last executing test programs: 3.444620949s ago: executing program 2 (id=14268): bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xf, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="850000000f000000630a00ff00000000550200000000000095000000000000fe6f4a70e2ae5453852a331a3ce97818b8045d00d90d3f25134eff3b23e715d1517c770266a94925a37827db7c48109b54bfcc41f21be348f6f6421c1fcf993bb3b2e264f7aebe1c324b705916dd5e67ee0b013d21c937164f66bc8095fca701d61506e26498bd99492ab2275079c152d180", @ANYRES32, @ANYBLOB="000000000000000005000000000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x8, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x66, 0x2, 0x8}, 0x50) close(0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000140), &(0x7f0000000600)=""/142, 0x2}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9e, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0xc2, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x48, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f00000000c0)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102032908fc0000000000000000ff0000ac14140a000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x9, 0xfff, 0x80000000, 0xa000, r2, 0x4, '\x00', r3, r4, 0x5, 0x5, 0x4, 0xa, @value=r6}, 0x50) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f00000006c0)={'veth1_to_bridge\x00'}) 3.129556764s ago: executing program 4 (id=14278): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000040), &(0x7f0000000200)='%+9llu \x00'}, 0x20) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x800000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b4080000000000000000008510000002000000b7000000000000ffff00c2000000000095000012"], 0x0, 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_skb}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="1c00000000000300000000000000010045"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0xdf, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000780)=ANY=[@ANYBLOB="0100000016000000b40000007f"], 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0xc40, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f00000006c0)={'syzkaller0\x00', @multicast}) write$cgroup_subtree(r5, &(0x7f0000000380)=ANY=[], 0xe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @generic={0x79, 0x0, 0x0, 0x223}, @initr0, @exit={0x95, 0x0, 0x70}]}, &(0x7f00000000c0)='GPL\x00'}, 0x80) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="180800000000000000000000000000008510"], 0x0, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x20a5, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x23) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8f, 0x9c}, [], {0x95, 0x0, 0xd00}}, &(0x7f0000000040)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x8f}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xd, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x6, 0x0, 0xa, 0x9, 0x0, 0x7}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x0, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xfff4, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) 2.588675221s ago: executing program 2 (id=14283): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000fe0000008500000010000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000ff030000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0500000005000000fd09000085"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003f0000003f0000000a0000000d0000000200000f0300000003000000b61c00000ff16ef005000000f0ffffff050000008314d7100000000000001008080100000000003061612e00615f2e00"/98], &(0x7f0000000540)=""/216, 0x62, 0xd8, 0x0, 0x3}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x2f48, '\x00', r2, r3, 0x4, 0x3}, 0x50) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r1}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1}, 0x20) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f00000005c0), 0x6c, r1}, 0x38) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 2.557975473s ago: executing program 4 (id=14284): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x31}, 0x94) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57b00000000000000000104"], 0xfe1b) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0d2e0020fdcc6177d93790ff", @ANYRES32, @ANYBLOB="0800000000000000950000000000000045"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB=':$'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='.'}, 0x30) (async) r1 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x3, 0xf5, 0x6, 0xc, 0x0, 0x2b6fe839, 0x40000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x7f, 0xe}, 0x8, 0x1, 0x6, 0x6, 0x4, 0x1, 0x2, 0x0, 0x7, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 2.437092129s ago: executing program 4 (id=14285): perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16, @ANYRES32, @ANYRESHEX=r0], 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x5, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000074f6967d00000000000000180100002020702500000000002020207baaf8ff00000000bda100000000000027010000f8ffffffb702000008000000b7030000000000002500000006000000be91000000000000b502ecffffff00008500000005000000b70000000000000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='cpu&\t\t') r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="07000000040000001800010042a0000000000000", @ANYRES32, @ANYBLOB="010400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r4}, &(0x7f0000000000), &(0x7f00000000c0)=r0}, 0x20) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c230000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000050000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @fallback, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0xf5010000}, 0x6d) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/14], 0x22) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r7, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) ioctl$TUNSETOFFLOAD(r5, 