map_do_batch+0x48c/0x620 [ 402.534635][T10502] __sys_bpf+0x624/0x780 [ 402.538856][T10502] ? bpf_link_show_fdinfo+0x320/0x320 [ 402.544212][T10502] ? __cfi_sched_clock_cpu+0x10/0x10 [ 402.549482][T10502] __x64_sys_bpf+0x7c/0x90 [ 402.553884][T10502] x64_sys_call+0x488/0x9a0 [ 402.558367][T10502] do_syscall_64+0x4c/0xa0 [ 402.562772][T10502] ? clear_bhb_loop+0x30/0x80 [ 402.567430][T10502] ? clear_bhb_loop+0x30/0x80 [ 402.572087][T10502] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 402.577967][T10502] RIP: 0033:0x7ffa8018eba9 [ 402.582364][T10502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 402.601952][T10502] RSP: 002b:00007ffa80fd2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 402.610349][T10502] RAX: ffffffffffffffda RBX: 00007ffa803d5fa0 RCX: 00007ffa8018eba9 [ 402.618300][T10502] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 402.626258][T10502] RBP: 00007ffa80fd2090 R08: 0000000000000000 R09: 0000000000000000 [ 402.634209][T10502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 402.642163][T10502] R13: 00007ffa803d6038 R14: 00007ffa803d5fa0 R15: 00007ffc5246a658 [ 402.650124][T10502] [ 402.681916][T10507] device pim6reg1 entered promiscuous mode [ 402.873079][T10526] bond_slave_1: mtu less than device minimum [ 403.000472][T10529] bond_slave_1: mtu less than device minimum [ 404.285728][T10556] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.296139][T10556] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.913250][T10567] device bridge_slave_1 left promiscuous mode [ 404.983801][T10567] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.074104][T10567] device bridge_slave_0 left promiscuous mode [ 405.089898][T10567] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.381157][T10576] bond_slave_1: mtu less than device minimum [ 405.600994][T10581] bond_slave_1: mtu less than device minimum [ 406.262121][T10591] device sit0 left promiscuous mode [ 406.774960][T10605] bond_slave_1: mtu less than device minimum [ 407.052903][T10595] device veth1_macvtap left promiscuous mode [ 407.199675][T10606] device sit0 entered promiscuous mode [ 407.961476][T10628] bond_slave_1: mtu less than device minimum [ 408.659658][T10653] bond_slave_1: mtu less than device minimum [ 409.245011][T10674] bond_slave_1: mtu less than device minimum [ 410.154299][T10701] bond_slave_1: mtu less than device minimum [ 411.377199][T10724] bond_slave_1: mtu less than device minimum [ 412.758160][T10753] bond_slave_1: mtu less than device minimum [ 413.443406][T10766] bond_slave_1: mtu less than device minimum [ 414.349848][T10800] bond_slave_1: mtu less than device minimum [ 414.808657][T10813] bond_slave_1: mtu less than device minimum [ 415.641470][T10846] bond_slave_1: mtu less than device minimum [ 415.675260][T10836] device pim6reg1 entered promiscuous mode [ 416.011652][T10864] bond_slave_1: mtu less than device minimum [ 416.202875][T10865] device sit0 left promiscuous mode [ 416.781872][T10900] device veth1_macvtap left promiscuous mode [ 416.787883][T10900] device macsec0 left promiscuous mode [ 416.971111][T10901] bond_slave_1: mtu less than device minimum [ 416.994598][T10911] bond_slave_1: mtu less than device minimum [ 417.291873][T10921] device sit0 left promiscuous mode [ 417.444504][T10926] device sit0 entered promiscuous mode [ 418.193388][T10951] bond_slave_1: mtu less than device minimum [ 418.401312][T10965] bond_slave_1: mtu less than device minimum [ 418.682162][T10972] device wg2 left promiscuous mode [ 418.725847][T10972] device wg2 entered promiscuous mode [ 418.736385][T10974] FAULT_INJECTION: forcing a failure. [ 418.736385][T10974] name failslab, interval 1, probability 0, space 0, times 0 [ 418.757263][T10974] CPU: 1 PID: 10974 Comm: syz.2.3708 Not tainted syzkaller #0 [ 418.764754][T10974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 418.774815][T10974] Call Trace: [ 418.778091][T10974] [ 418.781014][T10974] __dump_stack+0x21/0x24 [ 418.785349][T10974] dump_stack_lvl+0xee/0x150 [ 418.789945][T10974] ? __cfi_dump_stack_lvl+0x8/0x8 [ 418.794973][T10974] dump_stack+0x15/0x24 [ 418.799134][T10974] should_fail_ex+0x3d4/0x520 [ 418.803814][T10974] __should_failslab+0xac/0xf0 [ 418.808576][T10974] ? slhc_init+0x77/0x770 [ 418.813018][T10974] should_failslab+0x9/0x20 [ 418.817514][T10974] __kmem_cache_alloc_node+0x3d/0x2c0 [ 418.822882][T10974] ? security_file_permission+0x94/0xb0 [ 418.828422][T10974] ? slhc_init+0x77/0x770 [ 418.832745][T10974] kmalloc_trace+0x29/0xb0 [ 418.837160][T10974] slhc_init+0x77/0x770 [ 418.841308][T10974] ppp_ioctl+0x126d/0x1690 [ 418.845717][T10974] ? mutex_unlock+0x89/0x220 [ 418.850306][T10974] ? __cfi_mutex_unlock+0x10/0x10 [ 418.855325][T10974] ? __cfi_ppp_ioctl+0x10/0x10 [ 418.860087][T10974] ? __fget_files+0x2d5/0x330 [ 418.864760][T10974] ? security_file_ioctl+0x95/0xc0 [ 418.869866][T10974] ? __cfi_ppp_ioctl+0x10/0x10 [ 418.874627][T10974] __se_sys_ioctl+0x12f/0x1b0 [ 418.879296][T10974] __x64_sys_ioctl+0x7b/0x90 [ 418.883878][T10974] x64_sys_call+0x58b/0x9a0 [ 418.888374][T10974] do_syscall_64+0x4c/0xa0 [ 418.892779][T10974] ? clear_bhb_loop+0x30/0x80 [ 418.897456][T10974] ? clear_bhb_loop+0x30/0x80 [ 418.902140][T10974] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 418.908033][T10974] RIP: 0033:0x7f867f78eba9 [ 418.912442][T10974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 418.932051][T10974] RSP: 002b:00007f8680653038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 418.940478][T10974] RAX: ffffffffffffffda RBX: 00007f867f9d5fa0 RCX: 00007f867f78eba9 [ 418.948449][T10974] RDX: 0000200000000180 RSI: 0000000040047451 RDI: 0000000000000003 [ 418.956419][T10974] RBP: 00007f8680653090 R08: 0000000000000000 R09: 0000000000000000 [ 418.964391][T10974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 418.972358][T10974] R13: 00007f867f9d6038 R14: 00007f867f9d5fa0 R15: 00007ffdaf1708f8 [ 418.980331][T10974] [ 419.560198][T11011] bond_slave_1: mtu less than device minimum [ 419.724812][T11019] FAULT_INJECTION: forcing a failure. [ 419.724812][T11019] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 419.880712][T11029] bond_slave_1: mtu less than device minimum [ 419.900832][T11019] CPU: 0 PID: 11019 Comm: syz.0.3722 Not tainted syzkaller #0 [ 419.908323][T11019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 419.918393][T11019] Call Trace: [ 419.921671][T11019] [ 419.924600][T11019] __dump_stack+0x21/0x24 [ 419.928924][T11019] dump_stack_lvl+0xee/0x150 [ 419.933502][T11019] ? __cfi_dump_stack_lvl+0x8/0x8 [ 419.938508][T11019] ? dump_stack+0x9/0x24 [ 419.942730][T11019] dump_stack+0x15/0x24 [ 419.946864][T11019] should_fail_ex+0x3d4/0x520 [ 419.951523][T11019] should_fail+0xb/0x10 [ 419.955660][T11019] should_fail_usercopy+0x1a/0x20 [ 419.960665][T11019] _copy_from_user+0x1e/0xc0 [ 419.965235][T11019] generic_map_update_batch+0x458/0x780 [ 419.970764][T11019] ? __cfi_generic_map_update_batch+0x10/0x10 [ 419.976813][T11019] ? bpf_map_do_batch+0x39c/0x620 [ 419.981813][T11019] ? __cfi_generic_map_update_batch+0x10/0x10 [ 419.987863][T11019] bpf_map_do_batch+0x48c/0x620 [ 419.992691][T11019] __sys_bpf+0x624/0x780 [ 419.996908][T11019] ? bpf_link_show_fdinfo+0x320/0x320 [ 420.002260][T11019] __x64_sys_bpf+0x7c/0x90 [ 420.006657][T11019] x64_sys_call+0x488/0x9a0 [ 420.011137][T11019] do_syscall_64+0x4c/0xa0 [ 420.015528][T11019] ? clear_bhb_loop+0x30/0x80 [ 420.020181][T11019] ? clear_bhb_loop+0x30/0x80 [ 420.024835][T11019] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 420.030704][T11019] RIP: 0033:0x7ffa8018eba9 [ 420.035097][T11019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 420.054677][T11019] RSP: 002b:00007ffa80fd2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 420.063069][T11019] RAX: ffffffffffffffda RBX: 00007ffa803d5fa0 RCX: 00007ffa8018eba9 [ 420.071022][T11019] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 420.078967][T11019] RBP: 00007ffa80fd2090 R08: 0000000000000000 R09: 0000000000000000 [ 420.086918][T11019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 420.094866][T11019] R13: 00007ffa803d6038 R14: 00007ffa803d5fa0 R15: 00007ffc5246a658 [ 420.102818][T11019] [ 420.698719][T11057] device pim6reg1 entered promiscuous mode [ 421.170171][T11075] bond_slave_1: mtu less than device minimum [ 421.890431][T11090] bond_slave_1: mtu less than device minimum [ 422.963157][T11122] bond_slave_1: mtu less than device minimum [ 423.882079][T11135] bond_slave_1: mtu less than device minimum [ 424.629875][T11162] bond_slave_1: mtu less than device minimum [ 425.812457][T11187] bond_slave_1: mtu less than device minimum [ 426.305856][T11197] bond_slave_1: mtu less than device minimum [ 426.901248][T11205] device syzkaller0 entered promiscuous mode [ 427.887726][T11230] bond_slave_1: mtu less than device minimum [ 428.113663][T11232] bond_slave_1: mtu less than device minimum [ 428.935695][T11244] bond_slave_1: mtu less than device minimum [ 429.224411][T11242] device syzkaller0 entered promiscuous mode [ 429.525737][T11257] device pim6reg1 entered promiscuous mode [ 429.711705][T11271] bond_slave_1: mtu less than device minimum [ 430.053079][T11275] bond_slave_1: mtu less than device minimum [ 430.300669][T11283] device pim6reg1 entered promiscuous mode [ 431.003150][T11314] bond_slave_1: mtu less than device minimum [ 431.293156][T11329] bond_slave_1: mtu less than device minimum [ 432.947808][T11359] bond_slave_1: mtu less than device minimum [ 433.282058][T11384] bond_slave_1: mtu less than device minimum [ 434.516729][T11419] device syzkaller0 entered promiscuous mode [ 434.523546][T11418] bond_slave_1: mtu less than device minimum [ 434.824351][T11428] bond_slave_1: mtu less than device minimum [ 435.675282][T11458] bond_slave_1: mtu less than device minimum [ 436.213329][ T28] audit: type=1400 audit(1757548658.820:145): avc: denied { create } for pid=11466 comm="syz.3.3879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 436.439835][T11475] bond_slave_1: mtu less than device minimum [ 436.532887][T11479] device sit0 left promiscuous mode [ 437.630719][T11509] bond_slave_1: mtu less than device minimum [ 438.047238][T11528] bond_slave_1: mtu less than device minimum [ 438.431231][T11530] device veth1_macvtap left promiscuous mode [ 439.326162][T11558] device sit0 left promiscuous mode [ 440.060985][T11568] bond_slave_1: mtu less than device minimum [ 440.126985][T11565] bond_slave_1: mtu less than device minimum [ 440.140103][T11567] device sit0 entered promiscuous mode [ 440.401541][T11583] device sit0 left promiscuous mode [ 440.816353][T11590] device sit0 entered promiscuous mode [ 441.512206][T11614] bond_slave_1: mtu less than device minimum [ 441.641452][T11616] bond_slave_1: mtu less than device minimum [ 442.484290][T11646] FAULT_INJECTION: forcing a failure. [ 442.484290][T11646] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 442.600684][T11646] CPU: 0 PID: 11646 Comm: syz.3.3939 Not tainted syzkaller #0 [ 442.608178][T11646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 442.618228][T11646] Call Trace: [ 442.621494][T11646] [ 442.624408][T11646] __dump_stack+0x21/0x24 [ 442.628720][T11646] dump_stack_lvl+0xee/0x150 [ 442.633286][T11646] ? __cfi_dump_stack_lvl+0x8/0x8 [ 442.638289][T11646] ? stack_trace_save+0x98/0xe0 [ 442.643223][T11646] dump_stack+0x15/0x24 [ 442.647358][T11646] should_fail_ex+0x3d4/0x520 [ 442.652021][T11646] should_fail_alloc_page+0x61/0x90 [ 442.657271][T11646] prepare_alloc_pages+0x148/0x5f0 [ 442.662369][T11646] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 442.667553][T11646] __alloc_pages+0x124/0x450 [ 442.672123][T11646] ? __cfi___alloc_pages+0x10/0x10 [ 442.677220][T11646] __kmalloc_large_node+0xa1/0x1c0 [ 442.682316][T11646] ? slhc_init+0xb0/0x770 [ 442.686628][T11646] __kmalloc+0xe0/0x1e0 [ 442.690765][T11646] ? kmalloc_trace+0x40/0xb0 [ 442.695338][T11646] slhc_init+0xb0/0x770 [ 442.699473][T11646] ppp_ioctl+0x126d/0x1690 [ 442.703868][T11646] ? mutex_unlock+0x89/0x220 [ 442.708440][T11646] ? __cfi_mutex_unlock+0x10/0x10 [ 442.713440][T11646] ? __cfi_ppp_ioctl+0x10/0x10 [ 442.718185][T11646] ? __fget_files+0x2d5/0x330 [ 442.722841][T11646] ? security_file_ioctl+0x95/0xc0 [ 442.727933][T11646] ? __cfi_ppp_ioctl+0x10/0x10 [ 442.732685][T11646] __se_sys_ioctl+0x12f/0x1b0 [ 442.737339][T11646] __x64_sys_ioctl+0x7b/0x90 [ 442.741913][T11646] x64_sys_call+0x58b/0x9a0 [ 442.746395][T11646] do_syscall_64+0x4c/0xa0 [ 442.750787][T11646] ? clear_bhb_loop+0x30/0x80 [ 442.755443][T11646] ? clear_bhb_loop+0x30/0x80 [ 442.760104][T11646] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 442.765984][T11646] RIP: 0033:0x7f5a5378eba9 [ 442.770376][T11646] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 442.789960][T11646] RSP: 002b:00007f5a545ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 442.798351][T11646] RAX: ffffffffffffffda RBX: 00007f5a539d5fa0 RCX: 00007f5a5378eba9 [ 442.806304][T11646] RDX: 0000200000000180 RSI: 0000000040047451 RDI: 0000000000000003 [ 442.814257][T11646] RBP: 00007f5a545ed090 R08: 0000000000000000 R09: 0000000000000000 [ 442.822209][T11646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 442.830164][T11646] R13: 00007f5a539d6038 R14: 00007f5a539d5fa0 R15: 00007ffd62a6c3d8 [ 442.838135][T11646] [ 443.329448][T11661] bond_slave_1: mtu less than device minimum [ 444.134250][T11679] bond_slave_1: mtu less than device minimum [ 444.863429][T11706] bond_slave_1: mtu less than device minimum [ 445.534599][T11725] FAULT_INJECTION: forcing a failure. [ 445.534599][T11725] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 445.579837][T11725] CPU: 0 PID: 11725 Comm: syz.1.3969 Not tainted syzkaller #0 [ 445.587331][T11725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 445.597383][T11725] Call Trace: [ 445.600658][T11725] [ 445.603584][T11725] __dump_stack+0x21/0x24 [ 445.607911][T11725] dump_stack_lvl+0xee/0x150 [ 445.612495][T11725] ? __cfi_dump_stack_lvl+0x8/0x8 [ 445.617513][T11725] dump_stack+0x15/0x24 [ 445.621664][T11725] should_fail_ex+0x3d4/0x520 [ 445.626350][T11725] should_fail+0xb/0x10 [ 445.630514][T11725] should_fail_usercopy+0x1a/0x20 [ 445.635549][T11725] _copy_from_user+0x1e/0xc0 [ 445.640144][T11725] generic_map_update_batch+0x4b1/0x780 [ 445.645704][T11725] ? __cfi_generic_map_update_batch+0x10/0x10 [ 445.651784][T11725] ? bpf_map_do_batch+0x3e4/0x620 [ 445.656818][T11725] ? __cfi_generic_map_update_batch+0x10/0x10 [ 445.662893][T11725] bpf_map_do_batch+0x48c/0x620 [ 445.667742][T11725] __sys_bpf+0x624/0x780 [ 445.671978][T11725] ? bpf_link_show_fdinfo+0x320/0x320 [ 445.677350][T11725] ? __cfi_sched_clock_cpu+0x10/0x10 [ 445.682636][T11725] __x64_sys_bpf+0x7c/0x90 [ 445.687058][T11725] x64_sys_call+0x488/0x9a0 [ 445.691572][T11725] do_syscall_64+0x4c/0xa0 [ 445.695990][T11725] ? clear_bhb_loop+0x30/0x80 [ 445.700670][T11725] ? clear_bhb_loop+0x30/0x80 [ 445.705351][T11725] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 445.711250][T11725] RIP: 0033:0x7f62eeb8eba9 [ 445.715673][T11725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 445.735273][T11725] RSP: 002b:00007f62ef95f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 445.743676][T11725] RAX: ffffffffffffffda RBX: 00007f62eedd5fa0 RCX: 00007f62eeb8eba9 [ 445.751629][T11725] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 445.759578][T11725] RBP: 00007f62ef95f090 R08: 0000000000000000 R09: 0000000000000000 [ 445.767527][T11725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 445.775476][T11725] R13: 00007f62eedd6038 R14: 00007f62eedd5fa0 R15: 00007ffd96960688 [ 445.783433][T11725] [ 446.029821][T11735] bond_slave_1: mtu less than device minimum [ 446.487541][T11744] bond_slave_1: mtu less than device minimum [ 447.486031][T11779] bond_slave_1: mtu less than device minimum [ 447.822457][T11784] bond_slave_1: mtu less than device minimum [ 448.586362][T11813] bond_slave_1: mtu less than device minimum [ 448.718327][T11816] bond_slave_1: mtu less than device minimum [ 449.745254][T11857] bond_slave_1: mtu less than device minimum [ 449.888448][T11867] bond_slave_1: mtu less than device minimum [ 451.127376][T11886] bond_slave_1: mtu less than device minimum [ 451.319637][T11899] device pim6reg1 entered promiscuous mode [ 452.060238][T11911] bond_slave_1: mtu less than device minimum [ 452.146082][T11913] bond_slave_1: mtu less than device minimum [ 452.639264][T11931] bond_slave_1: mtu less than device minimum [ 452.958485][T11940] device syzkaller0 entered promiscuous mode [ 453.541943][T11949] bond_slave_1: mtu less than device minimum [ 454.150647][T11971] bond_slave_1: mtu less than device minimum [ 454.799914][T12000] bond_slave_1: mtu less than device minimum [ 454.941679][T12003] bond_slave_1: mtu less than device minimum [ 455.916903][T12045] FAULT_INJECTION: forcing a failure. [ 455.916903][T12045] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 455.935751][T12036] device syzkaller0 entered promiscuous mode [ 455.942359][T12045] CPU: 1 PID: 12045 Comm: syz.4.4090 Not tainted syzkaller #0 [ 455.949842][T12045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 455.959902][T12045] Call Trace: [ 455.963180][T12045] [ 455.966107][T12045] __dump_stack+0x21/0x24 [ 455.970435][T12045] dump_stack_lvl+0xee/0x150 [ 455.975017][T12045] ? __cfi_dump_stack_lvl+0x8/0x8 [ 455.980044][T12045] dump_stack+0x15/0x24 [ 455.984192][T12045] should_fail_ex+0x3d4/0x520 [ 455.988871][T12045] should_fail+0xb/0x10 [ 455.993026][T12045] should_fail_usercopy+0x1a/0x20 [ 455.998053][T12045] _copy_from_user+0x1e/0xc0 [ 456.002654][T12045] ___sys_recvmsg+0x12b/0x510 [ 456.007340][T12045] ? __sys_recvmsg+0x270/0x270 [ 456.012196][T12045] ? security_file_permission+0x94/0xb0 [ 456.017749][T12045] ? __fget_files+0x2d5/0x330 [ 456.022422][T12045] ? __fdget+0x19c/0x220 [ 456.026657][T12045] __x64_sys_recvmsg+0x1ed/0x2c0 [ 456.031592][T12045] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 456.037051][T12045] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 456.043115][T12045] x64_sys_call+0x75/0x9a0 [ 456.047531][T12045] do_syscall_64+0x4c/0xa0 [ 456.051940][T12045] ? clear_bhb_loop+0x30/0x80 [ 456.056615][T12045] ? clear_bhb_loop+0x30/0x80 [ 456.061286][T12045] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 456.067173][T12045] RIP: 0033:0x7fd9cbd8eba9 [ 456.071575][T12045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 456.091170][T12045] RSP: 002b:00007fd9ccb7b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 456.099574][T12045] RAX: ffffffffffffffda RBX: 00007fd9cbfd5fa0 RCX: 00007fd9cbd8eba9 [ 456.107531][T12045] RDX: 0000000000000000 RSI: 00002000000004c0 RDI: 0000000000000006 [ 456.115485][T12045] RBP: 00007fd9ccb7b090 R08: 0000000000000000 R09: 0000000000000000 [ 456.123439][T12045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 456.131392][T12045] R13: 00007fd9cbfd6038 R14: 00007fd9cbfd5fa0 R15: 00007fffe1c5cc18 [ 456.139350][T12045] [ 456.245739][T12042] bond_slave_1: mtu less than device minimum [ 456.363609][T12060] bond_slave_1: mtu less than device minimum [ 457.476449][T12087] bond_slave_1: mtu less than device minimum [ 457.707658][T12099] bond_slave_1: mtu less than device minimum [ 458.271169][T12127] bond_slave_1: mtu less than device minimum [ 458.870596][T12153] bond_slave_1: mtu less than device minimum [ 459.707535][T12171] bond_slave_1: mtu less than device minimum [ 459.934280][T12191] bond_slave_1: mtu less than device minimum [ 460.306107][T12195] device sit0 left promiscuous mode [ 460.555323][T12211] bond_slave_1: mtu less than device minimum [ 461.402303][T12239] bond_slave_1: mtu less than device minimum [ 461.505908][T12238] bond_slave_1: mtu less than device minimum [ 462.787276][T12264] bond_slave_1: mtu less than device minimum [ 463.005581][T12279] bond_slave_1: mtu less than device minimum [ 463.580513][T12283] device sit0 left promiscuous mode [ 464.053261][T12284] device sit0 entered promiscuous mode [ 464.703737][T12313] bond_slave_1: mtu less than device minimum [ 464.851298][T12319] bond_slave_1: mtu less than device minimum [ 465.006488][T12322] FAULT_INJECTION: forcing a failure. [ 465.006488][T12322] name failslab, interval 1, probability 0, space 0, times 0 [ 465.060617][T12322] CPU: 0 PID: 12322 Comm: syz.2.4193 Not tainted syzkaller #0 [ 465.068112][T12322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 465.078168][T12322] Call Trace: [ 465.081450][T12322] [ 465.084378][T12322] __dump_stack+0x21/0x24 [ 465.088707][T12322] dump_stack_lvl+0xee/0x150 [ 465.093290][T12322] ? __cfi_dump_stack_lvl+0x8/0x8 [ 465.098311][T12322] ? __alloc_pages+0x439/0x450 [ 465.103087][T12322] ? __cfi___alloc_pages+0x10/0x10 [ 465.108196][T12322] dump_stack+0x15/0x24 [ 465.112348][T12322] should_fail_ex+0x3d4/0x520 [ 465.117024][T12322] __should_failslab+0xac/0xf0 [ 465.121782][T12322] ? slhc_init+0x160/0x770 [ 465.126197][T12322] should_failslab+0x9/0x20 [ 465.130693][T12322] __kmem_cache_alloc_node+0x3d/0x2c0 [ 465.136065][T12322] ? slhc_init+0x160/0x770 [ 465.140475][T12322] __kmalloc+0xa1/0x1e0 [ 465.144633][T12322] slhc_init+0x160/0x770 [ 465.148877][T12322] ppp_ioctl+0x126d/0x1690 [ 465.153292][T12322] ? mutex_unlock+0x89/0x220 [ 465.157878][T12322] ? __cfi_mutex_unlock+0x10/0x10 [ 465.162908][T12322] ? __cfi_ppp_ioctl+0x10/0x10 [ 465.167673][T12322] ? __fget_files+0x2d5/0x330 [ 465.172347][T12322] ? security_file_ioctl+0x95/0xc0 [ 465.177459][T12322] ? __cfi_ppp_ioctl+0x10/0x10 [ 465.182223][T12322] __se_sys_ioctl+0x12f/0x1b0 [ 465.186890][T12322] __x64_sys_ioctl+0x7b/0x90 [ 465.191471][T12322] x64_sys_call+0x58b/0x9a0 [ 465.195980][T12322] do_syscall_64+0x4c/0xa0 [ 465.200386][T12322] ? clear_bhb_loop+0x30/0x80 [ 465.205059][T12322] ? clear_bhb_loop+0x30/0x80 [ 465.209730][T12322] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 465.215620][T12322] RIP: 0033:0x7f867f78eba9 [ 465.220043][T12322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 465.239656][T12322] RSP: 002b:00007f8680653038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 465.248076][T12322] RAX: ffffffffffffffda RBX: 00007f867f9d5fa0 RCX: 00007f867f78eba9 [ 465.256043][T12322] RDX: 0000200000000180 RSI: 0000000040047451 RDI: 0000000000000003 [ 465.264008][T12322] RBP: 00007f8680653090 R08: 0000000000000000 R09: 0000000000000000 [ 465.271974][T12322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 465.279939][T12322] R13: 00007f867f9d6038 R14: 00007f867f9d5fa0 R15: 00007ffdaf1708f8 [ 465.287915][T12322] [ 465.406565][T12332] bond_slave_1: mtu less than device minimum [ 465.696524][ T28] audit: type=1400 audit(1757548688.300:146): avc: denied { create } for pid=12342 comm="syz.0.4202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 466.227309][T12361] bond_slave_1: mtu less than device minimum [ 466.510784][T12365] bond_slave_1: mtu less than device minimum [ 466.754536][T12374] FAULT_INJECTION: forcing a failure. [ 466.754536][T12374] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 466.768029][T12374] CPU: 1 PID: 12374 Comm: syz.1.4212 Not tainted syzkaller #0 [ 466.775504][T12374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 466.785563][T12374] Call Trace: [ 466.788842][T12374] [ 466.791768][T12374] __dump_stack+0x21/0x24 [ 466.796117][T12374] dump_stack_lvl+0xee/0x150 [ 466.800708][T12374] ? __cfi_dump_stack_lvl+0x8/0x8 [ 466.805735][T12374] ? migrate_enable+0x19c/0x280 [ 466.810587][T12374] dump_stack+0x15/0x24 [ 466.814742][T12374] should_fail_ex+0x3d4/0x520 [ 466.819429][T12374] should_fail+0xb/0x10 [ 466.823583][T12374] should_fail_usercopy+0x1a/0x20 [ 466.828632][T12374] _copy_from_user+0x1e/0xc0 [ 466.833235][T12374] generic_map_update_batch+0x458/0x780 [ 466.838810][T12374] ? __cfi_generic_map_update_batch+0x10/0x10 [ 466.844893][T12374] ? kasan_check_range+0x85/0x290 [ 466.849938][T12374] ? __cfi_generic_map_update_batch+0x10/0x10 [ 466.856016][T12374] bpf_map_do_batch+0x48c/0x620 [ 466.860878][T12374] __sys_bpf+0x624/0x780 [ 466.865123][T12374] ? bpf_link_show_fdinfo+0x320/0x320 [ 466.870499][T12374] ? irqentry_exit+0x37/0x40 [ 466.875091][T12374] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 466.880881][T12374] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 466.887021][T12374] __x64_sys_bpf+0x7c/0x90 [ 466.891430][T12374] x64_sys_call+0x488/0x9a0 [ 466.895939][T12374] do_syscall_64+0x4c/0xa0 [ 466.900343][T12374] ? clear_bhb_loop+0x30/0x80 [ 466.905007][T12374] ? clear_bhb_loop+0x30/0x80 [ 466.909679][T12374] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 466.915577][T12374] RIP: 0033:0x7f62eeb8eba9 [ 466.919975][T12374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 466.939565][T12374] RSP: 002b:00007f62ef95f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 466.947960][T12374] RAX: ffffffffffffffda RBX: 00007f62eedd5fa0 RCX: 00007f62eeb8eba9 [ 466.955912][T12374] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 466.963861][T12374] RBP: 00007f62ef95f090 R08: 0000000000000000 R09: 0000000000000000 [ 466.971809][T12374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 466.979757][T12374] R13: 00007f62eedd6038 R14: 00007f62eedd5fa0 R15: 00007ffd96960688 [ 466.987713][T12374] [ 467.713654][T12400] bond_slave_1: mtu less than device minimum [ 467.740995][T12403] bond_slave_1: mtu less than device minimum [ 468.494761][ T28] audit: type=1400 audit(1757548691.100:147): avc: denied { create } for pid=12413 comm="syz.3.4228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 468.847997][T12434] bond_slave_1: mtu less than device minimum [ 469.357261][ T28] audit: type=1400 audit(1757548691.960:148): avc: denied { create } for pid=12446 comm="syz.3.4242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 469.614850][T12456] bond_slave_1: mtu less than device minimum [ 469.735216][T12464] device veth1_macvtap left promiscuous mode [ 469.772835][T12464] device macsec0 left promiscuous mode [ 470.265945][T12474] bond_slave_1: mtu less than device minimum [ 471.211172][T12497] bond_slave_1: mtu less than device minimum [ 471.650583][T12510] bond_slave_1: mtu less than device minimum [ 472.891192][T12536] bond_slave_1: mtu less than device minimum [ 473.622867][T12551] bond_slave_1: mtu less than device minimum [ 473.954206][T12568] bond_slave_1: mtu less than device minimum [ 474.102960][T12574] device veth0_vlan left promiscuous mode [ 474.110109][T12574] device veth0_vlan entered promiscuous mode [ 474.215652][T12578] FAULT_INJECTION: forcing a failure. [ 474.215652][T12578] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 474.300129][T12578] CPU: 1 PID: 12578 Comm: syz.1.4291 Not tainted syzkaller #0 [ 474.307727][T12578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 474.318055][T12578] Call Trace: [ 474.321339][T12578] [ 474.324270][T12578] __dump_stack+0x21/0x24 [ 474.328601][T12578] dump_stack_lvl+0xee/0x150 [ 474.333188][T12578] ? __cfi_dump_stack_lvl+0x8/0x8 [ 474.338210][T12578] ? __stack_depot_save+0x36/0x480 [ 474.343407][T12578] dump_stack+0x15/0x24 [ 474.347577][T12578] should_fail_ex+0x3d4/0x520 [ 474.352266][T12578] should_fail+0xb/0x10 [ 474.356425][T12578] should_fail_usercopy+0x1a/0x20 [ 474.361449][T12578] _copy_from_user+0x1e/0xc0 [ 474.366042][T12578] iovec_from_user+0x1aa/0x2e0 [ 474.370897][T12578] __import_iovec+0x71/0x470 [ 474.375488][T12578] ? kstrtouint_from_user+0xf7/0x150 [ 474.380782][T12578] import_iovec+0x7c/0xb0 [ 474.385117][T12578] ___sys_recvmsg+0x433/0x510 [ 474.389809][T12578] ? __sys_recvmsg+0x270/0x270 [ 474.394586][T12578] ? security_file_permission+0x94/0xb0 [ 474.400152][T12578] ? __fget_files+0x2d5/0x330 [ 474.404847][T12578] ? __fdget+0x19c/0x220 [ 474.409099][T12578] __x64_sys_recvmsg+0x1ed/0x2c0 [ 474.414041][T12578] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 474.419502][T12578] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 474.425575][T12578] x64_sys_call+0x75/0x9a0 [ 474.430262][T12578] do_syscall_64+0x4c/0xa0 [ 474.434685][T12578] ? clear_bhb_loop+0x30/0x80 [ 474.439387][T12578] ? clear_bhb_loop+0x30/0x80 [ 474.444093][T12578] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 474.450014][T12578] RIP: 0033:0x7f62eeb8eba9 [ 474.454445][T12578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 474.474770][T12578] RSP: 002b:00007f62ef93e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 474.483204][T12578] RAX: ffffffffffffffda RBX: 00007f62eedd6090 RCX: 00007f62eeb8eba9 [ 474.491185][T12578] RDX: 0000000000000000 RSI: 00002000000004c0 RDI: 0000000000000005 [ 474.499159][T12578] RBP: 00007f62ef93e090 R08: 0000000000000000 R09: 0000000000000000 [ 474.507124][T12578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 474.515124][T12578] R13: 00007f62eedd6128 R14: 00007f62eedd6090 R15: 00007ffd96960688 [ 474.523184][T12578] [ 474.731454][T12586] FAULT_INJECTION: forcing a failure. [ 474.731454][T12586] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 474.763913][T12586] CPU: 0 PID: 12586 Comm: syz.3.4292 Not tainted syzkaller #0 [ 474.771405][T12586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 474.781458][T12586] Call Trace: [ 474.784730][T12586] [ 474.787665][T12586] __dump_stack+0x21/0x24 [ 474.792003][T12586] dump_stack_lvl+0xee/0x150 [ 474.796595][T12586] ? __cfi_dump_stack_lvl+0x8/0x8 [ 474.801637][T12586] dump_stack+0x15/0x24 [ 474.805821][T12586] should_fail_ex+0x3d4/0x520 [ 474.810517][T12586] should_fail+0xb/0x10 [ 474.814682][T12586] should_fail_usercopy+0x1a/0x20 [ 474.819723][T12586] _copy_to_user+0x1e/0x90 [ 474.824166][T12586] simple_read_from_buffer+0xe9/0x160 [ 474.829542][T12586] proc_fail_nth_read+0x19a/0x210 [ 474.835396][T12586] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 474.840957][T12586] ? security_file_permission+0x94/0xb0 [ 474.846518][T12586] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 474.852154][T12586] vfs_read+0x26e/0x8c0 [ 474.856317][T12586] ? __cfi_vfs_read+0x10/0x10 [ 474.861009][T12586] ? __kasan_check_write+0x14/0x20 [ 474.866129][T12586] ? mutex_lock+0x8d/0x1a0 [ 474.870557][T12586] ? __cfi_mutex_lock+0x10/0x10 [ 474.875415][T12586] ? __fdget_pos+0x2cd/0x380 [ 474.880002][T12586] ? ksys_read+0x71/0x240 [ 474.884339][T12586] ksys_read+0x140/0x240 [ 474.888585][T12586] ? fput+0x154/0x1a0 [ 474.892691][T12586] ? __cfi_ksys_read+0x10/0x10 [ 474.897466][T12586] ? debug_smp_processor_id+0x17/0x20 [ 474.902850][T12586] __x64_sys_read+0x7b/0x90 [ 474.907362][T12586] x64_sys_call+0x2f/0x9a0 [ 474.911783][T12586] do_syscall_64+0x4c/0xa0 [ 474.916201][T12586] ? clear_bhb_loop+0x30/0x80 [ 474.920888][T12586] ? clear_bhb_loop+0x30/0x80 [ 474.925579][T12586] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 474.931495][T12586] RIP: 0033:0x7f5a5378d5bc [ 474.935910][T12586] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 474.955515][T12586] RSP: 002b:00007f5a545ab030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 474.963919][T12586] RAX: ffffffffffffffda RBX: 00007f5a539d6180 RCX: 00007f5a5378d5bc [ 474.971871][T12586] RDX: 000000000000000f RSI: 00007f5a545ab0a0 RDI: 000000000000000e [ 474.979828][T12586] RBP: 00007f5a545ab090 R08: 0000000000000000 R09: 0000000000000000 [ 474.987795][T12586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 474.995749][T12586] R13: 00007f5a539d6218 R14: 00007f5a539d6180 R15: 00007ffd62a6c3d8 [ 475.003710][T12586] [ 475.060742][T12584] bond_slave_1: mtu less than device minimum [ 475.792719][T12601] device syzkaller0 entered promiscuous mode [ 476.083875][T12602] device syzkaller0 entered promiscuous mode [ 476.398845][T12617] bond_slave_1: mtu less than device minimum [ 476.607562][T12625] bond_slave_1: mtu less than device minimum [ 476.752480][T12632] FAULT_INJECTION: forcing a failure. [ 476.752480][T12632] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 476.765886][T12632] CPU: 0 PID: 12632 Comm: syz.1.4308 Not tainted syzkaller #0 [ 476.773371][T12632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 476.783516][T12632] Call Trace: [ 476.786802][T12632] [ 476.789730][T12632] __dump_stack+0x21/0x24 [ 476.794067][T12632] dump_stack_lvl+0xee/0x150 [ 476.798652][T12632] ? __cfi_dump_stack_lvl+0x8/0x8 [ 476.803673][T12632] dump_stack+0x15/0x24 [ 476.807822][T12632] should_fail_ex+0x3d4/0x520 [ 476.812513][T12632] should_fail+0xb/0x10 [ 476.816675][T12632] should_fail_usercopy+0x1a/0x20 [ 476.821695][T12632] _copy_from_user+0x1e/0xc0 [ 476.826292][T12632] __sys_bpf+0x277/0x780 [ 476.830538][T12632] ? bpf_link_show_fdinfo+0x320/0x320 [ 476.835919][T12632] ? __cfi_sched_clock_cpu+0x10/0x10 [ 476.841225][T12632] __x64_sys_bpf+0x7c/0x90 [ 476.845655][T12632] x64_sys_call+0x488/0x9a0 [ 476.850175][T12632] do_syscall_64+0x4c/0xa0 [ 476.854602][T12632] ? clear_bhb_loop+0x30/0x80 [ 476.859285][T12632] ? clear_bhb_loop+0x30/0x80 [ 476.863966][T12632] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 476.869867][T12632] RIP: 0033:0x7f62eeb8eba9 [ 476.874295][T12632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 476.893998][T12632] RSP: 002b:00007f62ef95f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 476.902423][T12632] RAX: ffffffffffffffda RBX: 00007f62eedd5fa0 RCX: 00007f62eeb8eba9 [ 476.910415][T12632] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 476.918394][T12632] RBP: 00007f62ef95f090 R08: 0000000000000000 R09: 0000000000000000 [ 476.926473][T12632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 476.934452][T12632] R13: 00007f62eedd6038 R14: 00007f62eedd5fa0 R15: 00007ffd96960688 [ 476.942432][T12632] [ 478.168838][T12634] device syzkaller0 entered promiscuous mode [ 478.251743][T12659] bond_slave_1: mtu less than device minimum [ 478.643670][T12672] bond_slave_1: mtu less than device minimum [ 480.333992][T12707] bond_slave_1: mtu less than device minimum [ 480.493376][T12712] bond_slave_1: mtu less than device minimum [ 481.551301][T12744] bond_slave_1: mtu less than device minimum [ 482.061311][T12768] bond_slave_1: mtu less than device minimum [ 482.578979][T12785] bond_slave_1: mtu less than device minimum [ 482.747726][T12791] bond_slave_1: mtu less than device minimum [ 483.688129][T12821] bond_slave_1: mtu less than device minimum [ 483.813397][T12824] bond_slave_1: mtu less than device minimum [ 484.224154][T12840] bond_slave_1: mtu less than device minimum [ 485.011031][T12859] bond_slave_1: mtu less than device minimum [ 485.308928][T12862] bond_slave_1: mtu less than device minimum [ 485.538491][T12868] bond_slave_1: mtu less than device minimum [ 486.038853][T12882] bond_slave_1: mtu less than device minimum [ 486.506992][T12895] device syzkaller0 entered promiscuous mode [ 486.536356][T12898] bond_slave_1: mtu less than device minimum [ 486.622854][T12903] bond_slave_1: mtu less than device minimum [ 487.398801][T12920] device syzkaller0 entered promiscuous mode [ 488.387297][T12943] bond_slave_1: mtu less than device minimum [ 488.789617][T12956] bond_slave_1: mtu less than device minimum [ 489.499246][T12975] device syzkaller0 entered promiscuous mode [ 489.682721][ T28] audit: type=1400 audit(1757548712.280:149): avc: denied { read } for pid=12978 comm="syz.3.4425" dev="nsfs" ino=4026532502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 489.782221][ T28] audit: type=1400 audit(1757548712.310:150): avc: denied { open } for pid=12978 comm="syz.3.4425" path="uts:[4026532502]" dev="nsfs" ino=4026532502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 489.878727][T12977] bond_slave_1: mtu less than device minimum [ 490.149589][T12993] device syzkaller0 entered promiscuous mode [ 490.320783][T12986] bond_slave_1: mtu less than device minimum [ 490.861697][T12995] bond_slave_1: mtu less than device minimum [ 491.372681][T13009] device syzkaller0 entered promiscuous mode [ 491.929645][T13026] bond_slave_1: mtu less than device minimum [ 492.142594][T13034] bond_slave_1: mtu less than device minimum [ 493.542771][T13061] bond_slave_1: mtu less than device minimum [ 494.550154][T13084] bond_slave_1: mtu less than device minimum [ 494.698412][T13086] FAULT_INJECTION: forcing a failure. [ 494.698412][T13086] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 494.779805][T13086] CPU: 0 PID: 13086 Comm: syz.3.4462 Not tainted syzkaller #0 [ 494.787300][T13086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 494.797353][T13086] Call Trace: [ 494.800634][T13086] [ 494.803660][T13086] __dump_stack+0x21/0x24 [ 494.807991][T13086] dump_stack_lvl+0xee/0x150 [ 494.812610][T13086] ? __cfi_dump_stack_lvl+0x8/0x8 [ 494.817640][T13086] dump_stack+0x15/0x24 [ 494.821810][T13086] should_fail_ex+0x3d4/0x520 [ 494.826514][T13086] should_fail+0xb/0x10 [ 494.830693][T13086] should_fail_usercopy+0x1a/0x20 [ 494.835743][T13086] _copy_from_user+0x1e/0xc0 [ 494.840343][T13086] __sys_bpf+0x277/0x780 [ 494.844583][T13086] ? bpf_link_show_fdinfo+0x320/0x320 [ 494.849959][T13086] ? __cfi_sched_clock_cpu+0x10/0x10 [ 494.855261][T13086] __x64_sys_bpf+0x7c/0x90 [ 494.859709][T13086] x64_sys_call+0x488/0x9a0 [ 494.864221][T13086] do_syscall_64+0x4c/0xa0 [ 494.868632][T13086] ? clear_bhb_loop+0x30/0x80 [ 494.873303][T13086] ? clear_bhb_loop+0x30/0x80 [ 494.877970][T13086] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 494.883845][T13086] RIP: 0033:0x7f5a5378eba9 [ 494.888250][T13086] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 494.907846][T13086] RSP: 002b:00007f5a545ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 494.916251][T13086] RAX: ffffffffffffffda RBX: 00007f5a539d5fa0 RCX: 00007f5a5378eba9 [ 494.924216][T13086] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 494.932182][T13086] RBP: 00007f5a545ed090 R08: 0000000000000000 R09: 0000000000000000 [ 494.940139][T13086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 494.948098][T13086] R13: 00007f5a539d6038 R14: 00007f5a539d5fa0 R15: 00007ffd62a6c3d8 [ 494.956062][T13086] [ 495.061495][T13089] syz.3.4463[13089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 495.061558][T13089] syz.3.4463[13089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 496.305514][T13117] bond_slave_1: mtu less than device minimum [ 497.221919][T13141] ip6_vti0: mtu greater than device maximum [ 497.290797][T13143] device sit0 entered promiscuous mode [ 498.120550][T13163] FAULT_INJECTION: forcing a failure. [ 498.120550][T13163] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 498.149791][T13165] bond_slave_1: mtu less than device minimum [ 498.165987][T13163] CPU: 1 PID: 13163 Comm: syz.1.4490 Not tainted syzkaller #0 [ 498.173475][T13163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 498.183542][T13163] Call Trace: [ 498.186816][T13163] [ 498.189832][T13163] __dump_stack+0x21/0x24 [ 498.194162][T13163] dump_stack_lvl+0xee/0x150 [ 498.198744][T13163] ? __cfi_dump_stack_lvl+0x8/0x8 [ 498.203766][T13163] dump_stack+0x15/0x24 [ 498.207916][T13163] should_fail_ex+0x3d4/0x520 [ 498.212591][T13163] should_fail+0xb/0x10 [ 498.216748][T13163] should_fail_usercopy+0x1a/0x20 [ 498.221770][T13163] _copy_to_user+0x1e/0x90 [ 498.226183][T13163] simple_read_from_buffer+0xe9/0x160 [ 498.231554][T13163] proc_fail_nth_read+0x19a/0x210 [ 498.236588][T13163] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 498.242130][T13163] ? security_file_permission+0x94/0xb0 [ 498.247681][T13163] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 498.253222][T13163] vfs_read+0x26e/0x8c0 [ 498.257383][T13163] ? __cfi_vfs_read+0x10/0x10 [ 498.262060][T13163] ? __kasan_check_write+0x14/0x20 [ 498.267173][T13163] ? mutex_lock+0x8d/0x1a0 [ 498.271595][T13163] ? __cfi_mutex_lock+0x10/0x10 [ 498.276450][T13163] ? __fdget_pos+0x2cd/0x380 [ 498.281036][T13163] ? ksys_read+0x71/0x240 [ 498.285399][T13163] ksys_read+0x140/0x240 [ 498.289646][T13163] ? __cfi_ksys_read+0x10/0x10 [ 498.294416][T13163] ? fput+0x154/0x1a0 [ 498.298402][T13163] ? debug_smp_processor_id+0x17/0x20 [ 498.303779][T13163] __x64_sys_read+0x7b/0x90 [ 498.308287][T13163] x64_sys_call+0x2f/0x9a0 [ 498.312704][T13163] do_syscall_64+0x4c/0xa0 [ 498.317118][T13163] ? clear_bhb_loop+0x30/0x80 [ 498.321792][T13163] ? clear_bhb_loop+0x30/0x80 [ 498.326473][T13163] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 498.332367][T13163] RIP: 0033:0x7f62eeb8d5bc [ 498.336784][T13163] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 498.356386][T13163] RSP: 002b:00007f62ef95f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 498.365248][T13163] RAX: ffffffffffffffda RBX: 00007f62eedd5fa0 RCX: 00007f62eeb8d5bc [ 498.373219][T13163] RDX: 000000000000000f RSI: 00007f62ef95f0a0 RDI: 0000000000000007 [ 498.381194][T13163] RBP: 00007f62ef95f090 R08: 0000000000000000 R09: 0000000000000000 [ 498.389167][T13163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 498.397146][T13163] R13: 00007f62eedd6038 R14: 00007f62eedd5fa0 R15: 00007ffd96960688 [ 498.405211][T13163] [ 498.640738][T13177] bond_slave_1: mtu less than device minimum [ 499.042519][T13217] bond_slave_1: mtu less than device minimum [ 500.592804][T13268] bond_slave_1: mtu less than device minimum [ 500.669416][T13269] device syzkaller0 entered promiscuous mode [ 501.190676][T13302] device sit0 entered promiscuous mode [ 502.077246][T13310] bond_slave_1: mtu less than device minimum [ 503.697260][T13353] bond_slave_1: mtu less than device minimum [ 504.906515][T13381] device sit0 left promiscuous mode [ 504.989883][T13381] device sit0 entered promiscuous mode [ 505.148545][T13387] bond_slave_1: mtu less than device minimum [ 505.166010][T13388] device pim6reg1 entered promiscuous mode [ 505.375927][T13393] device sit0 left promiscuous mode [ 505.701826][T13403] device veth1_macvtap entered promiscuous mode [ 505.720350][T13403] device macsec0 entered promiscuous mode [ 505.753373][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 505.768902][T13410] bond_slave_1: mtu less than device minimum [ 506.066368][T13420] device pim6reg1 entered promiscuous mode [ 506.289539][T13425] bond_slave_1: mtu less than device minimum [ 506.447799][T13428] bond_slave_1: mtu less than device minimum [ 507.856707][T13459] bond_slave_1: mtu less than device minimum [ 508.593066][T13472] bond_slave_1: mtu less than device minimum [ 508.860242][T13481] bond_slave_1: mtu less than device minimum [ 509.182164][T13504] bond_slave_1: mtu less than device minimum [ 509.210282][T13503] bond_slave_1: mtu less than device minimum [ 510.147788][T13525] bond_slave_1: mtu less than device minimum [ 511.162431][T13568] bond_slave_1: mtu less than device minimum [ 511.516689][T13570] bond_slave_1: mtu less than device minimum [ 511.773375][T13583] device veth0_vlan left promiscuous mode [ 511.853286][T13583] device veth0_vlan entered promiscuous mode [ 512.113620][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 512.130357][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 512.138819][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 512.155227][T13592] bond_slave_1: mtu less than device minimum [ 512.543105][T13611] bond_slave_1: mtu less than device minimum [ 514.037826][T13643] device sit0 left promiscuous mode [ 514.444660][T13651] device sit0 entered promiscuous mode [ 514.460950][T13659] bond_slave_1: mtu less than device minimum [ 515.650456][T13736] bond_slave_1: mtu less than device minimum [ 515.930513][T13742] FAULT_INJECTION: forcing a failure. [ 515.930513][T13742] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 515.972184][T13742] CPU: 1 PID: 13742 Comm: syz.4.4698 Not tainted syzkaller #0 [ 515.979874][T13742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 515.990195][T13742] Call Trace: [ 515.993479][T13742] [ 515.996576][T13742] __dump_stack+0x21/0x24 [ 516.000920][T13742] dump_stack_lvl+0xee/0x150 [ 516.005514][T13742] ? __cfi_dump_stack_lvl+0x8/0x8 [ 516.010538][T13742] ? __kmalloc_node+0xb2/0x1e0 [ 516.015302][T13742] dump_stack+0x15/0x24 [ 516.019457][T13742] should_fail_ex+0x3d4/0x520 [ 516.024144][T13742] should_fail+0xb/0x10 [ 516.028414][T13742] should_fail_usercopy+0x1a/0x20 [ 516.033535][T13742] _copy_from_user+0x1e/0xc0 [ 516.038133][T13742] generic_map_update_batch+0x458/0x780 [ 516.043718][T13742] ? __cfi_generic_map_update_batch+0x10/0x10 [ 516.049874][T13742] ? kasan_check_range+0x7f/0x290 [ 516.054928][T13742] ? __cfi_generic_map_update_batch+0x10/0x10 [ 516.061005][T13742] bpf_map_do_batch+0x48c/0x620 [ 516.066285][T13742] __sys_bpf+0x624/0x780 [ 516.070531][T13742] ? bpf_link_show_fdinfo+0x320/0x320 [ 516.075902][T13742] ? __cfi_sched_clock_cpu+0x10/0x10 [ 516.081191][T13742] __x64_sys_bpf+0x7c/0x90 [ 516.085613][T13742] x64_sys_call+0x488/0x9a0 [ 516.090122][T13742] do_syscall_64+0x4c/0xa0 [ 516.094542][T13742] ? clear_bhb_loop+0x30/0x80 [ 516.099214][T13742] ? clear_bhb_loop+0x30/0x80 [ 516.103888][T13742] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 516.109789][T13742] RIP: 0033:0x7fd9cbd8eba9 [ 516.114197][T13742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 516.134255][T13742] RSP: 002b:00007fd9ccb7b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 516.142767][T13742] RAX: ffffffffffffffda RBX: 00007fd9cbfd5fa0 RCX: 00007fd9cbd8eba9 [ 516.150831][T13742] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 516.158897][T13742] RBP: 00007fd9ccb7b090 R08: 0000000000000000 R09: 0000000000000000 [ 516.166871][T13742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 516.175022][T13742] R13: 00007fd9cbfd6038 R14: 00007fd9cbfd5fa0 R15: 00007fffe1c5cc18 [ 516.183009][T13742] [ 516.432975][T13750] syz.3.4702[13750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 516.433036][T13750] syz.3.4702[13750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 518.324117][T13806] bond_slave_1: mtu less than device minimum [ 518.863566][T13823] bond_slave_1: mtu less than device minimum [ 518.981276][T13824] bond_slave_1: mtu less than device minimum [ 519.728786][T13843] bond_slave_1: mtu less than device minimum [ 520.576228][T13857] GPL: port 1(veth0_vlan) entered blocking state [ 520.612989][T13857] GPL: port 1(veth0_vlan) entered disabled state [ 520.927789][T13873] device veth0_vlan left promiscuous mode [ 520.964925][T13873] device veth0_vlan entered promiscuous mode [ 521.497113][T13892] bond_slave_1: mtu less than device minimum [ 522.076417][T13908] bond_slave_1: mtu less than device minimum [ 522.192014][T13909] bond_slave_1: mtu less than device minimum [ 523.989619][T13949] device syzkaller0 entered promiscuous mode [ 524.398056][T13953] bond_slave_1: mtu less than device minimum [ 524.528006][T13955] GPL: port 1(veth0_vlan) entered blocking state [ 524.614050][T13955] GPL: port 1(veth0_vlan) entered disabled state [ 524.740418][T13961] bond_slave_1: mtu less than device minimum [ 525.869510][T14001] bond_slave_1: mtu less than device minimum [ 528.087786][T14048] device syzkaller0 entered promiscuous mode [ 528.147573][T14056] bond_slave_1: mtu less than device minimum [ 528.909949][T14088] device sit0 entered promiscuous mode [ 530.009775][T14127] device sit0 left promiscuous mode [ 530.425492][T14152] FAULT_INJECTION: forcing a failure. [ 530.425492][T14152] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 530.475091][T14150] bond_slave_1: mtu less than device minimum [ 530.511739][T14152] CPU: 0 PID: 14152 Comm: syz.2.4843 Not tainted syzkaller #0 [ 530.519233][T14152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 530.529286][T14152] Call Trace: [ 530.532561][T14152] [ 530.535485][T14152] __dump_stack+0x21/0x24 [ 530.539810][T14152] dump_stack_lvl+0xee/0x150 [ 530.544398][T14152] ? __cfi_dump_stack_lvl+0x8/0x8 [ 530.549417][T14152] dump_stack+0x15/0x24 [ 530.553565][T14152] should_fail_ex+0x3d4/0x520 [ 530.558331][T14152] should_fail+0xb/0x10 [ 530.562482][T14152] should_fail_usercopy+0x1a/0x20 [ 530.567507][T14152] _copy_from_user+0x1e/0xc0 [ 530.572093][T14152] sock_do_ioctl+0x186/0x310 [ 530.576677][T14152] ? sock_show_fdinfo+0xb0/0xb0 [ 530.581611][T14152] ? selinux_file_ioctl+0x377/0x480 [ 530.586889][T14152] sock_ioctl+0x4d8/0x6e0 [ 530.591244][T14152] ? __cfi_sock_ioctl+0x10/0x10 [ 530.596079][T14152] ? __fget_files+0x2d5/0x330 [ 530.600738][T14152] ? security_file_ioctl+0x95/0xc0 [ 530.605835][T14152] ? __cfi_sock_ioctl+0x10/0x10 [ 530.610667][T14152] __se_sys_ioctl+0x12f/0x1b0 [ 530.615501][T14152] __x64_sys_ioctl+0x7b/0x90 [ 530.620192][T14152] x64_sys_call+0x58b/0x9a0 [ 530.624777][T14152] do_syscall_64+0x4c/0xa0 [ 530.629727][T14152] ? clear_bhb_loop+0x30/0x80 [ 530.635099][T14152] ? clear_bhb_loop+0x30/0x80 [ 530.639790][T14152] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 530.645759][T14152] RIP: 0033:0x7f867f78eba9 [ 530.650166][T14152] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 530.669765][T14152] RSP: 002b:00007f8680632038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 530.678261][T14152] RAX: ffffffffffffffda RBX: 00007f867f9d6090 RCX: 00007f867f78eba9 [ 530.686223][T14152] RDX: 0000200000000080 RSI: 0000000000008922 RDI: 0000000000000009 [ 530.694182][T14152] RBP: 00007f8680632090 R08: 0000000000000000 R09: 0000000000000000 [ 530.702149][T14152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 530.710104][T14152] R13: 00007f867f9d6128 R14: 00007f867f9d6090 R15: 00007ffdaf1708f8 [ 530.718622][T14152] [ 530.931199][ T28] audit: type=1400 audit(1757548753.540:151): avc: denied { create } for pid=14155 comm="syz.0.4845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 531.133650][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 531.156005][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 531.168085][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 531.537085][T14188] device pim6reg1 entered promiscuous mode [ 531.570740][T14184] device veth0_vlan left promiscuous mode [ 531.606493][T14184] device veth0_vlan entered promiscuous mode [ 531.664383][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 531.681105][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 531.690303][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 532.475259][T14208] FAULT_INJECTION: forcing a failure. [ 532.475259][T14208] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 532.644321][T14208] CPU: 1 PID: 14208 Comm: syz.3.4860 Not tainted syzkaller #0 [ 532.651819][T14208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 532.662308][T14208] Call Trace: [ 532.665592][T14208] [ 532.668536][T14208] __dump_stack+0x21/0x24 [ 532.672871][T14208] dump_stack_lvl+0xee/0x150 [ 532.677467][T14208] ? __cfi_dump_stack_lvl+0x8/0x8 [ 532.682496][T14208] ? ___ratelimit+0xd/0x570 [ 532.687189][T14208] dump_stack+0x15/0x24 [ 532.691515][T14208] should_fail_ex+0x3d4/0x520 [ 532.696182][T14208] should_fail+0xb/0x10 [ 532.700349][T14208] should_fail_usercopy+0x1a/0x20 [ 532.705364][T14208] _copy_from_user+0x1e/0xc0 [ 532.709941][T14208] generic_map_update_batch+0x4b1/0x780 [ 532.715478][T14208] ? __cfi_generic_map_update_batch+0x10/0x10 [ 532.721532][T14208] ? __fdget+0x19c/0x220 [ 532.725757][T14208] ? __cfi_generic_map_update_batch+0x10/0x10 [ 532.731809][T14208] bpf_map_do_batch+0x48c/0x620 [ 532.737093][T14208] __sys_bpf+0x624/0x780 [ 532.741524][T14208] ? bpf_link_show_fdinfo+0x320/0x320 [ 532.746888][T14208] ? __cfi_sched_clock_cpu+0x10/0x10 [ 532.752168][T14208] __x64_sys_bpf+0x7c/0x90 [ 532.756574][T14208] x64_sys_call+0x488/0x9a0 [ 532.761066][T14208] do_syscall_64+0x4c/0xa0 [ 532.765469][T14208] ? clear_bhb_loop+0x30/0x80 [ 532.770131][T14208] ? clear_bhb_loop+0x30/0x80 [ 532.774806][T14208] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 532.780684][T14208] RIP: 0033:0x7f5a5378eba9 [ 532.785118][T14208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 532.804812][T14208] RSP: 002b:00007f5a545ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 532.813212][T14208] RAX: ffffffffffffffda RBX: 00007f5a539d5fa0 RCX: 00007f5a5378eba9 [ 532.821168][T14208] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 532.829207][T14208] RBP: 00007f5a545ed090 R08: 0000000000000000 R09: 0000000000000000 [ 532.837234][T14208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 532.845276][T14208] R13: 00007f5a539d6038 R14: 00007f5a539d5fa0 R15: 00007ffd62a6c3d8 [ 532.853247][T14208] [ 533.437730][T14236] bond_slave_1: mtu less than device minimum [ 533.765638][T14242] device veth1_macvtap left promiscuous mode [ 533.780825][T14242] device macsec0 left promiscuous mode [ 533.921730][T14255] ip6gretap0: refused to change device tx_queue_len [ 533.958103][T14257] device syzkaller0 entered promiscuous mode [ 533.999084][T14253] device veth1_macvtap entered promiscuous mode [ 534.008439][T14253] device macsec0 entered promiscuous mode [ 534.102899][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 534.222298][T14262] device sit0 entered promiscuous mode [ 534.570883][T14275] bond_slave_1: mtu less than device minimum [ 534.744768][T14286] device syzkaller0 entered promiscuous mode [ 535.071195][T14294] device veth0_vlan left promiscuous mode [ 535.086417][T14294] device veth0_vlan entered promiscuous mode [ 535.102034][T11495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 535.110555][T11495] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 535.118134][T11495] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 535.225721][T14308] FAULT_INJECTION: forcing a failure. [ 535.225721][T14308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 535.240394][T14308] CPU: 1 PID: 14308 Comm: syz.0.4895 Not tainted syzkaller #0 [ 535.247872][T14308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 535.258021][T14308] Call Trace: [ 535.261303][T14308] [ 535.264241][T14308] __dump_stack+0x21/0x24 [ 535.268669][T14308] dump_stack_lvl+0xee/0x150 [ 535.273435][T14308] ? __cfi_dump_stack_lvl+0x8/0x8 [ 535.278467][T14308] dump_stack+0x15/0x24 [ 535.282623][T14308] should_fail_ex+0x3d4/0x520 [ 535.287303][T14308] should_fail+0xb/0x10 [ 535.291456][T14308] should_fail_usercopy+0x1a/0x20 [ 535.296609][T14308] _copy_from_user+0x1e/0xc0 [ 535.301283][T14308] generic_map_update_batch+0x458/0x780 [ 535.306943][T14308] ? __cfi_generic_map_update_batch+0x10/0x10 [ 535.313283][T14308] ? __fdget+0x19c/0x220 [ 535.317544][T14308] ? __cfi_generic_map_update_batch+0x10/0x10 [ 535.323620][T14308] bpf_map_do_batch+0x48c/0x620 [ 535.328476][T14308] __sys_bpf+0x624/0x780 [ 535.332721][T14308] ? bpf_link_show_fdinfo+0x320/0x320 [ 535.338094][T14308] ? __cfi_sched_clock_cpu+0x10/0x10 [ 535.343389][T14308] __x64_sys_bpf+0x7c/0x90 [ 535.347812][T14308] x64_sys_call+0x488/0x9a0 [ 535.352314][T14308] do_syscall_64+0x4c/0xa0 [ 535.356781][T14308] ? clear_bhb_loop+0x30/0x80 [ 535.361456][T14308] ? clear_bhb_loop+0x30/0x80 [ 535.366130][T14308] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 535.372024][T14308] RIP: 0033:0x7ffa8018eba9 [ 535.376434][T14308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 535.396036][T14308] RSP: 002b:00007ffa80fd2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 535.404452][T14308] RAX: ffffffffffffffda RBX: 00007ffa803d5fa0 RCX: 00007ffa8018eba9 [ 535.412422][T14308] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 535.420395][T14308] RBP: 00007ffa80fd2090 R08: 0000000000000000 R09: 0000000000000000 [ 535.428462][T14308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 535.436433][T14308] R13: 00007ffa803d6038 R14: 00007ffa803d5fa0 R15: 00007ffc5246a658 [ 535.444411][T14308] [ 536.235962][T14329] bond_slave_1: mtu less than device minimum [ 536.662625][T14345] device sit0 entered promiscuous mode [ 537.018187][T14358] FAULT_INJECTION: forcing a failure. [ 537.018187][T14358] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 537.033646][T14358] CPU: 1 PID: 14358 Comm: syz.0.4911 Not tainted syzkaller #0 [ 537.041126][T14358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 537.051191][T14358] Call Trace: [ 537.054467][T14358] [ 537.057389][T14358] __dump_stack+0x21/0x24 [ 537.061739][T14358] dump_stack_lvl+0xee/0x150 [ 537.066323][T14358] ? __cfi_dump_stack_lvl+0x8/0x8 [ 537.071344][T14358] dump_stack+0x15/0x24 [ 537.075494][T14358] should_fail_ex+0x3d4/0x520 [ 537.080171][T14358] should_fail+0xb/0x10 [ 537.084329][T14358] should_fail_usercopy+0x1a/0x20 [ 537.089363][T14358] _copy_from_user+0x1e/0xc0 [ 537.093953][T14358] generic_map_update_batch+0x458/0x780 [ 537.099505][T14358] ? __cfi_generic_map_update_batch+0x10/0x10 [ 537.105583][T14358] ? __fdget+0x19c/0x220 [ 537.109822][T14358] ? __cfi_generic_map_update_batch+0x10/0x10 [ 537.115888][T14358] bpf_map_do_batch+0x48c/0x620 [ 537.120739][T14358] __sys_bpf+0x624/0x780 [ 537.124976][T14358] ? bpf_link_show_fdinfo+0x320/0x320 [ 537.130344][T14358] ? __cfi_sched_clock_cpu+0x10/0x10 [ 537.135629][T14358] __x64_sys_bpf+0x7c/0x90 [ 537.140043][T14358] x64_sys_call+0x488/0x9a0 [ 537.144549][T14358] do_syscall_64+0x4c/0xa0 [ 537.148970][T14358] ? clear_bhb_loop+0x30/0x80 [ 537.153645][T14358] ? clear_bhb_loop+0x30/0x80 [ 537.158324][T14358] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 537.164222][T14358] RIP: 0033:0x7ffa8018eba9 [ 537.168717][T14358] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 537.188408][T14358] RSP: 002b:00007ffa80fd2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 537.196831][T14358] RAX: ffffffffffffffda RBX: 00007ffa803d5fa0 RCX: 00007ffa8018eba9 [ 537.204891][T14358] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 537.212867][T14358] RBP: 00007ffa80fd2090 R08: 0000000000000000 R09: 0000000000000000 [ 537.220837][T14358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 537.228803][T14358] R13: 00007ffa803d6038 R14: 00007ffa803d5fa0 R15: 00007ffc5246a658 [ 537.236957][T14358] [ 537.718715][T14367] device sit0 left promiscuous mode [ 538.132305][T14380] bond_slave_1: mtu less than device minimum [ 538.354333][T14390] bond_slave_1: mtu less than device minimum [ 539.020860][T14414] device veth0_vlan left promiscuous mode [ 539.206036][T14414] device veth0_vlan entered promiscuous mode [ 539.483054][T14443] bond_slave_1: mtu less than device minimum [ 541.871499][T14487] bond_slave_1: mtu less than device minimum [ 542.436458][T14496] device veth0_vlan left promiscuous mode [ 542.450274][T14496] device veth0_vlan entered promiscuous mode [ 542.663677][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 542.674292][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 542.750348][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 543.889856][T14554] tap0: tun_chr_ioctl cmd 1074025675 [ 543.978047][T14554] tap0: persist enabled [ 544.182959][T14558] bond_slave_1: mtu less than device minimum [ 544.720911][T14572] device sit0 left promiscuous mode [ 544.903605][T14577] device sit0 entered promiscuous mode [ 545.676358][T14592] bond_slave_1: mtu less than device minimum [ 546.503703][T14604] bond_slave_1: mtu less than device minimum [ 546.974515][T14611] bond_slave_1: mtu less than device minimum [ 547.198642][T14622] device veth0_vlan left promiscuous mode [ 547.228074][T14622] device veth0_vlan entered promiscuous mode [ 547.257150][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 547.285449][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 547.404076][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 547.466539][T14625] device veth0_vlan left promiscuous mode [ 547.480528][T14625] device veth0_vlan entered promiscuous mode [ 547.581481][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 547.590028][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 547.597535][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 547.815969][T14639] bond_slave_1: mtu less than device minimum [ 550.221184][T11495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 550.250011][T11495] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 550.317093][T14699] FAULT_INJECTION: forcing a failure. [ 550.317093][T14699] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 550.342229][T14699] CPU: 0 PID: 14699 Comm: syz.4.5029 Not tainted syzkaller #0 [ 550.348854][T11495] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 550.349844][T14699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 550.349862][T14699] Call Trace: [ 550.349867][T14699] [ 550.349875][T14699] __dump_stack+0x21/0x24 [ 550.377733][T14699] dump_stack_lvl+0xee/0x150 [ 550.382330][T14699] ? __cfi_dump_stack_lvl+0x8/0x8 [ 550.387358][T14699] dump_stack+0x15/0x24 [ 550.391512][T14699] should_fail_ex+0x3d4/0x520 [ 550.396240][T14699] should_fail+0xb/0x10 [ 550.400401][T14699] should_fail_usercopy+0x1a/0x20 [ 550.405414][T14699] _copy_from_user+0x1e/0xc0 [ 550.409988][T14699] generic_map_update_batch+0x4b1/0x780 [ 550.415531][T14699] ? __cfi_generic_map_update_batch+0x10/0x10 [ 550.421609][T14699] ? bpf_map_do_batch+0x39c/0x620 [ 550.426719][T14699] ? __cfi_generic_map_update_batch+0x10/0x10 [ 550.432963][T14699] bpf_map_do_batch+0x48c/0x620 [ 550.437917][T14699] __sys_bpf+0x624/0x780 [ 550.442167][T14699] ? bpf_link_show_fdinfo+0x320/0x320 [ 550.447615][T14699] __x64_sys_bpf+0x7c/0x90 [ 550.452019][T14699] x64_sys_call+0x488/0x9a0 [ 550.456511][T14699] do_syscall_64+0x4c/0xa0 [ 550.460906][T14699] ? clear_bhb_loop+0x30/0x80 [ 550.465579][T14699] ? clear_bhb_loop+0x30/0x80 [ 550.470245][T14699] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 550.476123][T14699] RIP: 0033:0x7fd9cbd8eba9 [ 550.480587][T14699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 550.500536][T14699] RSP: 002b:00007fd9ccb7b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 550.509024][T14699] RAX: ffffffffffffffda RBX: 00007fd9cbfd5fa0 RCX: 00007fd9cbd8eba9 [ 550.517024][T14699] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 550.525012][T14699] RBP: 00007fd9ccb7b090 R08: 0000000000000000 R09: 0000000000000000 [ 550.533098][T14699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 550.541096][T14699] R13: 00007fd9cbfd6038 R14: 00007fd9cbfd5fa0 R15: 00007fffe1c5cc18 [ 550.549060][T14699] [ 551.303514][T14724] device syzkaller0 entered promiscuous mode [ 551.485015][T14732] bond_slave_1: mtu less than device minimum [ 551.905643][T14739] device veth0_vlan left promiscuous mode [ 552.000507][T14739] device veth0_vlan entered promiscuous mode [ 552.735915][T14758] device veth0_vlan left promiscuous mode [ 552.755746][T14758] device veth0_vlan entered promiscuous mode [ 552.766736][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 552.794720][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 552.810111][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 554.000019][T14775] device veth0_vlan left promiscuous mode [ 554.064979][T14775] device veth0_vlan entered promiscuous mode [ 554.358960][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 554.379508][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 554.391567][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 555.102000][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 555.110519][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 555.171353][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 556.846395][T14895] device veth0_vlan left promiscuous mode [ 556.853164][T14895] device veth0_vlan entered promiscuous mode [ 556.979262][T14909] device sit0 left promiscuous mode [ 557.160422][T14902] device sit0 entered promiscuous mode [ 557.766066][T14929] device veth0_vlan left promiscuous mode [ 557.848809][T14929] device veth0_vlan entered promiscuous mode [ 557.974941][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 558.018346][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 558.089457][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 558.344342][T14944] bond_slave_1: mtu less than device minimum [ 558.480847][T14958] FAULT_INJECTION: forcing a failure. [ 558.480847][T14958] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 558.560124][T14958] CPU: 1 PID: 14958 Comm: syz.1.5108 Not tainted syzkaller #0 [ 558.567633][T14958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 558.577699][T14958] Call Trace: [ 558.580983][T14958] [ 558.583940][T14958] __dump_stack+0x21/0x24 [ 558.588282][T14958] dump_stack_lvl+0xee/0x150 [ 558.592875][T14958] ? __cfi_dump_stack_lvl+0x8/0x8 [ 558.597904][T14958] dump_stack+0x15/0x24 [ 558.602057][T14958] should_fail_ex+0x3d4/0x520 [ 558.606783][T14958] should_fail+0xb/0x10 [ 558.610952][T14958] should_fail_usercopy+0x1a/0x20 [ 558.615970][T14958] _copy_from_user+0x1e/0xc0 [ 558.620556][T14958] generic_map_update_batch+0x458/0x780 [ 558.626113][T14958] ? __cfi_generic_map_update_batch+0x10/0x10 [ 558.632167][T14958] ? bpf_map_do_batch+0x1ea/0x620 [ 558.637179][T14958] ? __cfi_generic_map_update_batch+0x10/0x10 [ 558.643235][T14958] bpf_map_do_batch+0x48c/0x620 [ 558.648085][T14958] __sys_bpf+0x624/0x780 [ 558.652312][T14958] ? bpf_link_show_fdinfo+0x320/0x320 [ 558.657764][T14958] ? __cfi_ksys_write+0x10/0x10 [ 558.662623][T14958] ? debug_smp_processor_id+0x17/0x20 [ 558.667996][T14958] __x64_sys_bpf+0x7c/0x90 [ 558.672505][T14958] x64_sys_call+0x488/0x9a0 [ 558.677006][T14958] do_syscall_64+0x4c/0xa0 [ 558.681497][T14958] ? clear_bhb_loop+0x30/0x80 [ 558.686163][T14958] ? clear_bhb_loop+0x30/0x80 [ 558.690828][T14958] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 558.696714][T14958] RIP: 0033:0x7f62eeb8eba9 [ 558.701112][T14958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 558.720706][T14958] RSP: 002b:00007f62ef95f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 558.729109][T14958] RAX: ffffffffffffffda RBX: 00007f62eedd5fa0 RCX: 00007f62eeb8eba9 [ 558.737067][T14958] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 558.745409][T14958] RBP: 00007f62ef95f090 R08: 0000000000000000 R09: 0000000000000000 [ 558.753367][T14958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 558.761335][T14958] R13: 00007f62eedd6038 R14: 00007f62eedd5fa0 R15: 00007ffd96960688 [ 558.769299][T14958] [ 558.782417][ T28] audit: type=1400 audit(1757548781.390:152): avc: denied { ioctl } for pid=14964 comm="syz.2.5111" path="pid:[4026532381]" dev="nsfs" ino=4026532381 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 558.903136][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 558.911555][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 558.919421][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 559.226691][T14993] bond_slave_1: mtu less than device minimum [ 559.572557][T15002] FAULT_INJECTION: forcing a failure. [ 559.572557][T15002] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 559.680412][T15002] CPU: 1 PID: 15002 Comm: syz.2.5121 Not tainted syzkaller #0 [ 559.687966][T15002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 559.698026][T15002] Call Trace: [ 559.701308][T15002] [ 559.704247][T15002] __dump_stack+0x21/0x24 [ 559.708595][T15002] dump_stack_lvl+0xee/0x150 [ 559.713197][T15002] ? __cfi_dump_stack_lvl+0x8/0x8 [ 559.718229][T15002] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 559.724387][T15002] dump_stack+0x15/0x24 [ 559.728538][T15002] should_fail_ex+0x3d4/0x520 [ 559.733216][T15002] should_fail+0xb/0x10 [ 559.737458][T15002] should_fail_usercopy+0x1a/0x20 [ 559.742479][T15002] _copy_from_user+0x1e/0xc0 [ 559.747155][T15002] generic_map_update_batch+0x458/0x780 [ 559.752705][T15002] ? __cfi_generic_map_update_batch+0x10/0x10 [ 559.758772][T15002] ? __fdget+0x19c/0x220 [ 559.763024][T15002] ? __cfi_generic_map_update_batch+0x10/0x10 [ 559.769180][T15002] bpf_map_do_batch+0x48c/0x620 [ 559.774054][T15002] __sys_bpf+0x624/0x780 [ 559.778308][T15002] ? bpf_link_show_fdinfo+0x320/0x320 [ 559.783686][T15002] ? irqentry_exit+0x37/0x40 [ 559.788281][T15002] ? __bpf_trace_sys_enter+0x62/0x70 [ 559.793563][T15002] __x64_sys_bpf+0x7c/0x90 [ 559.798156][T15002] x64_sys_call+0x488/0x9a0 [ 559.802660][T15002] do_syscall_64+0x4c/0xa0 [ 559.807089][T15002] ? clear_bhb_loop+0x30/0x80 [ 559.811803][T15002] ? clear_bhb_loop+0x30/0x80 [ 559.816477][T15002] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 559.822369][T15002] RIP: 0033:0x7f867f78eba9 [ 559.826780][T15002] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 559.846382][T15002] RSP: 002b:00007f8680653038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 559.854801][T15002] RAX: ffffffffffffffda RBX: 00007f867f9d5fa0 RCX: 00007f867f78eba9 [ 559.862771][T15002] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 559.870739][T15002] RBP: 00007f8680653090 R08: 0000000000000000 R09: 0000000000000000 [ 559.878711][T15002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 559.886690][T15002] R13: 00007f867f9d6038 R14: 00007f867f9d5fa0 R15: 00007ffdaf1708f8 [ 559.894675][T15002] [ 561.849063][T15042] bond_slave_1: mtu less than device minimum [ 563.010385][T15083] bond_slave_1: mtu less than device minimum [ 564.169030][T15108] device sit0 left promiscuous mode [ 564.900904][T15114] device sit0 entered promiscuous mode [ 564.926797][T15116] bond_slave_1: mtu less than device minimum [ 565.788796][T15152] bond_slave_1: mtu less than device minimum [ 565.899428][T15160] FAULT_INJECTION: forcing a failure. [ 565.899428][T15160] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 566.030762][T15162] device sit0 left promiscuous mode [ 566.040078][T15160] CPU: 1 PID: 15160 Comm: syz.2.5181 Not tainted syzkaller #0 [ 566.047558][T15160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 566.057605][T15160] Call Trace: [ 566.060960][T15160] [ 566.063878][T15160] __dump_stack+0x21/0x24 [ 566.068193][T15160] dump_stack_lvl+0xee/0x150 [ 566.072765][T15160] ? __cfi_dump_stack_lvl+0x8/0x8 [ 566.077796][T15160] dump_stack+0x15/0x24 [ 566.082020][T15160] should_fail_ex+0x3d4/0x520 [ 566.086684][T15160] should_fail+0xb/0x10 [ 566.090823][T15160] should_fail_usercopy+0x1a/0x20 [ 566.095831][T15160] _copy_from_user+0x1e/0xc0 [ 566.100415][T15160] generic_map_update_batch+0x4b1/0x780 [ 566.106036][T15160] ? __cfi_generic_map_update_batch+0x10/0x10 [ 566.112109][T15160] ? __fdget+0x19c/0x220 [ 566.116374][T15160] ? __cfi_generic_map_update_batch+0x10/0x10 [ 566.122721][T15160] bpf_map_do_batch+0x48c/0x620 [ 566.127558][T15160] __sys_bpf+0x624/0x780 [ 566.131783][T15160] ? bpf_link_show_fdinfo+0x320/0x320 [ 566.137141][T15160] ? __cfi_sched_clock_cpu+0x10/0x10 [ 566.142461][T15160] __x64_sys_bpf+0x7c/0x90 [ 566.146868][T15160] x64_sys_call+0x488/0x9a0 [ 566.151365][T15160] do_syscall_64+0x4c/0xa0 [ 566.155774][T15160] ? clear_bhb_loop+0x30/0x80 [ 566.160478][T15160] ? clear_bhb_loop+0x30/0x80 [ 566.165147][T15160] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 566.171119][T15160] RIP: 0033:0x7f867f78eba9 [ 566.175532][T15160] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 566.195205][T15160] RSP: 002b:00007f8680653038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 566.203792][T15160] RAX: ffffffffffffffda RBX: 00007f867f9d5fa0 RCX: 00007f867f78eba9 [ 566.211787][T15160] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 566.219773][T15160] RBP: 00007f8680653090 R08: 0000000000000000 R09: 0000000000000000 [ 566.227848][T15160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 566.235811][T15160] R13: 00007f867f9d6038 R14: 00007f867f9d5fa0 R15: 00007ffdaf1708f8 [ 566.243775][T15160] [ 566.756389][T15184] device veth0_vlan left promiscuous mode [ 566.809330][T15184] device veth0_vlan entered promiscuous mode [ 567.825326][T15203] bond_slave_1: mtu less than device minimum [ 569.095680][T15231] FAULT_INJECTION: forcing a failure. [ 569.095680][T15231] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 569.149951][T15231] CPU: 0 PID: 15231 Comm: syz.3.5204 Not tainted syzkaller #0 [ 569.157555][T15231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 569.168226][T15231] Call Trace: [ 569.171713][T15231] [ 569.175156][T15231] __dump_stack+0x21/0x24 [ 569.179696][T15231] dump_stack_lvl+0xee/0x150 [ 569.184293][T15231] ? __cfi_dump_stack_lvl+0x8/0x8 [ 569.189332][T15231] ? migrate_enable+0x19c/0x280 [ 569.194269][T15231] dump_stack+0x15/0x24 [ 569.198434][T15231] should_fail_ex+0x3d4/0x520 [ 569.203203][T15231] should_fail+0xb/0x10 [ 569.207361][T15231] should_fail_usercopy+0x1a/0x20 [ 569.212465][T15231] _copy_from_user+0x1e/0xc0 [ 569.217073][T15231] generic_map_update_batch+0x4b1/0x780 [ 569.222626][T15231] ? __cfi_generic_map_update_batch+0x10/0x10 [ 569.228681][T15231] ? __fdget+0x19c/0x220 [ 569.232905][T15231] ? __cfi_generic_map_update_batch+0x10/0x10 [ 569.238961][T15231] bpf_map_do_batch+0x48c/0x620 [ 569.243797][T15231] __sys_bpf+0x624/0x780 [ 569.248025][T15231] ? bpf_link_show_fdinfo+0x320/0x320 [ 569.253377][T15231] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 569.259516][T15231] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 569.265655][T15231] __x64_sys_bpf+0x7c/0x90 [ 569.270421][T15231] x64_sys_call+0x488/0x9a0 [ 569.275142][T15231] do_syscall_64+0x4c/0xa0 [ 569.279546][T15231] ? clear_bhb_loop+0x30/0x80 [ 569.284215][T15231] ? clear_bhb_loop+0x30/0x80 [ 569.288881][T15231] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 569.294756][T15231] RIP: 0033:0x7f5a5378eba9 [ 569.299155][T15231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 569.318928][T15231] RSP: 002b:00007f5a545ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 569.327345][T15231] RAX: ffffffffffffffda RBX: 00007f5a539d5fa0 RCX: 00007f5a5378eba9 [ 569.335324][T15231] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 569.343278][T15231] RBP: 00007f5a545ed090 R08: 0000000000000000 R09: 0000000000000000 [ 569.351231][T15231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 569.359180][T15231] R13: 00007f5a539d6038 R14: 00007f5a539d5fa0 R15: 00007ffd62a6c3d8 [ 569.367139][T15231] [ 570.322923][T15259] bond_slave_1: mtu less than device minimum [ 571.003612][T15267] bond_slave_1: mtu less than device minimum [ 571.066569][T15268] device veth0_vlan left promiscuous mode [ 571.150857][T15268] device veth0_vlan entered promiscuous mode [ 571.180666][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 571.189646][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 571.202816][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 571.212531][T15274] device sit0 left promiscuous mode [ 571.226636][T15279] device sit0 entered promiscuous mode [ 572.839941][T15315] bond_slave_1: mtu less than device minimum [ 573.244724][T15322] bond_slave_1: mtu less than device minimum [ 574.741195][T15343] FAULT_INJECTION: forcing a failure. [ 574.741195][T15343] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 574.800299][T15343] CPU: 0 PID: 15343 Comm: syz.0.5241 Not tainted syzkaller #0 [ 574.807806][T15343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 574.817858][T15343] Call Trace: [ 574.821135][T15343] [ 574.824067][T15343] __dump_stack+0x21/0x24 [ 574.828394][T15343] dump_stack_lvl+0xee/0x150 [ 574.832979][T15343] ? __cfi_dump_stack_lvl+0x8/0x8 [ 574.838006][T15343] ? should_fail_ex+0x344/0x520 [ 574.842855][T15343] dump_stack+0x15/0x24 [ 574.847006][T15343] should_fail_ex+0x3d4/0x520 [ 574.851693][T15343] should_fail+0xb/0x10 [ 574.855853][T15343] should_fail_usercopy+0x1a/0x20 [ 574.860968][T15343] _copy_from_user+0x1e/0xc0 [ 574.865574][T15343] generic_map_update_batch+0x4b1/0x780 [ 574.871126][T15343] ? __cfi_generic_map_update_batch+0x10/0x10 [ 574.877196][T15343] ? __fdget+0x19c/0x220 [ 574.881466][T15343] ? __cfi_generic_map_update_batch+0x10/0x10 [ 574.887536][T15343] bpf_map_do_batch+0x48c/0x620 [ 574.892404][T15343] __sys_bpf+0x624/0x780 [ 574.896655][T15343] ? bpf_link_show_fdinfo+0x320/0x320 [ 574.902038][T15343] ? __cfi_ksys_write+0x10/0x10 [ 574.906908][T15343] ? debug_smp_processor_id+0x17/0x20 [ 574.912309][T15343] __x64_sys_bpf+0x7c/0x90 [ 574.916764][T15343] x64_sys_call+0x488/0x9a0 [ 574.921274][T15343] do_syscall_64+0x4c/0xa0 [ 574.925695][T15343] ? clear_bhb_loop+0x30/0x80 [ 574.930373][T15343] ? clear_bhb_loop+0x30/0x80 [ 574.935049][T15343] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 574.941036][T15343] RIP: 0033:0x7ffa8018eba9 [ 574.945456][T15343] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 574.965081][T15343] RSP: 002b:00007ffa80fd2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 574.973682][T15343] RAX: ffffffffffffffda RBX: 00007ffa803d5fa0 RCX: 00007ffa8018eba9 [ 574.981748][T15343] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 574.989720][T15343] RBP: 00007ffa80fd2090 R08: 0000000000000000 R09: 0000000000000000 [ 574.997731][T15343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 575.005719][T15343] R13: 00007ffa803d6038 R14: 00007ffa803d5fa0 R15: 00007ffc5246a658 [ 575.013704][T15343] [ 575.259517][T15344] device veth0_vlan left promiscuous mode [ 575.370753][T15344] device veth0_vlan entered promiscuous mode [ 575.545951][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 575.584904][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 575.701752][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 575.731185][T15357] bond_slave_1: mtu less than device minimum [ 576.026015][T15376] bond_slave_1: mtu less than device minimum [ 577.272266][T15418] device veth0_vlan left promiscuous mode [ 577.308566][T15418] device veth0_vlan entered promiscuous mode [ 577.322494][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 577.411888][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 577.530040][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 577.684071][T15425] device sit0 left promiscuous mode [ 578.136412][T15428] device sit0 entered promiscuous mode [ 578.168405][T15433] bond_slave_1: mtu less than device minimum [ 580.192267][T15479] bond_slave_1: mtu less than device minimum [ 581.141484][T15515] bond_slave_1: mtu less than device minimum [ 582.311305][T15543] device veth0_vlan left promiscuous mode [ 582.330887][T15543] device veth0_vlan entered promiscuous mode [ 583.479870][T15566] bond_slave_1: mtu less than device minimum [ 583.661221][T15578] device pim6reg1 entered promiscuous mode [ 583.941430][T15581] bond_slave_1: mtu less than device minimum [ 584.943728][T15619] bond_slave_1: mtu less than device minimum [ 585.471820][T15625] bond_slave_1: mtu less than device minimum [ 586.590197][T15675] bond_slave_1: mtu less than device minimum [ 587.544091][T15701] device veth1_to_bond entered promiscuous mode [ 587.803322][T15709] device syzkaller0 entered promiscuous mode [ 590.578377][T15740] device sit0 left promiscuous mode [ 590.871569][T15741] device sit0 entered promiscuous mode [ 591.242879][T15757] device lo entered promiscuous mode [ 591.248832][T15762] bond_slave_1: mtu less than device minimum [ 591.825671][T15773] device sit0 left promiscuous mode [ 592.105636][T15779] device sit0 entered promiscuous mode [ 592.435744][T15807] bond_slave_1: mtu less than device minimum [ 592.665282][T15804] device syzkaller0 entered promiscuous mode [ 594.194643][T15850] device syzkaller0 entered promiscuous mode [ 595.209551][T15880] device sit0 left promiscuous mode [ 595.227142][T15880] device sit0 entered promiscuous mode [ 596.224945][T15900] device veth1_macvtap entered promiscuous mode [ 596.249344][T15900] device macsec0 entered promiscuous mode [ 596.298122][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 598.219105][T15968] syz.4.5449 uses obsolete (PF_INET,SOCK_PACKET) [ 598.241306][T15975] device sit0 left promiscuous mode [ 598.412454][T15980] device sit0 entered promiscuous mode [ 599.193560][T15984] bond_slave_1: mtu less than device minimum [ 600.144219][T16021] device sit0 left promiscuous mode [ 600.345317][T16023] device sit0 entered promiscuous mode [ 600.688855][T16036] bond_slave_1: mtu less than device minimum [ 602.294835][T16065] device veth1_macvtap left promiscuous mode [ 602.324691][T16065] device macsec0 left promiscuous mode [ 602.435595][T16079] device veth0_vlan left promiscuous mode [ 602.444803][T16079] device veth0_vlan entered promiscuous mode [ 602.467013][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 602.480340][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 602.487882][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 602.823180][T16084] bond_slave_1: mtu less than device minimum [ 602.831677][T16088] device sit0 left promiscuous mode [ 602.960356][T16091] device sit0 entered promiscuous mode [ 604.437606][T16124] device veth0_vlan left promiscuous mode [ 604.562516][T16124] device veth0_vlan entered promiscuous mode [ 606.424837][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 606.448023][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 606.496713][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 609.551424][T16227] device veth1_macvtap left promiscuous mode [ 609.557714][T16227] device macsec0 left promiscuous mode [ 611.540019][T16271] device veth0_vlan left promiscuous mode [ 611.554813][T16271] device veth0_vlan entered promiscuous mode [ 612.312892][T16289] device veth0_vlan left promiscuous mode [ 612.358982][T16289] device veth0_vlan entered promiscuous mode [ 612.671064][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 612.721202][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 612.745603][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 613.219968][T16327] device sit0 left promiscuous mode [ 613.400425][T16328] device sit0 entered promiscuous mode [ 614.042532][T16343] device syzkaller0 entered promiscuous mode [ 614.104483][T16344] device veth1_macvtap left promiscuous mode [ 614.123231][T16344] device macsec0 left promiscuous mode [ 614.541534][T16351] bond_slave_1: mtu less than device minimum [ 614.586676][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 614.605174][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 614.663608][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 615.334377][T16365] device sit0 left promiscuous mode [ 616.229056][T16398] bond_slave_1: mtu less than device minimum [ 616.342895][T16403] device sit0 entered promiscuous mode [ 617.427134][T16432] device veth0_vlan left promiscuous mode [ 617.435162][T16432] device veth0_vlan entered promiscuous mode [ 617.444016][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 617.490474][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 617.569030][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 618.672977][T16465] bond_slave_1: mtu less than device minimum [ 619.591850][T16477] bond_slave_1: mtu less than device minimum [ 619.793245][T16490] FAULT_INJECTION: forcing a failure. [ 619.793245][T16490] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 619.827177][T16490] CPU: 1 PID: 16490 Comm: syz.3.5606 Not tainted syzkaller #0 [ 619.834859][T16490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 619.844931][T16490] Call Trace: [ 619.848219][T16490] [ 619.851151][T16490] __dump_stack+0x21/0x24 [ 619.855485][T16490] dump_stack_lvl+0xee/0x150 [ 619.860081][T16490] ? __cfi_dump_stack_lvl+0x8/0x8 [ 619.865104][T16490] ? dump_stack+0x9/0x24 [ 619.869360][T16490] dump_stack+0x15/0x24 [ 619.873611][T16490] should_fail_ex+0x3d4/0x520 [ 619.878310][T16490] should_fail+0xb/0x10 [ 619.882470][T16490] should_fail_usercopy+0x1a/0x20 [ 619.887499][T16490] _copy_from_user+0x1e/0xc0 [ 619.892127][T16490] generic_map_update_batch+0x4b1/0x780 [ 619.897687][T16490] ? __cfi_generic_map_update_batch+0x10/0x10 [ 619.903851][T16490] ? __fdget+0x19c/0x220 [ 619.908098][T16490] ? __cfi_generic_map_update_batch+0x10/0x10 [ 619.914173][T16490] bpf_map_do_batch+0x48c/0x620 [ 619.919031][T16490] __sys_bpf+0x624/0x780 [ 619.923273][T16490] ? bpf_link_show_fdinfo+0x320/0x320 [ 619.928661][T16490] ? fpregs_restore_userregs+0x128/0x260 [ 619.934302][T16490] __x64_sys_bpf+0x7c/0x90 [ 619.938817][T16490] x64_sys_call+0x488/0x9a0 [ 619.943326][T16490] do_syscall_64+0x4c/0xa0 [ 619.947742][T16490] ? clear_bhb_loop+0x30/0x80 [ 619.952507][T16490] ? clear_bhb_loop+0x30/0x80 [ 619.957202][T16490] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 619.963101][T16490] RIP: 0033:0x7f5a5378eba9 [ 619.967516][T16490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 619.987123][T16490] RSP: 002b:00007f5a545ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 619.995549][T16490] RAX: ffffffffffffffda RBX: 00007f5a539d5fa0 RCX: 00007f5a5378eba9 [ 620.003526][T16490] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 620.011509][T16490] RBP: 00007f5a545ed090 R08: 0000000000000000 R09: 0000000000000000 [ 620.019469][T16490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 620.027432][T16490] R13: 00007f5a539d6038 R14: 00007f5a539d5fa0 R15: 00007ffd62a6c3d8 [ 620.035402][T16490] [ 621.383171][T16529] device veth0_vlan left promiscuous mode [ 621.472929][T16529] device veth0_vlan entered promiscuous mode [ 621.663601][T16533] bond_slave_1: mtu less than device minimum [ 621.674574][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 621.703032][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 621.746002][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 622.143976][T16559] device veth1_macvtap entered promiscuous mode [ 622.160162][T16559] device macsec0 entered promiscuous mode [ 622.199644][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 622.301902][T16566] FAULT_INJECTION: forcing a failure. [ 622.301902][T16566] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 622.354714][T16566] CPU: 1 PID: 16566 Comm: syz.1.5633 Not tainted syzkaller #0 [ 622.362220][T16566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 622.372279][T16566] Call Trace: [ 622.375566][T16566] [ 622.378491][T16566] __dump_stack+0x21/0x24 [ 622.382821][T16566] dump_stack_lvl+0xee/0x150 [ 622.387411][T16566] ? __cfi_dump_stack_lvl+0x8/0x8 [ 622.392437][T16566] dump_stack+0x15/0x24 [ 622.396594][T16566] should_fail_ex+0x3d4/0x520 [ 622.401277][T16566] should_fail+0xb/0x10 [ 622.405430][T16566] should_fail_usercopy+0x1a/0x20 [ 622.410452][T16566] _copy_from_user+0x1e/0xc0 [ 622.415043][T16566] generic_map_update_batch+0x458/0x780 [ 622.420595][T16566] ? __cfi_generic_map_update_batch+0x10/0x10 [ 622.426662][T16566] ? bpf_map_do_batch+0x39c/0x620 [ 622.431747][T16566] ? __cfi_generic_map_update_batch+0x10/0x10 [ 622.438069][T16566] bpf_map_do_batch+0x48c/0x620 [ 622.442912][T16566] __sys_bpf+0x624/0x780 [ 622.447151][T16566] ? bpf_link_show_fdinfo+0x320/0x320 [ 622.452517][T16566] ? irqentry_exit+0x37/0x40 [ 622.457100][T16566] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 622.462974][T16566] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 622.469114][T16566] __x64_sys_bpf+0x7c/0x90 [ 622.473541][T16566] x64_sys_call+0x488/0x9a0 [ 622.478046][T16566] do_syscall_64+0x4c/0xa0 [ 622.482476][T16566] ? clear_bhb_loop+0x30/0x80 [ 622.487167][T16566] ? clear_bhb_loop+0x30/0x80 [ 622.491852][T16566] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 622.497751][T16566] RIP: 0033:0x7f62eeb8eba9 [ 622.502179][T16566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 622.521871][T16566] RSP: 002b:00007f62ef95f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 622.530306][T16566] RAX: ffffffffffffffda RBX: 00007f62eedd5fa0 RCX: 00007f62eeb8eba9 [ 622.538291][T16566] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 622.546274][T16566] RBP: 00007f62ef95f090 R08: 0000000000000000 R09: 0000000000000000 [ 622.554255][T16566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 622.562227][T16566] R13: 00007f62eedd6038 R14: 00007f62eedd5fa0 R15: 00007ffd96960688 [ 622.570206][T16566] [ 622.728098][T16588] bond_slave_1: mtu less than device minimum [ 622.840212][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 622.879293][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 622.969624][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 623.079411][T16584] bond_slave_1: mtu less than device minimum [ 623.544763][T16607] device veth0_vlan left promiscuous mode [ 623.562666][T16607] device veth0_vlan entered promiscuous mode [ 623.750251][T16613] device pim6reg1 entered promiscuous mode [ 625.161977][T16638] device sit0 left promiscuous mode [ 625.237861][T16642] bond_slave_1: mtu less than device minimum [ 625.359469][T16641] device veth1_macvtap entered promiscuous mode [ 625.367830][T16641] device macsec0 entered promiscuous mode [ 625.442625][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 626.503044][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 626.547709][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 626.577448][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 626.981903][T16695] bond_slave_1: mtu less than device minimum [ 627.854907][T16730] device veth1_macvtap entered promiscuous mode [ 627.863552][T16730] device macsec0 entered promiscuous mode [ 627.870442][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 627.885431][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 627.901908][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 627.909569][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 628.080399][T16742] bond_slave_1: mtu less than device minimum [ 628.511597][T16762] FAULT_INJECTION: forcing a failure. [ 628.511597][T16762] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 628.560808][T16762] CPU: 1 PID: 16762 Comm: syz.2.5694 Not tainted syzkaller #0 [ 628.568304][T16762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 628.578366][T16762] Call Trace: [ 628.581643][T16762] [ 628.584568][T16762] __dump_stack+0x21/0x24 [ 628.588897][T16762] dump_stack_lvl+0xee/0x150 [ 628.593569][T16762] ? __cfi_dump_stack_lvl+0x8/0x8 [ 628.598592][T16762] ? __kasan_check_write+0x14/0x20 [ 628.603706][T16762] dump_stack+0x15/0x24 [ 628.607865][T16762] should_fail_ex+0x3d4/0x520 [ 628.612542][T16762] should_fail+0xb/0x10 [ 628.616696][T16762] should_fail_usercopy+0x1a/0x20 [ 628.621734][T16762] _copy_from_user+0x1e/0xc0 [ 628.626332][T16762] perf_copy_attr+0x15e/0x880 [ 628.631122][T16762] __se_sys_perf_event_open+0xcb/0x1b80 [ 628.636679][T16762] ? __kasan_check_write+0x14/0x20 [ 628.641809][T16762] ? mutex_unlock+0x89/0x220 [ 628.646398][T16762] ? ktime_get_boot_fast_ns+0x1b3/0x1e0 [ 628.652028][T16762] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 628.657709][T16762] ? __cfi_ksys_write+0x10/0x10 [ 628.662569][T16762] ? do_user_addr_fault+0x9ac/0x1050 [ 628.667861][T16762] ? __bpf_trace_sys_enter+0x62/0x70 [ 628.673158][T16762] __x64_sys_perf_event_open+0xbf/0xd0 [ 628.678628][T16762] x64_sys_call+0x385/0x9a0 [ 628.683140][T16762] do_syscall_64+0x4c/0xa0 [ 628.687563][T16762] ? clear_bhb_loop+0x30/0x80 [ 628.692250][T16762] ? clear_bhb_loop+0x30/0x80 [ 628.696935][T16762] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 628.702835][T16762] RIP: 0033:0x7f867f78eba9 [ 628.707254][T16762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 628.726867][T16762] RSP: 002b:00007f8680653038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 628.735295][T16762] RAX: ffffffffffffffda RBX: 00007f867f9d5fa0 RCX: 00007f867f78eba9 [ 628.743268][T16762] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 00002000000003c0 [ 628.751246][T16762] RBP: 00007f8680653090 R08: 0000000000000000 R09: 0000000000000000 [ 628.759219][T16762] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 628.767191][T16762] R13: 00007f867f9d6038 R14: 00007f867f9d5fa0 R15: 00007ffdaf1708f8 [ 628.775169][T16762] [ 629.296216][T16775] device veth0_vlan left promiscuous mode [ 629.319076][T16775] device veth0_vlan entered promiscuous mode [ 629.401948][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 629.416121][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 629.424093][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 630.376439][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 630.430060][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 630.441037][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 632.773447][T16868] device wg2 entered promiscuous mode [ 634.901820][T16957] bond_slave_1: mtu less than device minimum [ 637.030041][T16988] device sit0 left promiscuous mode [ 637.540495][T17009] device veth1_macvtap left promiscuous mode [ 637.547055][T17009] device macsec0 left promiscuous mode [ 637.794054][ T28] audit: type=1400 audit(1757548860.400:153): avc: denied { create } for pid=17034 comm="syz.4.5783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 637.857984][T17018] device veth0_vlan left promiscuous mode [ 637.884489][T17018] device veth0_vlan entered promiscuous mode [ 637.988646][T17052] FAULT_INJECTION: forcing a failure. [ 637.988646][T17052] name failslab, interval 1, probability 0, space 0, times 0 [ 638.069505][T17052] CPU: 0 PID: 17052 Comm: syz.4.5790 Not tainted syzkaller #0 [ 638.077007][T17052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 638.087067][T17052] Call Trace: [ 638.090353][T17052] [ 638.093284][T17052] __dump_stack+0x21/0x24 [ 638.097622][T17052] dump_stack_lvl+0xee/0x150 [ 638.102208][T17052] ? __cfi_dump_stack_lvl+0x8/0x8 [ 638.107230][T17052] dump_stack+0x15/0x24 [ 638.111386][T17052] should_fail_ex+0x3d4/0x520 [ 638.116065][T17052] __should_failslab+0xac/0xf0 [ 638.120842][T17052] should_failslab+0x9/0x20 [ 638.125351][T17052] kmem_cache_alloc_node+0x42/0x340 [ 638.130577][T17052] ? perf_event_alloc+0x118/0x1970 [ 638.135693][T17052] ? _find_next_zero_bit+0x8d/0x140 [ 638.140894][T17052] perf_event_alloc+0x118/0x1970 [ 638.145923][T17052] ? alloc_fd+0x4e6/0x590 [ 638.150341][T17052] __se_sys_perf_event_open+0x6c5/0x1b80 [ 638.155977][T17052] ? __kasan_check_write+0x14/0x20 [ 638.161102][T17052] ? mutex_unlock+0x89/0x220 [ 638.165679][T17052] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 638.171300][T17052] ? __cfi_ksys_write+0x10/0x10 [ 638.176140][T17052] ? do_user_addr_fault+0x9ac/0x1050 [ 638.181414][T17052] __x64_sys_perf_event_open+0xbf/0xd0 [ 638.186858][T17052] x64_sys_call+0x385/0x9a0 [ 638.191344][T17052] do_syscall_64+0x4c/0xa0 [ 638.195745][T17052] ? clear_bhb_loop+0x30/0x80 [ 638.200403][T17052] ? clear_bhb_loop+0x30/0x80 [ 638.205065][T17052] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 638.210940][T17052] RIP: 0033:0x7fd9cbd8eba9 [ 638.215343][T17052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 638.234934][T17052] RSP: 002b:00007fd9ccb7b038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 638.243335][T17052] RAX: ffffffffffffffda RBX: 00007fd9cbfd5fa0 RCX: 00007fd9cbd8eba9 [ 638.251378][T17052] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 00002000000003c0 [ 638.259335][T17052] RBP: 00007fd9ccb7b090 R08: 0000000000000000 R09: 0000000000000000 [ 638.267286][T17052] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 638.275236][T17052] R13: 00007fd9cbfd6038 R14: 00007fd9cbfd5fa0 R15: 00007fffe1c5cc18 [ 638.283194][T17052] [ 641.676812][T17174] device sit0 left promiscuous mode [ 642.308711][T17177] device sit0 entered promiscuous mode [ 644.018288][T17245] bond_slave_1: mtu less than device minimum [ 645.090089][T17254] bridge0: port 1(bridge_slave_0) entered blocking state [ 645.097281][T17254] bridge0: port 1(bridge_slave_0) entered disabled state [ 645.104971][T17254] device bridge_slave_0 entered promiscuous mode [ 645.132889][T17254] bridge0: port 2(bridge_slave_1) entered blocking state [ 645.139998][T17254] bridge0: port 2(bridge_slave_1) entered disabled state [ 645.147724][T17254] device bridge_slave_1 entered promiscuous mode [ 645.702158][T17274] device sit0 left promiscuous mode [ 646.219270][T17283] FAULT_INJECTION: forcing a failure. [ 646.219270][T17283] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 646.247867][T17283] CPU: 1 PID: 17283 Comm: syz.2.5863 Not tainted syzkaller #0 [ 646.255371][T17283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 646.265428][T17283] Call Trace: [ 646.268702][T17283] [ 646.271634][T17283] __dump_stack+0x21/0x24 [ 646.275967][T17283] dump_stack_lvl+0xee/0x150 [ 646.280562][T17283] ? __cfi_dump_stack_lvl+0x8/0x8 [ 646.285580][T17283] ? vfs_write+0x342/0xca0 [ 646.290005][T17283] dump_stack+0x15/0x24 [ 646.294154][T17283] should_fail_ex+0x3d4/0x520 [ 646.298828][T17283] should_fail+0xb/0x10 [ 646.303008][T17283] should_fail_usercopy+0x1a/0x20 [ 646.308033][T17283] _copy_from_user+0x1e/0xc0 [ 646.312626][T17283] __sys_bpf+0x277/0x780 [ 646.316863][T17283] ? bpf_link_show_fdinfo+0x320/0x320 [ 646.322238][T17283] ? __cfi_ksys_write+0x10/0x10 [ 646.327176][T17283] ? debug_smp_processor_id+0x17/0x20 [ 646.332547][T17283] __x64_sys_bpf+0x7c/0x90 [ 646.336968][T17283] x64_sys_call+0x488/0x9a0 [ 646.341731][T17283] do_syscall_64+0x4c/0xa0 [ 646.346144][T17283] ? clear_bhb_loop+0x30/0x80 [ 646.350862][T17283] ? clear_bhb_loop+0x30/0x80 [ 646.355540][T17283] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 646.361432][T17283] RIP: 0033:0x7f867f78eba9 [ 646.365844][T17283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 646.385453][T17283] RSP: 002b:00007f8680653038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 646.393892][T17283] RAX: ffffffffffffffda RBX: 00007f867f9d5fa0 RCX: 00007f867f78eba9 [ 646.401871][T17283] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 646.409927][T17283] RBP: 00007f8680653090 R08: 0000000000000000 R09: 0000000000000000 [ 646.417893][T17283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 646.425859][T17283] R13: 00007f867f9d6038 R14: 00007f867f9d5fa0 R15: 00007ffdaf1708f8 [ 646.433839][T17283] [ 646.479418][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 646.527894][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 646.555629][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 646.564072][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 646.577685][ T2956] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.584771][ T2956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 646.592518][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 646.601038][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 646.609323][ T2956] bridge0: port 2(bridge_slave_1) entered blocking state [ 646.616390][ T2956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 646.631385][T17294] bond_slave_1: mtu less than device minimum [ 646.672348][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 646.692242][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 646.701141][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 646.709130][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 646.925831][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 647.028406][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 647.067167][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 647.185717][ T1107] device veth1_macvtap left promiscuous mode [ 647.202138][ T1107] device veth0_vlan left promiscuous mode [ 647.442748][T17254] device veth0_vlan entered promiscuous mode [ 647.449092][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 647.457032][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 647.465814][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 647.473498][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 647.509480][T17254] device veth1_macvtap entered promiscuous mode [ 647.516364][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 647.524963][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 647.536505][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 647.569472][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 647.577903][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 647.587580][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 647.596012][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 648.441473][T17348] FAULT_INJECTION: forcing a failure. [ 648.441473][T17348] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 648.533971][T17339] bridge0: port 1(bridge_slave_0) entered blocking state [ 648.550808][T17348] CPU: 1 PID: 17348 Comm: syz.1.5884 Not tainted syzkaller #0 [ 648.558298][T17348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 648.568356][T17348] Call Trace: [ 648.571629][T17348] [ 648.574563][T17348] __dump_stack+0x21/0x24 [ 648.578919][T17348] dump_stack_lvl+0xee/0x150 [ 648.583502][T17348] ? __cfi_dump_stack_lvl+0x8/0x8 [ 648.588556][T17348] dump_stack+0x15/0x24 [ 648.592709][T17348] should_fail_ex+0x3d4/0x520 [ 648.597398][T17348] should_fail+0xb/0x10 [ 648.601554][T17348] should_fail_usercopy+0x1a/0x20 [ 648.606583][T17348] _copy_from_user+0x1e/0xc0 [ 648.611172][T17348] ___sys_recvmsg+0x12b/0x510 [ 648.615846][T17348] ? __sys_recvmsg+0x270/0x270 [ 648.620611][T17348] ? security_file_permission+0x94/0xb0 [ 648.626153][T17348] ? __fget_files+0x2d5/0x330 [ 648.630825][T17348] ? __fdget+0x19c/0x220 [ 648.635066][T17348] __x64_sys_recvmsg+0x1ed/0x2c0 [ 648.639999][T17348] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 648.645455][T17348] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 648.651531][T17348] x64_sys_call+0x75/0x9a0 [ 648.655946][T17348] do_syscall_64+0x4c/0xa0 [ 648.660356][T17348] ? clear_bhb_loop+0x30/0x80 [ 648.665033][T17348] ? clear_bhb_loop+0x30/0x80 [ 648.669728][T17348] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 648.675620][T17348] RIP: 0033:0x7f62eeb8eba9 [ 648.680030][T17348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 648.699641][T17348] RSP: 002b:00007f62ef95f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 648.708060][T17348] RAX: ffffffffffffffda RBX: 00007f62eedd5fa0 RCX: 00007f62eeb8eba9 [ 648.716032][T17348] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000005 [ 648.724001][T17348] RBP: 00007f62ef95f090 R08: 0000000000000000 R09: 0000000000000000 [ 648.731968][T17348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 648.739935][T17348] R13: 00007f62eedd6038 R14: 00007f62eedd5fa0 R15: 00007ffd96960688 [ 648.747909][T17348] [ 648.800146][T17339] bridge0: port 1(bridge_slave_0) entered disabled state [ 648.862147][T17339] device bridge_slave_0 entered promiscuous mode [ 648.931456][T17339] bridge0: port 2(bridge_slave_1) entered blocking state [ 649.030262][T17339] bridge0: port 2(bridge_slave_1) entered disabled state [ 649.092949][T17339] device bridge_slave_1 entered promiscuous mode [ 649.664658][T17374] FAULT_INJECTION: forcing a failure. [ 649.664658][T17374] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 649.860435][T17374] CPU: 1 PID: 17374 Comm: syz.4.5892 Not tainted syzkaller #0 [ 649.867932][T17374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 649.877987][T17374] Call Trace: [ 649.881264][T17374] [ 649.884188][T17374] __dump_stack+0x21/0x24 [ 649.888617][T17374] dump_stack_lvl+0xee/0x150 [ 649.893209][T17374] ? __cfi_dump_stack_lvl+0x8/0x8 [ 649.898326][T17374] dump_stack+0x15/0x24 [ 649.902487][T17374] should_fail_ex+0x3d4/0x520 [ 649.907180][T17374] should_fail+0xb/0x10 [ 649.911345][T17374] should_fail_usercopy+0x1a/0x20 [ 649.916381][T17374] _copy_from_user+0x1e/0xc0 [ 649.920976][T17374] __sys_bpf+0x277/0x780 [ 649.925221][T17374] ? bpf_link_show_fdinfo+0x320/0x320 [ 649.930777][T17374] ? irqentry_exit+0x37/0x40 [ 649.935376][T17374] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 649.941194][T17374] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 649.947353][T17374] __x64_sys_bpf+0x7c/0x90 [ 649.951785][T17374] x64_sys_call+0x488/0x9a0 [ 649.956295][T17374] do_syscall_64+0x4c/0xa0 [ 649.960721][T17374] ? clear_bhb_loop+0x30/0x80 [ 649.965381][T17374] ? clear_bhb_loop+0x30/0x80 [ 649.970044][T17374] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 649.975918][T17374] RIP: 0033:0x7f039ff8eba9 [ 649.980312][T17374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 649.999897][T17374] RSP: 002b:00007f03a0ef1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 650.008292][T17374] RAX: ffffffffffffffda RBX: 00007f03a01d5fa0 RCX: 00007f039ff8eba9 [ 650.016251][T17374] RDX: 0000000000000038 RSI: 0000200000002340 RDI: 000000000000001a [ 650.024207][T17374] RBP: 00007f03a0ef1090 R08: 0000000000000000 R09: 0000000000000000 [ 650.032157][T17374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 650.040108][T17374] R13: 00007f03a01d6038 R14: 00007f03a01d5fa0 R15: 00007ffeeb9ae498 [ 650.048064][T17374] [ 650.264122][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 650.285787][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 650.816348][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 650.840040][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 650.851396][ T2956] bridge0: port 1(bridge_slave_0) entered blocking state [ 650.858462][ T2956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 650.900880][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 650.909387][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 650.919023][ T2956] bridge0: port 2(bridge_slave_1) entered blocking state [ 650.926109][ T2956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 650.936016][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 650.966533][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 651.040984][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 651.140522][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 651.150796][ T1107] device veth0_vlan left promiscuous mode [ 651.206236][T17394] device veth0_vlan left promiscuous mode [ 651.214317][T17394] device veth0_vlan entered promiscuous mode [ 651.282964][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 651.296846][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 651.329990][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 651.337669][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 651.345401][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 651.354134][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 651.406342][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 651.446334][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 651.503421][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 651.524230][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 651.610197][T17339] device veth0_vlan entered promiscuous mode [ 651.721776][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 651.773029][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 651.835160][T17339] device veth1_macvtap entered promiscuous mode [ 651.865092][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 651.874116][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 651.936770][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 651.945651][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 652.773844][T17454] FAULT_INJECTION: forcing a failure. [ 652.773844][T17454] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 652.839896][T17454] CPU: 0 PID: 17454 Comm: syz.2.5911 Not tainted syzkaller #0 [ 652.847394][T17454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 652.857455][T17454] Call Trace: [ 652.860737][T17454] [ 652.863664][T17454] __dump_stack+0x21/0x24 [ 652.868007][T17454] dump_stack_lvl+0xee/0x150 [ 652.872679][T17454] ? __cfi_dump_stack_lvl+0x8/0x8 [ 652.877696][T17454] ? migrate_enable+0x19c/0x280 [ 652.882547][T17454] dump_stack+0x15/0x24 [ 652.886695][T17454] should_fail_ex+0x3d4/0x520 [ 652.891371][T17454] should_fail+0xb/0x10 [ 652.895518][T17454] should_fail_usercopy+0x1a/0x20 [ 652.900541][T17454] _copy_from_user+0x1e/0xc0 [ 652.905130][T17454] generic_map_update_batch+0x4b1/0x780 [ 652.910680][T17454] ? __cfi_generic_map_update_batch+0x10/0x10 [ 652.916751][T17454] ? __fdget+0x19c/0x220 [ 652.920997][T17454] ? __cfi_generic_map_update_batch+0x10/0x10 [ 652.927085][T17454] bpf_map_do_batch+0x48c/0x620 [ 652.931946][T17454] __sys_bpf+0x624/0x780 [ 652.936187][T17454] ? bpf_link_show_fdinfo+0x320/0x320 [ 652.941557][T17454] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 652.947713][T17454] __x64_sys_bpf+0x7c/0x90 [ 652.952135][T17454] x64_sys_call+0x488/0x9a0 [ 652.956646][T17454] do_syscall_64+0x4c/0xa0 [ 652.961092][T17454] ? clear_bhb_loop+0x30/0x80 [ 652.965780][T17454] ? clear_bhb_loop+0x30/0x80 [ 652.970455][T17454] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 652.976355][T17454] RIP: 0033:0x7fa44178eba9 [ 652.980901][T17454] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 653.000513][T17454] RSP: 002b:00007fa442658038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 653.008935][T17454] RAX: ffffffffffffffda RBX: 00007fa4419d5fa0 RCX: 00007fa44178eba9 [ 653.016903][T17454] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 653.024869][T17454] RBP: 00007fa442658090 R08: 0000000000000000 R09: 0000000000000000 [ 653.032844][T17454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 653.040822][T17454] R13: 00007fa4419d6038 R14: 00007fa4419d5fa0 R15: 00007ffde1827388 [ 653.048888][T17454] [ 654.834734][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 654.850331][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 654.868107][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 655.320035][T17498] bridge0: port 1(bridge_slave_0) entered blocking state [ 655.327110][T17498] bridge0: port 1(bridge_slave_0) entered disabled state [ 655.451402][T17498] device bridge_slave_0 entered promiscuous mode [ 655.511363][T17498] bridge0: port 2(bridge_slave_1) entered blocking state [ 655.522571][T17498] bridge0: port 2(bridge_slave_1) entered disabled state [ 655.562410][T17498] device bridge_slave_1 entered promiscuous mode [ 656.264008][ T1107] GPL: port 1(veth0_vlan) entered disabled state [ 656.335437][T17518] FAULT_INJECTION: forcing a failure. [ 656.335437][T17518] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 656.426882][T17518] CPU: 0 PID: 17518 Comm: syz.3.5933 Not tainted syzkaller #0 [ 656.434381][T17518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 656.444435][T17518] Call Trace: [ 656.447718][T17518] [ 656.450646][T17518] __dump_stack+0x21/0x24 [ 656.454980][T17518] dump_stack_lvl+0xee/0x150 [ 656.459564][T17518] ? __cfi_dump_stack_lvl+0x8/0x8 [ 656.464584][T17518] dump_stack+0x15/0x24 [ 656.468739][T17518] should_fail_ex+0x3d4/0x520 [ 656.473436][T17518] should_fail+0xb/0x10 [ 656.477592][T17518] should_fail_usercopy+0x1a/0x20 [ 656.482614][T17518] _copy_from_user+0x1e/0xc0 [ 656.487212][T17518] generic_map_update_batch+0x4b1/0x780 [ 656.492768][T17518] ? __cfi_generic_map_update_batch+0x10/0x10 [ 656.498932][T17518] ? bpf_map_do_batch+0x3e4/0x620 [ 656.503964][T17518] ? __cfi_generic_map_update_batch+0x10/0x10 [ 656.510036][T17518] bpf_map_do_batch+0x48c/0x620 [ 656.515146][T17518] __sys_bpf+0x624/0x780 [ 656.519384][T17518] ? bpf_link_show_fdinfo+0x320/0x320 [ 656.524755][T17518] ? __cfi_sched_clock_cpu+0x10/0x10 [ 656.530044][T17518] __x64_sys_bpf+0x7c/0x90 [ 656.534463][T17518] x64_sys_call+0x488/0x9a0 [ 656.538963][T17518] do_syscall_64+0x4c/0xa0 [ 656.543371][T17518] ? clear_bhb_loop+0x30/0x80 [ 656.548083][T17518] ? clear_bhb_loop+0x30/0x80 [ 656.552782][T17518] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 656.558674][T17518] RIP: 0033:0x7f5a5378eba9 [ 656.563082][T17518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 656.582686][T17518] RSP: 002b:00007f5a545ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 656.591107][T17518] RAX: ffffffffffffffda RBX: 00007f5a539d5fa0 RCX: 00007f5a5378eba9 [ 656.599083][T17518] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 656.607061][T17518] RBP: 00007f5a545ed090 R08: 0000000000000000 R09: 0000000000000000 [ 656.615037][T17518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 656.623050][T17518] R13: 00007f5a539d6038 R14: 00007f5a539d5fa0 R15: 00007ffd62a6c3d8 [ 656.631030][T17518] [ 656.810822][T17524] GPL: port 1(erspan0) entered blocking state [ 656.817820][T17524] GPL: port 1(erspan0) entered disabled state [ 656.905661][T17524] device erspan0 entered promiscuous mode [ 657.737378][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 657.752576][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 657.798028][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 657.842243][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 657.850553][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 657.857582][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 657.873100][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 657.881776][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 657.890236][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 657.897302][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 657.911136][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 657.965455][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 657.984132][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 658.000009][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 658.008227][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 658.060987][T17498] device veth0_vlan entered promiscuous mode [ 658.138669][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 658.148667][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 658.157364][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 658.165533][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 658.182894][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 658.190516][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 658.211855][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 658.221468][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 658.231689][T17498] device veth1_macvtap entered promiscuous mode [ 658.244092][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 658.256453][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 658.264904][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 658.283323][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 658.305476][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 658.912974][T17592] device veth1_macvtap left promiscuous mode [ 659.423128][T17617] FAULT_INJECTION: forcing a failure. [ 659.423128][T17617] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 659.472396][T17617] CPU: 1 PID: 17617 Comm: syz.0.5962 Not tainted syzkaller #0 [ 659.479895][T17617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 659.489955][T17617] Call Trace: [ 659.493248][T17617] [ 659.496185][T17617] __dump_stack+0x21/0x24 [ 659.500524][T17617] dump_stack_lvl+0xee/0x150 [ 659.505119][T17617] ? __cfi_dump_stack_lvl+0x8/0x8 [ 659.510146][T17617] dump_stack+0x15/0x24 [ 659.514300][T17617] should_fail_ex+0x3d4/0x520 [ 659.518979][T17617] should_fail+0xb/0x10 [ 659.523228][T17617] should_fail_usercopy+0x1a/0x20 [ 659.528263][T17617] _copy_from_user+0x1e/0xc0 [ 659.532862][T17617] __sys_bpf+0x277/0x780 [ 659.537111][T17617] ? bpf_link_show_fdinfo+0x320/0x320 [ 659.542486][T17617] ? __cfi_ksys_write+0x10/0x10 [ 659.547345][T17617] ? debug_smp_processor_id+0x17/0x20 [ 659.552724][T17617] __x64_sys_bpf+0x7c/0x90 [ 659.557152][T17617] x64_sys_call+0x488/0x9a0 [ 659.561656][T17617] do_syscall_64+0x4c/0xa0 [ 659.566068][T17617] ? clear_bhb_loop+0x30/0x80 [ 659.570751][T17617] ? clear_bhb_loop+0x30/0x80 [ 659.575432][T17617] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 659.581326][T17617] RIP: 0033:0x7ffa8018eba9 [ 659.585757][T17617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 659.605366][T17617] RSP: 002b:00007ffa80fd2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 659.613788][T17617] RAX: ffffffffffffffda RBX: 00007ffa803d5fa0 RCX: 00007ffa8018eba9 [ 659.621765][T17617] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 2000000000000000 [ 659.629738][T17617] RBP: 00007ffa80fd2090 R08: 0000000000000000 R09: 0000000000000000 [ 659.637755][T17617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 659.645727][T17617] R13: 00007ffa803d6038 R14: 00007ffa803d5fa0 R15: 00007ffc5246a658 [ 659.653721][T17617] [ 662.328853][T17684] device pim6reg1 entered promiscuous mode [ 664.004814][T17713] device veth0_vlan left promiscuous mode [ 664.014207][T17713] device veth0_vlan entered promiscuous mode [ 664.753518][T17725] bond_slave_1: mtu less than device minimum [ 665.851168][T17762] FAULT_INJECTION: forcing a failure. [ 665.851168][T17762] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 665.865148][T17762] CPU: 0 PID: 17762 Comm: syz.1.6009 Not tainted syzkaller #0 [ 665.872622][T17762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 665.882671][T17762] Call Trace: [ 665.885950][T17762] [ 665.888871][T17762] __dump_stack+0x21/0x24 [ 665.893197][T17762] dump_stack_lvl+0xee/0x150 [ 665.897799][T17762] ? __cfi_dump_stack_lvl+0x8/0x8 [ 665.902918][T17762] ? migrate_enable+0x19c/0x280 [ 665.907795][T17762] dump_stack+0x15/0x24 [ 665.912316][T17762] should_fail_ex+0x3d4/0x520 [ 665.917017][T17762] should_fail+0xb/0x10 [ 665.921208][T17762] should_fail_usercopy+0x1a/0x20 [ 665.926242][T17762] _copy_from_user+0x1e/0xc0 [ 665.930830][T17762] generic_map_update_batch+0x458/0x780 [ 665.936423][T17762] ? __cfi_generic_map_update_batch+0x10/0x10 [ 665.942515][T17762] ? __fdget+0x19c/0x220 [ 665.946758][T17762] ? __cfi_generic_map_update_batch+0x10/0x10 [ 665.952825][T17762] bpf_map_do_batch+0x48c/0x620 [ 665.957681][T17762] __sys_bpf+0x624/0x780 [ 665.961917][T17762] ? bpf_link_show_fdinfo+0x320/0x320 [ 665.967287][T17762] ? __cfi_sched_clock_cpu+0x10/0x10 [ 665.972574][T17762] ? __bpf_trace_sys_enter+0x62/0x70 [ 665.977861][T17762] __x64_sys_bpf+0x7c/0x90 [ 665.982280][T17762] x64_sys_call+0x488/0x9a0 [ 665.986785][T17762] do_syscall_64+0x4c/0xa0 [ 665.991194][T17762] ? clear_bhb_loop+0x30/0x80 [ 665.995869][T17762] ? clear_bhb_loop+0x30/0x80 [ 666.000545][T17762] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 666.006436][T17762] RIP: 0033:0x7f58aaf8eba9 [ 666.010855][T17762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 666.030453][T17762] RSP: 002b:00007f58abeaf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 666.038863][T17762] RAX: ffffffffffffffda RBX: 00007f58ab1d5fa0 RCX: 00007f58aaf8eba9 [ 666.046824][T17762] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 666.054791][T17762] RBP: 00007f58abeaf090 R08: 0000000000000000 R09: 0000000000000000 [ 666.062753][T17762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 666.070717][T17762] R13: 00007f58ab1d6038 R14: 00007f58ab1d5fa0 R15: 00007ffc0bcfd698 [ 666.078682][T17762] [ 667.663483][T17802] device veth1_macvtap left promiscuous mode [ 667.681422][T17802] device macsec0 left promiscuous mode [ 668.452311][T17825] device sit0 entered promiscuous mode [ 668.488740][T17828] device veth0_vlan left promiscuous mode [ 668.505542][T17828] device veth0_vlan entered promiscuous mode [ 669.042017][T17838] device syzkaller0 entered promiscuous mode [ 670.496117][T17873] FAULT_INJECTION: forcing a failure. [ 670.496117][T17873] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 670.546513][T17873] CPU: 1 PID: 17873 Comm: syz.0.6047 Not tainted syzkaller #0 [ 670.554008][T17873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 670.564071][T17873] Call Trace: [ 670.567351][T17873] [ 670.570274][T17873] __dump_stack+0x21/0x24 [ 670.574610][T17873] dump_stack_lvl+0xee/0x150 [ 670.579219][T17873] ? __cfi_dump_stack_lvl+0x8/0x8 [ 670.584241][T17873] dump_stack+0x15/0x24 [ 670.588400][T17873] should_fail_ex+0x3d4/0x520 [ 670.593166][T17873] should_fail+0xb/0x10 [ 670.597330][T17873] should_fail_usercopy+0x1a/0x20 [ 670.602354][T17873] copy_fpstate_to_sigframe+0x849/0xaa0 [ 670.607931][T17873] ? copy_fpstate_to_sigframe+0x17c/0xaa0 [ 670.613668][T17873] ? __cfi_copy_fpstate_to_sigframe+0x10/0x10 [ 670.619789][T17873] ? get_signal+0x124b/0x1520 [ 670.624493][T17873] ? fpu__alloc_mathframe+0xb3/0x130 [ 670.629787][T17873] arch_do_signal_or_restart+0x5bd/0x1030 [ 670.635514][T17873] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 670.641323][T17873] ? force_sig_info_to_task+0x344/0x3f0 [ 670.646874][T17873] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 670.653127][T17873] ? force_sig+0xb7/0x100 [ 670.657500][T17873] ? __kasan_check_write+0x14/0x20 [ 670.662622][T17873] exit_to_user_mode_loop+0x7a/0xb0 [ 670.667817][T17873] exit_to_user_mode_prepare+0x5a/0xa0 [ 670.673269][T17873] irqentry_exit_to_user_mode+0x9/0x10 [ 670.678742][T17873] irqentry_exit+0x12/0x40 [ 670.683158][T17873] exc_general_protection+0x14e/0x1e0 [ 670.688701][T17873] ? debug_smp_processor_id+0x17/0x20 [ 670.694073][T17873] ? do_syscall_64+0x58/0xa0 [ 670.698660][T17873] asm_exc_general_protection+0x27/0x30 [ 670.704204][T17873] RIP: 0033:0x7ffa801676f9 [ 670.708628][T17873] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 670.728235][T17873] RSP: 002b:00007ffa80fd17c8 EFLAGS: 00010283 [ 670.734308][T17873] RAX: 0000000000000999 RBX: 00007ffa80fd1d30 RCX: 00007ffa80398120 [ 670.742276][T17873] RDX: 9999999999999999 RSI: 00007ffa80211b31 RDI: 9999999999999999 [ 670.750249][T17873] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 670.758220][T17873] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 670.766189][T17873] R13: 00007ffa80fd1eb0 R14: 9999999999999999 R15: 0000000000000000 [ 670.774165][T17873] [ 670.815677][T17871] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.826767][T17871] bridge0: port 1(bridge_slave_0) entered disabled state [ 670.909712][T17879] device bridge_slave_1 left promiscuous mode [ 670.915889][T17879] bridge0: port 2(bridge_slave_1) entered disabled state [ 671.010460][T17879] device bridge_slave_0 left promiscuous mode [ 671.018872][T17879] bridge0: port 1(bridge_slave_0) entered disabled state [ 671.670461][T17899] device syzkaller0 entered promiscuous mode [ 672.449772][T17911] device veth0_vlan left promiscuous mode [ 672.467331][T17911] device veth0_vlan entered promiscuous mode [ 673.220093][T17934] device veth0_vlan left promiscuous mode [ 673.226137][T17934] device veth0_vlan entered promiscuous mode [ 673.384286][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 673.394930][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 673.406201][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 673.488306][T17949] FAULT_INJECTION: forcing a failure. [ 673.488306][T17949] name failslab, interval 1, probability 0, space 0, times 0 [ 673.503920][T17949] CPU: 1 PID: 17949 Comm: syz.4.6073 Not tainted syzkaller #0 [ 673.511404][T17949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 673.521499][T17949] Call Trace: [ 673.524783][T17949] [ 673.527722][T17949] __dump_stack+0x21/0x24 [ 673.532055][T17949] dump_stack_lvl+0xee/0x150 [ 673.536640][T17949] ? __cfi_dump_stack_lvl+0x8/0x8 [ 673.541660][T17949] ? kasan_save_alloc_info+0x25/0x30 [ 673.546953][T17949] ? kmalloc_trace+0x40/0xb0 [ 673.551564][T17949] ? alloc_perf_context+0x59/0x2e0 [ 673.556674][T17949] ? find_get_context+0x34c/0x9e0 [ 673.561703][T17949] ? __x64_sys_perf_event_open+0xbf/0xd0 [ 673.567343][T17949] dump_stack+0x15/0x24 [ 673.571500][T17949] should_fail_ex+0x3d4/0x520 [ 673.576169][T17949] __should_failslab+0xac/0xf0 [ 673.580916][T17949] should_failslab+0x9/0x20 [ 673.585415][T17949] slab_pre_alloc_hook+0x30/0x1e0 [ 673.590433][T17949] kmem_cache_alloc_lru+0x49/0x280 [ 673.595539][T17949] ? __d_alloc+0x34/0x6c0 [ 673.599901][T17949] __d_alloc+0x34/0x6c0 [ 673.604057][T17949] d_alloc_pseudo+0x1d/0x70 [ 673.608550][T17949] alloc_file_pseudo+0xc8/0x1f0 [ 673.613384][T17949] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 673.618827][T17949] ? alloc_perf_context+0x222/0x2e0 [ 673.624023][T17949] anon_inode_getfile+0xa6/0x180 [ 673.629048][T17949] __se_sys_perf_event_open+0xbd2/0x1b80 [ 673.634671][T17949] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 673.640295][T17949] ? __bpf_trace_sys_enter+0x62/0x70 [ 673.645569][T17949] __x64_sys_perf_event_open+0xbf/0xd0 [ 673.651035][T17949] x64_sys_call+0x385/0x9a0 [ 673.655524][T17949] do_syscall_64+0x4c/0xa0 [ 673.659921][T17949] ? clear_bhb_loop+0x30/0x80 [ 673.664579][T17949] ? clear_bhb_loop+0x30/0x80 [ 673.669240][T17949] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 673.675126][T17949] RIP: 0033:0x7f039ff8eba9 [ 673.679541][T17949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 673.699139][T17949] RSP: 002b:00007f03a0ef1038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 673.707544][T17949] RAX: ffffffffffffffda RBX: 00007f03a01d5fa0 RCX: 00007f039ff8eba9 [ 673.715509][T17949] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 00002000000003c0 [ 673.723474][T17949] RBP: 00007f03a0ef1090 R08: 0000000000000000 R09: 0000000000000000 [ 673.731443][T17949] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 673.739398][T17949] R13: 00007f03a01d6038 R14: 00007f03a01d5fa0 R15: 00007ffeeb9ae498 [ 673.747361][T17949] [ 673.920110][T17964] FAULT_INJECTION: forcing a failure. [ 673.920110][T17964] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 673.936407][T17964] CPU: 0 PID: 17964 Comm: syz.4.6078 Not tainted syzkaller #0 [ 673.943928][T17964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 673.953986][T17964] Call Trace: [ 673.957262][T17964] [ 673.960189][T17964] __dump_stack+0x21/0x24 [ 673.964520][T17964] dump_stack_lvl+0xee/0x150 [ 673.969107][T17964] ? __cfi_dump_stack_lvl+0x8/0x8 [ 673.974127][T17964] dump_stack+0x15/0x24 [ 673.978287][T17964] should_fail_ex+0x3d4/0x520 [ 673.982966][T17964] should_fail+0xb/0x10 [ 673.987135][T17964] should_fail_usercopy+0x1a/0x20 [ 673.992159][T17964] _copy_from_user+0x1e/0xc0 [ 673.996751][T17964] generic_map_update_batch+0x458/0x780 [ 674.002299][T17964] ? __cfi_generic_map_update_batch+0x10/0x10 [ 674.008366][T17964] ? bpf_map_do_batch+0x39c/0x620 [ 674.013388][T17964] ? __cfi_generic_map_update_batch+0x10/0x10 [ 674.019454][T17964] bpf_map_do_batch+0x48c/0x620 [ 674.024307][T17964] __sys_bpf+0x624/0x780 [ 674.028544][T17964] ? bpf_link_show_fdinfo+0x320/0x320 [ 674.033915][T17964] ? __cfi_sched_clock_cpu+0x10/0x10 [ 674.039202][T17964] ? debug_smp_processor_id+0x17/0x20 [ 674.044577][T17964] ? perf_trace_sys_enter+0x30/0x150 [ 674.049866][T17964] __x64_sys_bpf+0x7c/0x90 [ 674.054289][T17964] x64_sys_call+0x488/0x9a0 [ 674.058794][T17964] do_syscall_64+0x4c/0xa0 [ 674.063208][T17964] ? clear_bhb_loop+0x30/0x80 [ 674.067974][T17964] ? clear_bhb_loop+0x30/0x80 [ 674.072658][T17964] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 674.078552][T17964] RIP: 0033:0x7f039ff8eba9 [ 674.082968][T17964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 674.102749][T17964] RSP: 002b:00007f03a0ef1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 674.111171][T17964] RAX: ffffffffffffffda RBX: 00007f03a01d5fa0 RCX: 00007f039ff8eba9 [ 674.119148][T17964] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 674.127142][T17964] RBP: 00007f03a0ef1090 R08: 0000000000000000 R09: 0000000000000000 [ 674.135111][T17964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 674.143079][T17964] R13: 00007f03a01d6038 R14: 00007f03a01d5fa0 R15: 00007ffeeb9ae498 [ 674.151060][T17964] [ 674.186778][T17942] device syzkaller0 entered promiscuous mode [ 674.301769][T17970] FAULT_INJECTION: forcing a failure. [ 674.301769][T17970] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 674.315150][T17970] CPU: 0 PID: 17970 Comm: syz.3.6080 Not tainted syzkaller #0 [ 674.322615][T17970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 674.332662][T17970] Call Trace: [ 674.335933][T17970] [ 674.338855][T17970] __dump_stack+0x21/0x24 [ 674.343185][T17970] dump_stack_lvl+0xee/0x150 [ 674.347773][T17970] ? __cfi_dump_stack_lvl+0x8/0x8 [ 674.352794][T17970] ? migrate_enable+0x19c/0x280 [ 674.357639][T17970] dump_stack+0x15/0x24 [ 674.361786][T17970] should_fail_ex+0x3d4/0x520 [ 674.366463][T17970] should_fail+0xb/0x10 [ 674.370613][T17970] should_fail_usercopy+0x1a/0x20 [ 674.375636][T17970] _copy_from_user+0x1e/0xc0 [ 674.380225][T17970] generic_map_update_batch+0x4b1/0x780 [ 674.385771][T17970] ? __cfi_generic_map_update_batch+0x10/0x10 [ 674.391838][T17970] ? __fdget+0x19c/0x220 [ 674.396084][T17970] ? __cfi_generic_map_update_batch+0x10/0x10 [ 674.402183][T17970] bpf_map_do_batch+0x48c/0x620 [ 674.407127][T17970] __sys_bpf+0x624/0x780 [ 674.411366][T17970] ? bpf_link_show_fdinfo+0x320/0x320 [ 674.416743][T17970] ? __cfi_sched_clock_cpu+0x10/0x10 [ 674.422032][T17970] __x64_sys_bpf+0x7c/0x90 [ 674.426452][T17970] x64_sys_call+0x488/0x9a0 [ 674.430951][T17970] do_syscall_64+0x4c/0xa0 [ 674.435381][T17970] ? clear_bhb_loop+0x30/0x80 [ 674.440055][T17970] ? clear_bhb_loop+0x30/0x80 [ 674.444729][T17970] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 674.450619][T17970] RIP: 0033:0x7f5a5378eba9 [ 674.455031][T17970] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 674.474636][T17970] RSP: 002b:00007f5a545ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 674.483057][T17970] RAX: ffffffffffffffda RBX: 00007f5a539d5fa0 RCX: 00007f5a5378eba9 [ 674.491030][T17970] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 674.499009][T17970] RBP: 00007f5a545ed090 R08: 0000000000000000 R09: 0000000000000000 [ 674.506975][T17970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 674.514988][T17970] R13: 00007f5a539d6038 R14: 00007f5a539d5fa0 R15: 00007ffd62a6c3d8 [ 674.522973][T17970] [ 674.560312][T17967] bond_slave_1: mtu less than device minimum [ 674.581313][T17978] bond_slave_1: mtu less than device minimum [ 674.838468][T18001] bond_slave_1: mtu less than device minimum [ 675.022680][T18029] syz.2.6099[18029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 675.022742][T18029] syz.2.6099[18029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 675.178400][T18044] FAULT_INJECTION: forcing a failure. [ 675.178400][T18044] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 675.249812][T18044] CPU: 1 PID: 18044 Comm: syz.2.6107 Not tainted syzkaller #0 [ 675.257309][T18044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 675.267367][T18044] Call Trace: [ 675.270649][T18044] [ 675.273577][T18044] __dump_stack+0x21/0x24 [ 675.277911][T18044] dump_stack_lvl+0xee/0x150 [ 675.282501][T18044] ? __cfi_dump_stack_lvl+0x8/0x8 [ 675.287526][T18044] dump_stack+0x15/0x24 [ 675.291679][T18044] should_fail_ex+0x3d4/0x520 [ 675.296359][T18044] should_fail+0xb/0x10 [ 675.300511][T18044] should_fail_usercopy+0x1a/0x20 [ 675.305528][T18044] _copy_from_user+0x1e/0xc0 [ 675.310100][T18044] generic_map_update_batch+0x4b1/0x780 [ 675.315638][T18044] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 675.321429][T18044] ? __cfi_generic_map_update_batch+0x10/0x10 [ 675.327480][T18044] ? __fdget+0x19c/0x220 [ 675.331702][T18044] ? __cfi_generic_map_update_batch+0x10/0x10 [ 675.337751][T18044] bpf_map_do_batch+0x48c/0x620 [ 675.342585][T18044] __sys_bpf+0x624/0x780 [ 675.346813][T18044] ? bpf_link_show_fdinfo+0x320/0x320 [ 675.352165][T18044] ? __cfi_ksys_write+0x10/0x10 [ 675.357003][T18044] ? debug_smp_processor_id+0x17/0x20 [ 675.362361][T18044] __x64_sys_bpf+0x7c/0x90 [ 675.366765][T18044] x64_sys_call+0x488/0x9a0 [ 675.371276][T18044] do_syscall_64+0x4c/0xa0 [ 675.375673][T18044] ? clear_bhb_loop+0x30/0x80 [ 675.380334][T18044] ? clear_bhb_loop+0x30/0x80 [ 675.384997][T18044] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 675.390907][T18044] RIP: 0033:0x7fa44178eba9 [ 675.395305][T18044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 675.414893][T18044] RSP: 002b:00007fa442658038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 675.423321][T18044] RAX: ffffffffffffffda RBX: 00007fa4419d5fa0 RCX: 00007fa44178eba9 [ 675.431275][T18044] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 675.439228][T18044] RBP: 00007fa442658090 R08: 0000000000000000 R09: 0000000000000000 [ 675.447219][T18044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 675.455171][T18044] R13: 00007fa4419d6038 R14: 00007fa4419d5fa0 R15: 00007ffde1827388 [ 675.463128][T18044] [ 675.767896][T18060] device veth0_vlan left promiscuous mode [ 675.781357][T18060] device veth0_vlan entered promiscuous mode [ 675.836753][T18053] bridge0: port 1(bridge_slave_0) entered blocking state [ 675.850787][T18053] bridge0: port 1(bridge_slave_0) entered disabled state [ 675.862894][T18053] device bridge_slave_0 entered promiscuous mode [ 675.871148][T18053] bridge0: port 2(bridge_slave_1) entered blocking state [ 675.878237][T18053] bridge0: port 2(bridge_slave_1) entered disabled state [ 675.889248][T18053] device bridge_slave_1 entered promiscuous mode [ 675.960639][T18073] device pim6reg1 entered promiscuous mode [ 676.311557][T18053] bridge0: port 2(bridge_slave_1) entered blocking state [ 676.318649][T18053] bridge0: port 2(bridge_slave_1) entered forwarding state [ 676.325953][T18053] bridge0: port 1(bridge_slave_0) entered blocking state [ 676.333008][T18053] bridge0: port 1(bridge_slave_0) entered forwarding state [ 676.728704][T18111] device syzkaller0 entered promiscuous mode [ 676.772158][T18116] device veth1_macvtap left promiscuous mode [ 676.873488][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 676.884352][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 676.964651][T18053] device veth0_vlan entered promiscuous mode [ 677.022160][T18053] device veth1_macvtap entered promiscuous mode [ 677.270614][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 677.301986][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 677.420738][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 677.526706][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 677.595257][T18150] bridge0: port 1(bridge_slave_0) entered blocking state [ 677.602344][T18150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 677.685668][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 677.697200][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 677.705830][T18150] bridge0: port 2(bridge_slave_1) entered blocking state [ 677.712905][T18150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 677.720870][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 677.729089][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 677.737444][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 677.746464][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 677.754652][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 677.763056][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 677.771575][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 677.779943][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 677.788114][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 677.796800][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 677.805136][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 677.813285][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 677.821051][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 677.838712][T18159] device veth0_vlan left promiscuous mode [ 677.844987][T18159] device veth0_vlan entered promiscuous mode [ 677.890755][T18168] device veth0_vlan left promiscuous mode [ 677.897249][T18168] device veth0_vlan entered promiscuous mode [ 677.963238][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 677.987839][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 677.997771][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 678.006311][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 678.591158][T18194] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.601672][T18194] bridge0: port 1(bridge_slave_0) entered disabled state [ 679.019938][ T1107] GPL: port 1(veth0_vlan) entered disabled state [ 679.031389][ T1107] device veth0_vlan left promiscuous mode [ 679.535539][T18196] device bridge_slave_1 left promiscuous mode [ 679.543512][T18196] bridge0: port 2(bridge_slave_1) entered disabled state [ 679.562882][T18196] device bridge_slave_0 left promiscuous mode [ 679.584863][T18196] bridge0: port 1(bridge_slave_0) entered disabled state [ 679.614901][T18209] FAULT_INJECTION: forcing a failure. [ 679.614901][T18209] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 679.641647][T18209] CPU: 1 PID: 18209 Comm: syz.4.6145 Not tainted syzkaller #0 [ 679.649144][T18209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 679.659205][T18209] Call Trace: [ 679.662488][T18209] [ 679.665418][T18209] __dump_stack+0x21/0x24 [ 679.669752][T18209] dump_stack_lvl+0xee/0x150 [ 679.674351][T18209] ? __cfi_dump_stack_lvl+0x8/0x8 [ 679.679380][T18209] dump_stack+0x15/0x24 [ 679.683543][T18209] should_fail_ex+0x3d4/0x520 [ 679.688224][T18209] should_fail+0xb/0x10 [ 679.692385][T18209] should_fail_usercopy+0x1a/0x20 [ 679.697408][T18209] _copy_from_user+0x1e/0xc0 [ 679.702001][T18209] generic_map_update_batch+0x458/0x780 [ 679.707550][T18209] ? __cfi_generic_map_update_batch+0x10/0x10 [ 679.713638][T18209] ? __cfi_generic_map_update_batch+0x10/0x10 [ 679.719710][T18209] bpf_map_do_batch+0x48c/0x620 [ 679.724563][T18209] __sys_bpf+0x624/0x780 [ 679.728818][T18209] ? bpf_link_show_fdinfo+0x320/0x320 [ 679.734196][T18209] __x64_sys_bpf+0x7c/0x90 [ 679.738622][T18209] x64_sys_call+0x488/0x9a0 [ 679.743126][T18209] do_syscall_64+0x4c/0xa0 [ 679.747570][T18209] ? clear_bhb_loop+0x30/0x80 [ 679.752256][T18209] ? clear_bhb_loop+0x30/0x80 [ 679.756941][T18209] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 679.762839][T18209] RIP: 0033:0x7f039ff8eba9 [ 679.767249][T18209] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 679.786855][T18209] RSP: 002b:00007f03a0ef1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 679.795276][T18209] RAX: ffffffffffffffda RBX: 00007f03a01d5fa0 RCX: 00007f039ff8eba9 [ 679.803246][T18209] RDX: 0000000000000038 RSI: 0000200000002340 RDI: 000000000000001a [ 679.811216][T18209] RBP: 00007f03a0ef1090 R08: 0000000000000000 R09: 0000000000000000 [ 679.819186][T18209] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 679.827154][T18209] R13: 00007f03a01d6038 R14: 00007f03a01d5fa0 R15: 00007ffeeb9ae498 [ 679.835135][T18209] [ 680.218557][ T28] audit: type=1400 audit(1757548902.820:154): avc: denied { create } for pid=18238 comm="syz.4.6156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 680.352678][T18240] device veth0_vlan left promiscuous mode [ 680.430296][T18240] device veth0_vlan entered promiscuous mode [ 681.386817][T18282] device sit0 left promiscuous mode [ 682.354356][T18300] FAULT_INJECTION: forcing a failure. [ 682.354356][T18300] name failslab, interval 1, probability 0, space 0, times 0 [ 682.376676][T18300] CPU: 0 PID: 18300 Comm: syz.1.6180 Not tainted syzkaller #0 [ 682.384168][T18300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 682.394227][T18300] Call Trace: [ 682.397495][T18300] [ 682.400408][T18300] __dump_stack+0x21/0x24 [ 682.404725][T18300] dump_stack_lvl+0xee/0x150 [ 682.409300][T18300] ? __cfi_dump_stack_lvl+0x8/0x8 [ 682.414308][T18300] dump_stack+0x15/0x24 [ 682.418444][T18300] should_fail_ex+0x3d4/0x520 [ 682.423105][T18300] ? __alloc_file+0x28/0x2a0 [ 682.427678][T18300] __should_failslab+0xac/0xf0 [ 682.432427][T18300] should_failslab+0x9/0x20 [ 682.436913][T18300] kmem_cache_alloc+0x3b/0x330 [ 682.441663][T18300] ? __cfi__raw_spin_lock+0x10/0x10 [ 682.446857][T18300] __alloc_file+0x28/0x2a0 [ 682.451259][T18300] alloc_empty_file+0x97/0x180 [ 682.456006][T18300] alloc_file+0x59/0x640 [ 682.460233][T18300] alloc_file_pseudo+0x17a/0x1f0 [ 682.465157][T18300] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 682.470599][T18300] ? alloc_perf_context+0x222/0x2e0 [ 682.475781][T18300] anon_inode_getfile+0xa6/0x180 [ 682.480704][T18300] __se_sys_perf_event_open+0xbd2/0x1b80 [ 682.486412][T18300] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 682.492032][T18300] ? __cfi_ksys_write+0x10/0x10 [ 682.496871][T18300] ? do_user_addr_fault+0x9ac/0x1050 [ 682.502148][T18300] __x64_sys_perf_event_open+0xbf/0xd0 [ 682.507593][T18300] x64_sys_call+0x385/0x9a0 [ 682.512080][T18300] do_syscall_64+0x4c/0xa0 [ 682.516478][T18300] ? clear_bhb_loop+0x30/0x80 [ 682.521180][T18300] ? clear_bhb_loop+0x30/0x80 [ 682.525840][T18300] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 682.531714][T18300] RIP: 0033:0x7f58aaf8eba9 [ 682.536117][T18300] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 682.555709][T18300] RSP: 002b:00007f58abeaf038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 682.564106][T18300] RAX: ffffffffffffffda RBX: 00007f58ab1d5fa0 RCX: 00007f58aaf8eba9 [ 682.572062][T18300] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 00002000000003c0 [ 682.580041][T18300] RBP: 00007f58abeaf090 R08: 0000000000000000 R09: 0000000000000000 [ 682.587997][T18300] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 682.595971][T18300] R13: 00007f58ab1d6038 R14: 00007f58ab1d5fa0 R15: 00007ffc0bcfd698 [ 682.604040][T18300] [ 682.731103][T18313] FAULT_INJECTION: forcing a failure. [ 682.731103][T18313] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 682.855657][T18311] bond_slave_1: mtu less than device minimum [ 682.889962][T18313] CPU: 1 PID: 18313 Comm: syz.4.6183 Not tainted syzkaller #0 [ 682.897473][T18313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 682.907534][T18313] Call Trace: [ 682.910814][T18313] [ 682.913743][T18313] __dump_stack+0x21/0x24 [ 682.918076][T18313] dump_stack_lvl+0xee/0x150 [ 682.922663][T18313] ? __cfi_dump_stack_lvl+0x8/0x8 [ 682.927685][T18313] ? migrate_enable+0x19c/0x280 [ 682.932540][T18313] dump_stack+0x15/0x24 [ 682.936782][T18313] should_fail_ex+0x3d4/0x520 [ 682.941550][T18313] should_fail+0xb/0x10 [ 682.945712][T18313] should_fail_usercopy+0x1a/0x20 [ 682.950736][T18313] _copy_from_user+0x1e/0xc0 [ 682.955327][T18313] generic_map_update_batch+0x458/0x780 [ 682.960871][T18313] ? __cfi_generic_map_update_batch+0x10/0x10 [ 682.966938][T18313] ? bpf_map_do_batch+0x39c/0x620 [ 682.971959][T18313] ? __cfi_generic_map_update_batch+0x10/0x10 [ 682.978025][T18313] bpf_map_do_batch+0x48c/0x620 [ 682.982871][T18313] __sys_bpf+0x624/0x780 [ 682.987106][T18313] ? bpf_link_show_fdinfo+0x320/0x320 [ 682.992480][T18313] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 682.998294][T18313] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 683.004446][T18313] __x64_sys_bpf+0x7c/0x90 [ 683.008871][T18313] x64_sys_call+0x488/0x9a0 [ 683.013373][T18313] do_syscall_64+0x4c/0xa0 [ 683.017784][T18313] ? clear_bhb_loop+0x30/0x80 [ 683.022458][T18313] ? clear_bhb_loop+0x30/0x80 [ 683.027129][T18313] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 683.033017][T18313] RIP: 0033:0x7f039ff8eba9 [ 683.037434][T18313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 683.057039][T18313] RSP: 002b:00007f03a0ef1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 683.065457][T18313] RAX: ffffffffffffffda RBX: 00007f03a01d5fa0 RCX: 00007f039ff8eba9 [ 683.073425][T18313] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 683.081392][T18313] RBP: 00007f03a0ef1090 R08: 0000000000000000 R09: 0000000000000000 [ 683.089354][T18313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 683.097316][T18313] R13: 00007f03a01d6038 R14: 00007f03a01d5fa0 R15: 00007ffeeb9ae498 [ 683.105288][T18313] [ 683.928992][T18359] device syzkaller0 entered promiscuous mode [ 685.026332][T18382] device veth0_vlan left promiscuous mode [ 685.068027][T18382] device veth0_vlan entered promiscuous mode [ 685.082718][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 685.091087][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 685.098568][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 685.296919][T18390] bond_slave_1: mtu less than device minimum [ 688.215919][T18485] device sit0 entered promiscuous mode [ 688.893698][T18503] device veth0_vlan left promiscuous mode [ 688.911147][T18503] device veth0_vlan entered promiscuous mode [ 688.946420][T18521] device veth0_vlan left promiscuous mode [ 688.952991][T18521] device veth0_vlan entered promiscuous mode [ 688.968205][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 688.976835][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 688.984577][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 689.045484][T18529] bridge0: port 2(bridge_slave_1) entered disabled state [ 689.052716][T18529] bridge0: port 1(bridge_slave_0) entered disabled state [ 689.090779][T18530] device bridge_slave_1 left promiscuous mode [ 689.098462][T18530] bridge0: port 2(bridge_slave_1) entered disabled state [ 689.155838][T18530] device bridge_slave_0 left promiscuous mode [ 689.162087][T18530] bridge0: port 1(bridge_slave_0) entered disabled state [ 689.251904][T18538] device sit0 entered promiscuous mode [ 689.751755][T18583] device veth0_vlan left promiscuous mode [ 689.757860][T18583] device veth0_vlan entered promiscuous mode [ 689.767146][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 689.782673][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 689.790716][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 689.931105][T18597] syz.0.6284[18597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 689.931200][T18597] syz.0.6284[18597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 690.138447][T18592] device wg2 entered promiscuous mode [ 692.338270][T18638] FAULT_INJECTION: forcing a failure. [ 692.338270][T18638] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 692.537148][T18638] CPU: 0 PID: 18638 Comm: syz.2.6296 Not tainted syzkaller #0 [ 692.544646][T18638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 692.554710][T18638] Call Trace: [ 692.557988][T18638] [ 692.560910][T18638] __dump_stack+0x21/0x24 [ 692.565243][T18638] dump_stack_lvl+0xee/0x150 [ 692.569832][T18638] ? __cfi_dump_stack_lvl+0x8/0x8 [ 692.574850][T18638] ? migrate_enable+0x19c/0x280 [ 692.579705][T18638] dump_stack+0x15/0x24 [ 692.583843][T18638] should_fail_ex+0x3d4/0x520 [ 692.588506][T18638] should_fail+0xb/0x10 [ 692.592654][T18638] should_fail_usercopy+0x1a/0x20 [ 692.597685][T18638] _copy_from_user+0x1e/0xc0 [ 692.602275][T18638] generic_map_update_batch+0x458/0x780 [ 692.607813][T18638] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 692.613609][T18638] ? __cfi_generic_map_update_batch+0x10/0x10 [ 692.619666][T18638] ? __fdget+0x19c/0x220 [ 692.623891][T18638] ? __cfi_generic_map_update_batch+0x10/0x10 [ 692.629943][T18638] bpf_map_do_batch+0x48c/0x620 [ 692.634775][T18638] __sys_bpf+0x624/0x780 [ 692.638998][T18638] ? bpf_link_show_fdinfo+0x320/0x320 [ 692.644349][T18638] ? __cfi_sched_clock_cpu+0x10/0x10 [ 692.649619][T18638] __x64_sys_bpf+0x7c/0x90 [ 692.654023][T18638] x64_sys_call+0x488/0x9a0 [ 692.658513][T18638] do_syscall_64+0x4c/0xa0 [ 692.662908][T18638] ? clear_bhb_loop+0x30/0x80 [ 692.667573][T18638] ? clear_bhb_loop+0x30/0x80 [ 692.672233][T18638] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 692.678109][T18638] RIP: 0033:0x7fa44178eba9 [ 692.682514][T18638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 692.702100][T18638] RSP: 002b:00007fa442658038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 692.710495][T18638] RAX: ffffffffffffffda RBX: 00007fa4419d5fa0 RCX: 00007fa44178eba9 [ 692.718450][T18638] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 692.726403][T18638] RBP: 00007fa442658090 R08: 0000000000000000 R09: 0000000000000000 [ 692.734358][T18638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 692.742396][T18638] R13: 00007fa4419d6038 R14: 00007fa4419d5fa0 R15: 00007ffde1827388 [ 692.750353][T18638] [ 692.828225][T18645] FAULT_INJECTION: forcing a failure. [ 692.828225][T18645] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 692.829755][T18642] bond_slave_1: mtu less than device minimum [ 692.860099][T18648] bond_slave_1: mtu less than device minimum [ 692.866113][T18645] CPU: 1 PID: 18645 Comm: syz.4.6301 Not tainted syzkaller #0 [ 692.873590][T18645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 692.883637][T18645] Call Trace: [ 692.886901][T18645] [ 692.889818][T18645] __dump_stack+0x21/0x24 [ 692.894136][T18645] dump_stack_lvl+0xee/0x150 [ 692.898731][T18645] ? __cfi_dump_stack_lvl+0x8/0x8 [ 692.903824][T18645] ? migrate_enable+0x19c/0x280 [ 692.908657][T18645] dump_stack+0x15/0x24 [ 692.912792][T18645] should_fail_ex+0x3d4/0x520 [ 692.917647][T18645] should_fail+0xb/0x10 [ 692.921803][T18645] should_fail_usercopy+0x1a/0x20 [ 692.926846][T18645] _copy_from_user+0x1e/0xc0 [ 692.931428][T18645] generic_map_update_batch+0x4b1/0x780 [ 692.936965][T18645] ? __cfi_generic_map_update_batch+0x10/0x10 [ 692.943019][T18645] ? __fdget+0x19c/0x220 [ 692.947244][T18645] ? __cfi_generic_map_update_batch+0x10/0x10 [ 692.953299][T18645] bpf_map_do_batch+0x48c/0x620 [ 692.958132][T18645] __sys_bpf+0x624/0x780 [ 692.962355][T18645] ? bpf_link_show_fdinfo+0x320/0x320 [ 692.967709][T18645] ? __cfi_sched_clock_cpu+0x10/0x10 [ 692.972983][T18645] __x64_sys_bpf+0x7c/0x90 [ 692.977387][T18645] x64_sys_call+0x488/0x9a0 [ 692.981876][T18645] do_syscall_64+0x4c/0xa0 [ 692.986282][T18645] ? clear_bhb_loop+0x30/0x80 [ 692.990945][T18645] ? clear_bhb_loop+0x30/0x80 [ 692.995603][T18645] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 693.001476][T18645] RIP: 0033:0x7f039ff8eba9 [ 693.005873][T18645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 693.025463][T18645] RSP: 002b:00007f03a0ef1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 693.033858][T18645] RAX: ffffffffffffffda RBX: 00007f03a01d5fa0 RCX: 00007f039ff8eba9 [ 693.041814][T18645] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 693.049772][T18645] RBP: 00007f03a0ef1090 R08: 0000000000000000 R09: 0000000000000000 [ 693.057741][T18645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 693.065701][T18645] R13: 00007f03a01d6038 R14: 00007f03a01d5fa0 R15: 00007ffeeb9ae498 [ 693.073662][T18645] [ 693.529480][T18686] FAULT_INJECTION: forcing a failure. [ 693.529480][T18686] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 693.643390][T18686] CPU: 1 PID: 18686 Comm: syz.4.6316 Not tainted syzkaller #0 [ 693.650880][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 693.660932][T18686] Call Trace: [ 693.664210][T18686] [ 693.667134][T18686] __dump_stack+0x21/0x24 [ 693.671555][T18686] dump_stack_lvl+0xee/0x150 [ 693.676139][T18686] ? __cfi_dump_stack_lvl+0x8/0x8 [ 693.681156][T18686] ? kasan_check_range+0x13/0x290 [ 693.686196][T18686] dump_stack+0x15/0x24 [ 693.690361][T18686] should_fail_ex+0x3d4/0x520 [ 693.695045][T18686] should_fail+0xb/0x10 [ 693.699204][T18686] should_fail_usercopy+0x1a/0x20 [ 693.704227][T18686] _copy_from_user+0x1e/0xc0 [ 693.708815][T18686] generic_map_update_batch+0x4b1/0x780 [ 693.714368][T18686] ? __cfi_generic_map_update_batch+0x10/0x10 [ 693.720439][T18686] ? __fdget+0x19c/0x220 [ 693.724682][T18686] ? __cfi_generic_map_update_batch+0x10/0x10 [ 693.730953][T18686] bpf_map_do_batch+0x48c/0x620 [ 693.735828][T18686] __sys_bpf+0x624/0x780 [ 693.740069][T18686] ? bpf_link_show_fdinfo+0x320/0x320 [ 693.745528][T18686] ? __cfi_sched_clock_cpu+0x10/0x10 [ 693.750825][T18686] ? __bpf_trace_sys_enter+0x62/0x70 [ 693.756198][T18686] __x64_sys_bpf+0x7c/0x90 [ 693.760619][T18686] x64_sys_call+0x488/0x9a0 [ 693.765126][T18686] do_syscall_64+0x4c/0xa0 [ 693.769548][T18686] ? clear_bhb_loop+0x30/0x80 [ 693.774229][T18686] ? clear_bhb_loop+0x30/0x80 [ 693.778908][T18686] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 693.784801][T18686] RIP: 0033:0x7f039ff8eba9 [ 693.789211][T18686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 693.808826][T18686] RSP: 002b:00007f03a0ef1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 693.817245][T18686] RAX: ffffffffffffffda RBX: 00007f03a01d5fa0 RCX: 00007f039ff8eba9 [ 693.825224][T18686] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 693.833192][T18686] RBP: 00007f03a0ef1090 R08: 0000000000000000 R09: 0000000000000000 [ 693.841166][T18686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 693.849137][T18686] R13: 00007f03a01d6038 R14: 00007f03a01d5fa0 R15: 00007ffeeb9ae498 [ 693.857125][T18686] [ 693.966761][T18676] device veth0_vlan left promiscuous mode [ 694.029934][T18676] device veth0_vlan entered promiscuous mode [ 694.619904][T18675] device veth0_vlan left promiscuous mode [ 694.626040][T18675] device veth0_vlan entered promiscuous mode [ 694.634805][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 694.643225][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 694.663052][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 694.679906][T18695] device pim6reg1 entered promiscuous mode [ 694.785095][T18714] device sit0 entered promiscuous mode [ 694.981825][T18723] ªªªªªª: renamed from vlan0 [ 695.328269][T18745] device veth0_vlan left promiscuous mode [ 695.347524][T18745] device veth0_vlan entered promiscuous mode [ 696.142630][T18790] device veth0_vlan left promiscuous mode [ 696.171423][T18790] device veth0_vlan entered promiscuous mode [ 696.238243][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 696.261050][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 696.269606][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 696.393851][T18804] device veth0_vlan left promiscuous mode [ 696.538613][T18804] device veth0_vlan entered promiscuous mode [ 696.794680][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 696.831268][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 696.922882][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 698.006578][T18848] device pim6reg1 entered promiscuous mode [ 698.168085][T18850] FAULT_INJECTION: forcing a failure. [ 698.168085][T18850] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 698.230969][T18850] CPU: 1 PID: 18850 Comm: syz.2.6372 Not tainted syzkaller #0 [ 698.238465][T18850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 698.248520][T18850] Call Trace: [ 698.251799][T18850] [ 698.254723][T18850] __dump_stack+0x21/0x24 [ 698.259051][T18850] dump_stack_lvl+0xee/0x150 [ 698.263647][T18850] ? __cfi_dump_stack_lvl+0x8/0x8 [ 698.268656][T18850] ? migrate_enable+0x19c/0x280 [ 698.273498][T18850] dump_stack+0x15/0x24 [ 698.277643][T18850] should_fail_ex+0x3d4/0x520 [ 698.282309][T18850] should_fail+0xb/0x10 [ 698.286452][T18850] should_fail_usercopy+0x1a/0x20 [ 698.291463][T18850] _copy_from_user+0x1e/0xc0 [ 698.296042][T18850] generic_map_update_batch+0x458/0x780 [ 698.301577][T18850] ? __cfi_generic_map_update_batch+0x10/0x10 [ 698.307633][T18850] ? kasan_check_range+0x7f/0x290 [ 698.312645][T18850] ? __cfi_generic_map_update_batch+0x10/0x10 [ 698.318702][T18850] bpf_map_do_batch+0x48c/0x620 [ 698.323622][T18850] __sys_bpf+0x624/0x780 [ 698.327844][T18850] ? bpf_link_show_fdinfo+0x320/0x320 [ 698.333198][T18850] ? irqentry_exit+0x37/0x40 [ 698.337771][T18850] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 698.343559][T18850] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 698.349708][T18850] __x64_sys_bpf+0x7c/0x90 [ 698.354111][T18850] x64_sys_call+0x488/0x9a0 [ 698.358595][T18850] do_syscall_64+0x4c/0xa0 [ 698.362990][T18850] ? clear_bhb_loop+0x30/0x80 [ 698.367650][T18850] ? clear_bhb_loop+0x30/0x80 [ 698.372328][T18850] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 698.378201][T18850] RIP: 0033:0x7fa44178eba9 [ 698.382603][T18850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 698.402187][T18850] RSP: 002b:00007fa442658038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 698.410585][T18850] RAX: ffffffffffffffda RBX: 00007fa4419d5fa0 RCX: 00007fa44178eba9 [ 698.418540][T18850] RDX: 0000000000000038 RSI: 0000200000002340 RDI: 000000000000001a [ 698.426492][T18850] RBP: 00007fa442658090 R08: 0000000000000000 R09: 0000000000000000 [ 698.434442][T18850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 698.442395][T18850] R13: 00007fa4419d6038 R14: 00007fa4419d5fa0 R15: 00007ffde1827388 [ 698.450358][T18850] [ 700.794303][T18883] device veth0_vlan left promiscuous mode [ 700.893865][T18883] device veth0_vlan entered promiscuous mode [ 701.234203][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 701.277225][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 701.474006][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 702.613163][T18931] FAULT_INJECTION: forcing a failure. [ 702.613163][T18931] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 702.626769][T18931] CPU: 0 PID: 18931 Comm: syz.1.6397 Not tainted syzkaller #0 [ 702.634240][T18931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 702.644297][T18931] Call Trace: [ 702.647576][T18931] [ 702.650503][T18931] __dump_stack+0x21/0x24 [ 702.654829][T18931] dump_stack_lvl+0xee/0x150 [ 702.659411][T18931] ? __cfi_dump_stack_lvl+0x8/0x8 [ 702.664434][T18931] dump_stack+0x15/0x24 [ 702.668588][T18931] should_fail_ex+0x3d4/0x520 [ 702.673262][T18931] should_fail+0xb/0x10 [ 702.677413][T18931] should_fail_usercopy+0x1a/0x20 [ 702.682427][T18931] _copy_from_user+0x1e/0xc0 [ 702.687000][T18931] generic_map_update_batch+0x4b1/0x780 [ 702.692534][T18931] ? irqentry_exit+0x37/0x40 [ 702.697113][T18931] ? __cfi_generic_map_update_batch+0x10/0x10 [ 702.703165][T18931] ? __fdget+0x19c/0x220 [ 702.707405][T18931] ? __cfi_generic_map_update_batch+0x10/0x10 [ 702.713474][T18931] bpf_map_do_batch+0x48c/0x620 [ 702.718323][T18931] __sys_bpf+0x624/0x780 [ 702.722553][T18931] ? bpf_link_show_fdinfo+0x320/0x320 [ 702.727908][T18931] ? __cfi_sched_clock_cpu+0x10/0x10 [ 702.733194][T18931] __x64_sys_bpf+0x7c/0x90 [ 702.737598][T18931] x64_sys_call+0x488/0x9a0 [ 702.742085][T18931] do_syscall_64+0x4c/0xa0 [ 702.746481][T18931] ? clear_bhb_loop+0x30/0x80 [ 702.751141][T18931] ? clear_bhb_loop+0x30/0x80 [ 702.755802][T18931] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 702.761676][T18931] RIP: 0033:0x7f58aaf8eba9 [ 702.766073][T18931] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 702.785746][T18931] RSP: 002b:00007f58abeaf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 702.794144][T18931] RAX: ffffffffffffffda RBX: 00007f58ab1d5fa0 RCX: 00007f58aaf8eba9 [ 702.802117][T18931] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 702.810090][T18931] RBP: 00007f58abeaf090 R08: 0000000000000000 R09: 0000000000000000 [ 702.818217][T18931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 702.826192][T18931] R13: 00007f58ab1d6038 R14: 00007f58ab1d5fa0 R15: 00007ffc0bcfd698 [ 702.834157][T18931] [ 703.031456][T18936] bond_slave_1: mtu less than device minimum [ 703.101264][T18938] bond_slave_1: mtu less than device minimum [ 703.255201][T18942] FAULT_INJECTION: forcing a failure. [ 703.255201][T18942] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 703.282023][T18942] CPU: 1 PID: 18942 Comm: syz.1.6410 Not tainted syzkaller #0 [ 703.289540][T18942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 703.299599][T18942] Call Trace: [ 703.302876][T18942] [ 703.305804][T18942] __dump_stack+0x21/0x24 [ 703.310134][T18942] dump_stack_lvl+0xee/0x150 [ 703.314717][T18942] ? __cfi_dump_stack_lvl+0x8/0x8 [ 703.319738][T18942] dump_stack+0x15/0x24 [ 703.324061][T18942] should_fail_ex+0x3d4/0x520 [ 703.328741][T18942] should_fail+0xb/0x10 [ 703.332900][T18942] should_fail_usercopy+0x1a/0x20 [ 703.337923][T18942] _copy_from_user+0x1e/0xc0 [ 703.342510][T18942] generic_map_update_batch+0x458/0x780 [ 703.348059][T18942] ? __cfi_generic_map_update_batch+0x10/0x10 [ 703.354127][T18942] ? kasan_check_range+0x7f/0x290 [ 703.359154][T18942] ? __cfi_generic_map_update_batch+0x10/0x10 [ 703.365211][T18942] bpf_map_do_batch+0x48c/0x620 [ 703.370072][T18942] __sys_bpf+0x624/0x780 [ 703.374294][T18942] ? bpf_link_show_fdinfo+0x320/0x320 [ 703.379652][T18942] ? irqentry_exit+0x37/0x40 [ 703.384236][T18942] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 703.390050][T18942] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 703.396182][T18942] __x64_sys_bpf+0x7c/0x90 [ 703.400583][T18942] x64_sys_call+0x488/0x9a0 [ 703.405067][T18942] do_syscall_64+0x4c/0xa0 [ 703.409484][T18942] ? clear_bhb_loop+0x30/0x80 [ 703.414173][T18942] ? clear_bhb_loop+0x30/0x80 [ 703.418853][T18942] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 703.424753][T18942] RIP: 0033:0x7f58aaf8eba9 [ 703.429165][T18942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 703.448772][T18942] RSP: 002b:00007f58abeaf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 703.457193][T18942] RAX: ffffffffffffffda RBX: 00007f58ab1d5fa0 RCX: 00007f58aaf8eba9 [ 703.465169][T18942] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 703.473142][T18942] RBP: 00007f58abeaf090 R08: 0000000000000000 R09: 0000000000000000 [ 703.481147][T18942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 703.489115][T18942] R13: 00007f58ab1d6038 R14: 00007f58ab1d5fa0 R15: 00007ffc0bcfd698 [ 703.497084][T18942] [ 704.916077][T18988] tap0: tun_chr_ioctl cmd 2147767517 [ 705.475056][T18996] device veth0_vlan left promiscuous mode [ 705.481491][T18996] device veth0_vlan entered promiscuous mode [ 705.793667][T19022] device sit0 left promiscuous mode [ 705.859958][T19026] syz.3.6427[19026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 706.950583][T19056] device veth0_vlan left promiscuous mode [ 706.985192][T19056] device veth0_vlan entered promiscuous mode [ 706.997287][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 707.083103][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 707.130341][T18150] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 713.742665][T19114] bridge0: port 1(bridge_slave_0) entered blocking state [ 713.754792][T19114] bridge0: port 1(bridge_slave_0) entered disabled state [ 713.764705][T19114] device bridge_slave_0 entered promiscuous mode [ 713.772914][T19114] bridge0: port 2(bridge_slave_1) entered blocking state [ 713.780052][T19114] bridge0: port 2(bridge_slave_1) entered disabled state [ 713.787806][T19114] device bridge_slave_1 entered promiscuous mode [ 713.832041][T19141] device sit0 entered promiscuous mode [ 714.339218][T19146] bond_slave_1: mtu less than device minimum [ 714.410832][ T1107] device erspan0 left promiscuous mode [ 714.417795][ T1107] GPL: port 1(erspan0) entered disabled state [ 714.929513][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 715.022503][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 715.097147][ T1107] device veth0_vlan left promiscuous mode [ 715.400909][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 715.409426][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 715.421068][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 715.428120][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 715.442380][T19182] device sit0 left promiscuous mode [ 715.463895][T19184] device sit0 entered promiscuous mode [ 715.600267][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 715.608357][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 715.616947][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 715.626063][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 715.633183][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 715.789924][T19200] device veth1_macvtap left promiscuous mode [ 715.812542][T19197] device veth0_vlan left promiscuous mode [ 715.841908][T19197] device veth0_vlan entered promiscuous mode [ 715.961747][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 715.995855][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 716.066155][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 716.083768][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 716.122508][T19114] device veth0_vlan entered promiscuous mode [ 716.148025][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 716.167308][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 716.177674][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 716.185742][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 716.193827][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 716.201452][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 716.326463][T19114] device veth1_macvtap entered promiscuous mode [ 716.480500][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 716.488941][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 716.497529][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 716.565285][T19233] device sit0 entered promiscuous mode [ 716.665324][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 716.678997][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 716.728821][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 716.800562][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 717.425073][T19292] device sit0 left promiscuous mode [ 717.777986][T19293] device veth0_vlan left promiscuous mode [ 717.793223][T19293] device veth0_vlan entered promiscuous mode [ 718.569947][T19332] device veth0_vlan left promiscuous mode [ 718.583765][T19332] device veth0_vlan entered promiscuous mode [ 718.712082][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 718.757085][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 718.883823][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 719.677109][T19367] FAULT_INJECTION: forcing a failure. [ 719.677109][T19367] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 719.723832][T19367] CPU: 0 PID: 19367 Comm: syz.0.6537 Not tainted syzkaller #0 [ 719.731329][T19367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 719.741389][T19367] Call Trace: [ 719.744669][T19367] [ 719.747594][T19367] __dump_stack+0x21/0x24 [ 719.751924][T19367] dump_stack_lvl+0xee/0x150 [ 719.756511][T19367] ? __cfi_dump_stack_lvl+0x8/0x8 [ 719.761545][T19367] dump_stack+0x15/0x24 [ 719.765702][T19367] should_fail_ex+0x3d4/0x520 [ 719.770368][T19367] should_fail+0xb/0x10 [ 719.774516][T19367] should_fail_usercopy+0x1a/0x20 [ 719.779527][T19367] _copy_to_user+0x1e/0x90 [ 719.783925][T19367] simple_read_from_buffer+0xe9/0x160 [ 719.789283][T19367] proc_fail_nth_read+0x19a/0x210 [ 719.794299][T19367] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 719.799871][T19367] ? security_file_permission+0x94/0xb0 [ 719.805412][T19367] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 719.810953][T19367] vfs_read+0x26e/0x8c0 [ 719.815103][T19367] ? __cfi_vfs_read+0x10/0x10 [ 719.819764][T19367] ? __kasan_check_write+0x14/0x20 [ 719.824884][T19367] ? mutex_lock+0x8d/0x1a0 [ 719.829285][T19367] ? __cfi_mutex_lock+0x10/0x10 [ 719.834120][T19367] ? __fdget_pos+0x2cd/0x380 [ 719.838690][T19367] ? ksys_read+0x71/0x240 [ 719.843004][T19367] ksys_read+0x140/0x240 [ 719.847239][T19367] ? __cfi_ksys_read+0x10/0x10 [ 719.851995][T19367] ? __bpf_trace_sys_enter+0x62/0x70 [ 719.857277][T19367] __x64_sys_read+0x7b/0x90 [ 719.861811][T19367] x64_sys_call+0x2f/0x9a0 [ 719.866225][T19367] do_syscall_64+0x4c/0xa0 [ 719.870632][T19367] ? clear_bhb_loop+0x30/0x80 [ 719.875298][T19367] ? clear_bhb_loop+0x30/0x80 [ 719.879964][T19367] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 719.885859][T19367] RIP: 0033:0x7f9242d8d5bc [ 719.890257][T19367] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 719.909932][T19367] RSP: 002b:00007f92417f7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 719.918330][T19367] RAX: ffffffffffffffda RBX: 00007f9242fd5fa0 RCX: 00007f9242d8d5bc [ 719.926293][T19367] RDX: 000000000000000f RSI: 00007f92417f70a0 RDI: 0000000000000006 [ 719.934280][T19367] RBP: 00007f92417f7090 R08: 0000000000000000 R09: 0000000000000000 [ 719.942236][T19367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 719.950201][T19367] R13: 00007f9242fd6038 R14: 00007f9242fd5fa0 R15: 00007ffd7b8483e8 [ 719.958162][T19367] [ 720.647329][T19402] bridge0: port 2(bridge_slave_1) entered disabled state [ 720.657728][T19402] bridge0: port 1(bridge_slave_0) entered disabled state [ 720.806354][T19406] bridge0: port 2(bridge_slave_1) entered disabled state [ 720.816327][T19406] bridge0: port 1(bridge_slave_0) entered disabled state [ 720.967400][T19407] device bridge_slave_1 left promiscuous mode [ 720.976945][T19407] bridge0: port 2(bridge_slave_1) entered disabled state [ 721.053916][T19407] device bridge_slave_0 left promiscuous mode [ 721.077945][T19407] bridge0: port 1(bridge_slave_0) entered disabled state [ 721.152472][T19408] device bridge_slave_1 left promiscuous mode [ 721.159516][T19408] bridge0: port 2(bridge_slave_1) entered disabled state [ 721.167415][T19408] device bridge_slave_0 left promiscuous mode [ 721.173709][T19408] bridge0: port 1(bridge_slave_0) entered disabled state [ 721.824987][T19419] device syzkaller0 entered promiscuous mode [ 722.264444][T19438] FAULT_INJECTION: forcing a failure. [ 722.264444][T19438] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 722.369971][T19438] CPU: 0 PID: 19438 Comm: syz.4.6565 Not tainted syzkaller #0 [ 722.377460][T19438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 722.387515][T19438] Call Trace: [ 722.390797][T19438] [ 722.393732][T19438] __dump_stack+0x21/0x24 [ 722.398064][T19438] dump_stack_lvl+0xee/0x150 [ 722.402659][T19438] ? __cfi_dump_stack_lvl+0x8/0x8 [ 722.407682][T19438] dump_stack+0x15/0x24 [ 722.411832][T19438] should_fail_ex+0x3d4/0x520 [ 722.416509][T19438] should_fail+0xb/0x10 [ 722.420658][T19438] should_fail_usercopy+0x1a/0x20 [ 722.425680][T19438] _copy_from_user+0x1e/0xc0 [ 722.430267][T19438] generic_map_update_batch+0x458/0x780 [ 722.435816][T19438] ? __cfi_generic_map_update_batch+0x10/0x10 [ 722.441883][T19438] ? bpf_map_do_batch+0x3e4/0x620 [ 722.446927][T19438] ? __cfi_generic_map_update_batch+0x10/0x10 [ 722.453000][T19438] bpf_map_do_batch+0x48c/0x620 [ 722.457850][T19438] __sys_bpf+0x624/0x780 [ 722.462090][T19438] ? bpf_link_show_fdinfo+0x320/0x320 [ 722.467459][T19438] ? irqentry_exit+0x37/0x40 [ 722.472054][T19438] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 722.477868][T19438] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 722.484026][T19438] __x64_sys_bpf+0x7c/0x90 [ 722.488450][T19438] x64_sys_call+0x488/0x9a0 [ 722.492959][T19438] do_syscall_64+0x4c/0xa0 [ 722.497376][T19438] ? clear_bhb_loop+0x30/0x80 [ 722.502055][T19438] ? clear_bhb_loop+0x30/0x80 [ 722.506731][T19438] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 722.512620][T19438] RIP: 0033:0x7f039ff8eba9 [ 722.517018][T19438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 722.536614][T19438] RSP: 002b:00007f03a0ef1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 722.545022][T19438] RAX: ffffffffffffffda RBX: 00007f03a01d5fa0 RCX: 00007f039ff8eba9 [ 722.552985][T19438] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 722.560940][T19438] RBP: 00007f03a0ef1090 R08: 0000000000000000 R09: 0000000000000000 [ 722.568895][T19438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 722.576877][T19438] R13: 00007f03a01d6038 R14: 00007f03a01d5fa0 R15: 00007ffeeb9ae498 [ 722.584840][T19438] [ 724.281642][ T28] audit: type=1400 audit(1757548946.890:155): avc: denied { create } for pid=19478 comm="syz.0.6578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 724.700715][T19493] device syzkaller0 entered promiscuous mode [ 725.870926][T19531] device syzkaller0 entered promiscuous mode [ 726.222300][T19543] device veth1_macvtap left promiscuous mode [ 726.253345][T19543] device veth1_macvtap entered promiscuous mode [ 726.268898][T19543] device macsec0 entered promiscuous mode [ 726.504102][T19555] device syzkaller0 entered promiscuous mode [ 727.956858][T19605] FAULT_INJECTION: forcing a failure. [ 727.956858][T19605] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 727.972000][T19605] CPU: 1 PID: 19605 Comm: syz.1.6624 Not tainted syzkaller #0 [ 727.979486][T19605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 727.989549][T19605] Call Trace: [ 727.992830][T19605] [ 727.995761][T19605] __dump_stack+0x21/0x24 [ 728.000090][T19605] dump_stack_lvl+0xee/0x150 [ 728.004686][T19605] ? __cfi_dump_stack_lvl+0x8/0x8 [ 728.009710][T19605] dump_stack+0x15/0x24 [ 728.013860][T19605] should_fail_ex+0x3d4/0x520 [ 728.018540][T19605] should_fail+0xb/0x10 [ 728.022694][T19605] should_fail_usercopy+0x1a/0x20 [ 728.027715][T19605] _copy_from_user+0x1e/0xc0 [ 728.032300][T19605] generic_map_update_batch+0x4b1/0x780 [ 728.037849][T19605] ? __cfi_generic_map_update_batch+0x10/0x10 [ 728.043918][T19605] ? kasan_check_range+0x7f/0x290 [ 728.048944][T19605] ? __cfi_generic_map_update_batch+0x10/0x10 [ 728.055012][T19605] bpf_map_do_batch+0x48c/0x620 [ 728.059869][T19605] __sys_bpf+0x624/0x780 [ 728.064111][T19605] ? bpf_link_show_fdinfo+0x320/0x320 [ 728.069482][T19605] ? __cfi_sched_clock_cpu+0x10/0x10 [ 728.074772][T19605] __x64_sys_bpf+0x7c/0x90 [ 728.079192][T19605] x64_sys_call+0x488/0x9a0 [ 728.083695][T19605] do_syscall_64+0x4c/0xa0 [ 728.088098][T19605] ? clear_bhb_loop+0x30/0x80 [ 728.092760][T19605] ? clear_bhb_loop+0x30/0x80 [ 728.097424][T19605] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 728.103302][T19605] RIP: 0033:0x7f58aaf8eba9 [ 728.107877][T19605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 728.127478][T19605] RSP: 002b:00007f58abeaf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 728.135882][T19605] RAX: ffffffffffffffda RBX: 00007f58ab1d5fa0 RCX: 00007f58aaf8eba9 [ 728.143839][T19605] RDX: 0000000000000038 RSI: 0000200000002340 RDI: 000000000000001a [ 728.151798][T19605] RBP: 00007f58abeaf090 R08: 0000000000000000 R09: 0000000000000000 [ 728.159760][T19605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 728.167717][T19605] R13: 00007f58ab1d6038 R14: 00007f58ab1d5fa0 R15: 00007ffc0bcfd698 [ 728.175676][T19605] [ 728.430455][T19617] device sit0 entered promiscuous mode [ 728.642029][T19625] device syzkaller0 entered promiscuous mode [ 728.942244][T19636] device syzkaller0 entered promiscuous mode [ 729.521175][T19663] ip6_vti0: mtu greater than device maximum [ 729.536525][T19664] ip6_vti0: mtu greater than device maximum [ 729.840215][T19689] FAULT_INJECTION: forcing a failure. [ 729.840215][T19689] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 729.977778][T19689] CPU: 1 PID: 19689 Comm: syz.4.6654 Not tainted syzkaller #0 [ 729.985282][T19689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 729.995340][T19689] Call Trace: [ 729.998615][T19689] [ 730.001546][T19689] __dump_stack+0x21/0x24 [ 730.005873][T19689] dump_stack_lvl+0xee/0x150 [ 730.010460][T19689] ? __cfi_dump_stack_lvl+0x8/0x8 [ 730.015486][T19689] dump_stack+0x15/0x24 [ 730.019732][T19689] should_fail_ex+0x3d4/0x520 [ 730.024412][T19689] should_fail+0xb/0x10 [ 730.028592][T19689] should_fail_usercopy+0x1a/0x20 [ 730.033614][T19689] _copy_from_user+0x1e/0xc0 [ 730.038204][T19689] generic_map_update_batch+0x4b1/0x780 [ 730.043751][T19689] ? __cfi_generic_map_update_batch+0x10/0x10 [ 730.049817][T19689] ? bpf_map_do_batch+0x3e4/0x620 [ 730.054842][T19689] ? __cfi_generic_map_update_batch+0x10/0x10 [ 730.060910][T19689] bpf_map_do_batch+0x48c/0x620 [ 730.065763][T19689] __sys_bpf+0x624/0x780 [ 730.070002][T19689] ? bpf_link_show_fdinfo+0x320/0x320 [ 730.075379][T19689] __x64_sys_bpf+0x7c/0x90 [ 730.079813][T19689] x64_sys_call+0x488/0x9a0 [ 730.084319][T19689] do_syscall_64+0x4c/0xa0 [ 730.088730][T19689] ? clear_bhb_loop+0x30/0x80 [ 730.093410][T19689] ? clear_bhb_loop+0x30/0x80 [ 730.098091][T19689] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 730.103983][T19689] RIP: 0033:0x7f039ff8eba9 [ 730.108412][T19689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 730.128024][T19689] RSP: 002b:00007f03a0ef1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 730.136445][T19689] RAX: ffffffffffffffda RBX: 00007f03a01d5fa0 RCX: 00007f039ff8eba9 [ 730.144417][T19689] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 730.152391][T19689] RBP: 00007f03a0ef1090 R08: 0000000000000000 R09: 0000000000000000 [ 730.160372][T19689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 730.168348][T19689] R13: 00007f03a01d6038 R14: 00007f03a01d5fa0 R15: 00007ffeeb9ae498 [ 730.176326][T19689] [ 730.694251][T19706] device syzkaller0 entered promiscuous mode [ 731.040078][T19709] device veth0_vlan left promiscuous mode [ 731.068902][T19709] device veth0_vlan entered promiscuous mode [ 731.296107][T19719] device sit0 left promiscuous mode [ 731.513415][T19719] device sit0 entered promiscuous mode [ 731.979808][T19731] device veth0_vlan left promiscuous mode [ 731.987512][T19731] device veth0_vlan entered promiscuous mode [ 732.824845][T19755] device veth1_macvtap left promiscuous mode [ 732.899975][T19755] device macsec0 left promiscuous mode [ 733.441343][T19774] device veth0_vlan left promiscuous mode [ 733.698526][T19774] device veth0_vlan entered promiscuous mode [ 734.041756][T19798] device sit0 entered promiscuous mode [ 734.254583][T19792] device sit0 left promiscuous mode [ 735.566024][T19849] device veth0_vlan left promiscuous mode [ 735.576987][T19849] device veth0_vlan entered promiscuous mode [ 735.597446][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 735.627558][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 735.781712][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 736.094246][T19874] FAULT_INJECTION: forcing a failure. [ 736.094246][T19874] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 736.129818][T19874] CPU: 0 PID: 19874 Comm: syz.0.6717 Not tainted syzkaller #0 [ 736.137314][T19874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 736.147389][T19874] Call Trace: [ 736.150674][T19874] [ 736.153609][T19874] __dump_stack+0x21/0x24 [ 736.157940][T19874] dump_stack_lvl+0xee/0x150 [ 736.162536][T19874] ? __cfi_dump_stack_lvl+0x8/0x8 [ 736.167563][T19874] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 736.173728][T19874] dump_stack+0x15/0x24 [ 736.177892][T19874] should_fail_ex+0x3d4/0x520 [ 736.182572][T19874] should_fail+0xb/0x10 [ 736.186730][T19874] should_fail_usercopy+0x1a/0x20 [ 736.191758][T19874] _copy_from_user+0x1e/0xc0 [ 736.196351][T19874] generic_map_update_batch+0x458/0x780 [ 736.201895][T19874] ? __cfi_generic_map_update_batch+0x10/0x10 [ 736.207964][T19874] ? __fdget+0x19c/0x220 [ 736.212195][T19874] ? __cfi_generic_map_update_batch+0x10/0x10 [ 736.218253][T19874] bpf_map_do_batch+0x48c/0x620 [ 736.223090][T19874] __sys_bpf+0x624/0x780 [ 736.227314][T19874] ? __kasan_check_read+0x11/0x20 [ 736.232324][T19874] ? bpf_link_show_fdinfo+0x320/0x320 [ 736.237682][T19874] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 736.243470][T19874] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 736.249636][T19874] __x64_sys_bpf+0x7c/0x90 [ 736.254042][T19874] x64_sys_call+0x488/0x9a0 [ 736.258529][T19874] do_syscall_64+0x4c/0xa0 [ 736.263472][T19874] ? clear_bhb_loop+0x30/0x80 [ 736.268135][T19874] ? clear_bhb_loop+0x30/0x80 [ 736.272799][T19874] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 736.278674][T19874] RIP: 0033:0x7f9242d8eba9 [ 736.283070][T19874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 736.302658][T19874] RSP: 002b:00007f92417f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 736.311055][T19874] RAX: ffffffffffffffda RBX: 00007f9242fd5fa0 RCX: 00007f9242d8eba9 [ 736.319010][T19874] RDX: 0000000000000038 RSI: 0000200000002340 RDI: 000000000000001a [ 736.326961][T19874] RBP: 00007f92417f7090 R08: 0000000000000000 R09: 0000000000000000 [ 736.334924][T19874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 736.342895][T19874] R13: 00007f9242fd6038 R14: 00007f9242fd5fa0 R15: 00007ffd7b8483e8 [ 736.350853][T19874] [ 736.538526][T19883] device sit0 entered promiscuous mode [ 737.672481][T19909] device veth0_vlan left promiscuous mode [ 737.678474][T19909] device veth0_vlan entered promiscuous mode [ 737.947275][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 737.990432][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 737.998391][ T2956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 738.046802][T19917] device syzkaller0 entered promiscuous mode [ 739.150447][T19949] ------------[ cut here ]------------ [ 739.155975][T19949] WARNING: CPU: 0 PID: 19949 at kernel/events/core.c:6550 perf_pending_task+0x3cd/0x4e0 [ 739.165771][T19949] Modules linked in: [ 739.169717][T19949] CPU: 0 PID: 19949 Comm: syz.4.6737 Not tainted syzkaller #0 [ 739.177170][T19949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 739.187399][T19949] RIP: 0010:perf_pending_task+0x3cd/0x4e0 [ 739.193218][T19949] Code: 41 5f 5d c3 e8 e4 0b d8 ff 43 80 3c 2f 00 0f 85 d0 fe ff ff e9 d3 fe ff ff e8 cf 0b d8 ff e8 16 7d 68 ff eb 83 e8 c3 0b d8 ff <0f> 0b e9 a2 fe ff ff e8 b7 0b d8 ff 48 c7 c7 00 3e 03 87 4c 89 f6 [ 739.212886][T19949] RSP: 0018:ffffc90000bb78d8 EFLAGS: 00010293 [ 739.218963][T19949] RAX: ffffffff8197fd9d RBX: ffff888129d3fba0 RCX: ffff88812af93cc0 [ 739.226967][T19949] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 739.234983][T19949] RBP: ffffc90000bb7910 R08: 0000000000000004 R09: 0000000000000003 [ 739.242996][T19949] R10: 0000000000000000 R11: ffffffff8197f9d0 R12: ffff88812af93cc0 [ 739.250997][T19949] R13: ffff888131f814c8 R14: ffff888129d3fa60 R15: 1ffff110253a7f4c [ 739.258976][T19949] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 739.267934][T19949] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 739.274548][T19949] CR2: 00007f03a0ef1990 CR3: 0000000129a40000 CR4: 00000000003506b0 [ 739.282555][T19949] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 739.288544][ T28] audit: type=1400 audit(1757548961.890:156): avc: denied { read } for pid=19973 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 739.293663][T19949] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 739.293678][T19949] Call Trace: [ 739.293683][T19949] [ 739.293691][T19949] task_work_run+0x1db/0x240 [ 739.335085][T19949] ? __cfi_task_work_run+0x10/0x10 [ 739.340434][T19949] ? __kasan_check_write+0x14/0x20 [ 739.345787][T19949] do_exit+0xa25/0x2650 [ 739.350009][T19949] ? __cfi_do_exit+0x10/0x10 [ 739.354609][T19949] ? rcu_read_unlock_special+0xab/0x480 [ 739.360194][T19949] ? irqentry_exit+0x37/0x40 [ 739.364793][T19949] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 739.370630][T19949] ? __rcu_read_unlock+0xa0/0xa0 [ 739.375586][T19949] ? cgroup_freezing+0x86/0xb0 [ 739.380497][T19949] do_group_exit+0x210/0x2d0 [ 739.385107][T19949] ? __kasan_check_write+0x14/0x20 [ 739.390259][T19949] get_signal+0x13b5/0x1520 [ 739.394780][T19949] arch_do_signal_or_restart+0xb0/0x1030 [ 739.400463][T19949] ? kernel_clone+0x254/0x810 [ 739.405149][T19949] ? __cfi_kernel_clone+0x10/0x10 [ 739.410220][T19949] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 739.416387][T19949] ? __x64_sys_clone+0x168/0x1b0 [ 739.421431][T19949] exit_to_user_mode_loop+0x7a/0xb0 [ 739.426634][T19949] exit_to_user_mode_prepare+0x5a/0xa0 [ 739.432130][T19949] syscall_exit_to_user_mode+0x1a/0x30 [ 739.437596][T19949] do_syscall_64+0x58/0xa0 [ 739.442064][T19949] ? clear_bhb_loop+0x30/0x80 [ 739.446748][T19949] ? clear_bhb_loop+0x30/0x80 [ 739.451461][T19949] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 739.457357][T19949] RIP: 0033:0x7f039ff8eba9 [ 739.461812][T19949] Code: Unable to access opcode bytes at 0x7f039ff8eb7f. [ 739.468826][T19949] RSP: 002b:00007f03a0ef0fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 739.477318][T19949] RAX: fffffffffffffff2 RBX: 00007f03a01d5fa0 RCX: 00007f039ff8eba9 [ 739.485309][T19949] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020083400 [ 739.493296][T19949] RBP: 00007f03a0011e19 R08: 0000000000000000 R09: 0000000000000000 [ 739.501310][T19949] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 739.509281][T19949] R13: 00007f03a01d6038 R14: 00007f03a01d5fa0 R15: 00007ffeeb9ae498 [ 739.517282][T19949] [ 739.520312][T19949] ---[ end trace 0000000000000000 ]--- Stopping sshd: stopped /usr/sbin/sshd (pid 194) OK Stopping crond: stopped /usr/sbin/crond (pid 187) OK [ 741.055311][T20010] syz.2.6755[20010] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 741.055403][T20010] syz.2.6755[20010] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 741.186794][T20010] device wg2 entered promiscuous mode Stopping dhcpcd... stopped /sbin/dhcpcd (pid 141) [ 741.267177][ T28] audit: type=1400 audit(1757548963.870:157): avc: denied { search } for pid=20025 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 742.204325][T20046] FAULT_INJECTION: forcing a failure. [ 742.204325][T20046] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 742.238299][T20046] CPU: 1 PID: 20046 Comm: syz.4.6763 Tainted: G W syzkaller #0 [ 742.247268][T20046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 742.257325][T20046] Call Trace: [ 742.260604][T20046] [ 742.263537][T20046] __dump_stack+0x21/0x24 [ 742.267864][T20046] dump_stack_lvl+0xee/0x150 [ 742.272446][T20046] ? __cfi_dump_stack_lvl+0x8/0x8 [ 742.277463][T20046] dump_stack+0x15/0x24 [ 742.281611][T20046] should_fail_ex+0x3d4/0x520 [ 742.286296][T20046] should_fail+0xb/0x10 [ 742.290459][T20046] should_fail_usercopy+0x1a/0x20 [ 742.295483][T20046] _copy_from_user+0x1e/0xc0 [ 742.300077][T20046] generic_map_update_batch+0x458/0x780 [ 742.305633][T20046] ? __cfi_generic_map_update_batch+0x10/0x10 [ 742.311700][T20046] ? __fdget+0x19c/0x220 [ 742.315939][T20046] ? __cfi_generic_map_update_batch+0x10/0x10 [ 742.322015][T20046] bpf_map_do_batch+0x48c/0x620 [ 742.326861][T20046] __sys_bpf+0x624/0x780 [ 742.331102][T20046] ? bpf_link_show_fdinfo+0x320/0x320 [ 742.336466][T20046] ? __cfi_sched_clock_cpu+0x10/0x10 [ 742.341749][T20046] __x64_sys_bpf+0x7c/0x90 [ 742.346166][T20046] x64_sys_call+0x488/0x9a0 [ 742.350662][T20046] do_syscall_64+0x4c/0xa0 [ 742.355070][T20046] ? clear_bhb_loop+0x30/0x80 [ 742.359748][T20046] ? clear_bhb_loop+0x30/0x80 [ 742.364418][T20046] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 742.370304][T20046] RIP: 0033:0x7f039ff8eba9 [ 742.374710][T20046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 742.394306][T20046] RSP: 002b:00007f03a0ef1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 742.402718][T20046] RAX: ffffffffffffffda RBX: 00007f03a01d5fa0 RCX: 00007f039ff8eba9 [ 742.410686][T20046] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 742.418650][T20046] RBP: 00007f03a0ef1090 R08: 0000000000000000 R09: 0000000000000000 [ 742.426614][T20046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 742.434584][T20046] R13: 00007f03a01d6038 R14: 00007f03a01d5fa0 R15: 00007ffeeb9ae498 [ 742.442645][T20046] [ 742.562300][ T28] audit: type=1400 audit(1757548965.170:158): avc: denied { write } for pid=142 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 742.605195][ T28] audit: type=1400 audit(1757548965.170:159): avc: denied { remove_name } for pid=142 comm="dhcpcd" name="sock" dev="tmpfs" ino=491 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 742.634937][ T28] audit: type=1400 audit(1757548965.170:160): avc: denied { unlink } for pid=142 comm="dhcpcd" name="sock" dev="tmpfs" ino=491 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 [ 742.662208][T20050] device veth0_vlan left promiscuous mode [ 742.670359][T20050] device veth0_vlan entered promiscuous mode [ 742.684171][ T28] audit: type=1400 audit(1757548965.190:161): avc: denied { unlink } for pid=142 comm="dhcpcd" name="pid" dev="tmpfs" ino=490 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 742.869362][T20068] bond_slave_1: mtu less than device minimum OK Stopping iptables: [ 743.087072][ T28] audit: type=1400 audit(1757548965.690:162): avc: denied { search } for pid=20077 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 743.198233][ T28] audit: type=1400 audit(1757548965.790:163): avc: denied { write } for pid=20077 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 743.268007][ T28] audit: type=1400 audit(1757548965.790:164): avc: denied { add_name } for pid=20077 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 743.295133][ T28] audit: type=1400 audit(1757548965.790:165): avc: denied { create } for pid=20077 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 Stopping system message bus: done [ 746.304710][T20139] device veth0_vlan left promiscuous mode [ 746.315159][T20139] device veth0_vlan entered promiscuous mode [ 746.379048][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 746.404184][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready Stopping klogd: [ 746.497428][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready OK Stopping acpid: [ 746.834129][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 746.834144][ T28] audit: type=1400 audit(1757548969.440:168): avc: denied { write } for pid=88 comm="acpid" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 747.062567][T20172] device sit0 left promiscuous mode [ 747.099976][ T28] audit: type=1400 audit(1757548969.440:169): avc: denied { remove_name } for pid=88 comm="acpid" name="acpid.pid" dev="tmpfs" ino=7 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 747.356369][ T28] audit: type=1400 audit(1757548969.440:170): avc: denied { unlink } for pid=88 comm="acpid" name="acpid.pid" dev="tmpfs" ino=7 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 OK [ 749.657318][T20179] device sit0 entered promiscuous mode Stopping syslogd: stopped /sbin/syslogd (pid 85) OK [ 750.247878][ T28] audit: type=1400 audit(1757548972.850:171): avc: denied { create } for pid=20211 comm="syz.3.6808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 umount: can't remount debugfs read-only [ 750.361430][ T28] audit: type=1400 audit(1757548972.850:172): avc: denied { module_request } for pid=20211 comm="syz.3.6808" kmod="net-pf-33" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only The system is going down NOW! Connection to 10.128.0.40 closed by remote host. Sent SIGTERM to[ 750.823112][ T28] audit: type=1400 audit(1757548973.400:173): avc: denied { write } for pid=275 comm="syz-executor" path="pipe:[15421]" dev="pipefs" ino=15421 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 Sent SIGKILL to all processes Requesting system poweroff [ 752.092499][ T43] device veth0_vlan left promiscuous mode [ 752.098519][ T43] device veth0_vlan left promiscuous mode [ 752.104758][ T43] device veth1_macvtap left promiscuous mode [ 752.110835][ T43] device veth0_vlan left promiscuous mode [ 752.116926][ T43] device veth0_vlan left promiscuous mode [ 752.858859][T20235] kvm: exiting hardware virtualization [ 752.866399][T20235] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 752.873188][T20235] ACPI: PM: Preparing to enter system sleep state S5 [ 752.880630][T20235] reboot: Power down serialport: VM disconnected.