0x40047440, 0xf0ff1f00000000) 2.171266613s ago: executing program 2 (id=14288): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x11, 0x0, &(0x7f00000003c0)=""/17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000100)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41100, 0x50, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1313f, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x10, 0x749}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) ioctl$TUNGETVNETLE(r1, 0x4010744d, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x6, 0x4, 0x8, 0xb}, 0x50) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b70300000000ff80850000002d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x3, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000002000000000000000100008018150000", @ANYRES32, @ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000711809000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @cgroup_sock_addr=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 2.159244782s ago: executing program 2 (id=14290): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x7, 0x1, 0x0, 0xf, 0x3, [{0x3, 0x0, 0xfffefffc}], '\x00\x00\x00'}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], ']'}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f00000002c0)=""/254, 0x4a, 0xfe, 0x1}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x2}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000100)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000000300)=r6) write$cgroup_devices(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) r7 = openat$cgroup_ro(r0, &(0x7f00000006c0)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_subtree(r7, &(0x7f00000001c0)=ANY=[@ANYBLOB="2c6e4e745f707269d300"], 0xa) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 1.723487444s ago: executing program 2 (id=14295): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1eaa00000000000079105900000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x94) 1.482165117s ago: executing program 0 (id=14302): r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_pressure(r0, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x11, 0xab, 0x1, 0x2, 0x0, 0x8000000000000001, 0x10000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={&(0x7f0000000140), 0x2}, 0xd04, 0x4, 0xd, 0x9, 0x0, 0x6, 0xfb4e, 0x0, 0x7ff, 0x0, 0x2}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x9) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0xb, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x94, 0x0, 0x0, 0x0, 0x1}, [@btf_id={0x18, 0xf, 0x3, 0x0, 0x3}, @tail_call, @alu={0x4, 0x1, 0xc, 0x1, 0x5, 0x30, 0x4}]}, &(0x7f0000000280)='syzkaller\x00', 0x7, 0x7, &(0x7f00000002c0)=""/7, 0x41000, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x7, 0x7}, 0x10, 0xc772, 0xffffffffffffffff, 0x1, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000380)=[{0x1, 0x3, 0x8, 0x5}], 0x10, 0x8}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f00000004c0)='io.latency\x00', 0x2, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000500), 0x2, 0x0) openat$cgroup_freezer_state(r4, &(0x7f0000000540), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x1, 0x7fff, 0x7, 0x28100, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2, 0x4}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000007c0)=[0x0], &(0x7f0000000800)=[0x0], 0x0, 0x4b, &(0x7f0000000840)=[{}], 0x8, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x1f, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r3, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000b00)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000b40)=[0x0], &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, &(0x7f0000000bc0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000c00), &(0x7f0000000c40), 0x8, 0x8b, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x7, 0x11, &(0x7f0000000600)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x60}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], &(0x7f00000006c0)='GPL\x00', 0xdc4, 0x7d, &(0x7f0000000700)=""/125, 0x41000, 0x20, '\x00', r7, @fallback=0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000a80)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0xf, 0xffff, 0xb}, 0x10, r9, r3, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000f40)={{0x1, 0xffffffffffffffff}, &(0x7f0000000ec0), &(0x7f0000000f00)=r10}, 0x20) write$cgroup_type(r1, &(0x7f0000000f80), 0x9) openat$cgroup_freezer_state(r4, &(0x7f0000000fc0), 0x2, 0x0) write$cgroup_subtree(r5, 0xfffffffffffffffe, 0x0) r12 = openat$cgroup_procs(r4, &(0x7f0000001000)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r12, &(0x7f0000001040), 0x12) r13 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001100)=@o_path={&(0x7f00000010c0)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001140)=@generic={&(0x7f0000001080)='./file0\x00', r13}, 0x18) r14 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000011c0)=@generic={&(0x7f0000001180)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001300)={@cgroup=r0, 0x14, 0x1, 0xb, &(0x7f0000001200)=[0x0], 0x1, 0x0, &(0x7f0000001240)=[0x0], &(0x7f0000001280)=[0x0, 0x0], &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r16 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001540)=@bpf_ext={0x1c, 0x9, &(0x7f0000001380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x6230}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r11}}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x2}]}, &(0x7f0000001400)='syzkaller\x00', 0xcb, 0x1e, &(0x7f0000001440)=""/30, 0x40f00, 0x1, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001480)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000014c0)={0x4, 0x2, 0x9, 0x1}, 0x10, 0x202d6, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000001500)=[{0x5, 0x2, 0x2, 0xb}], 0x10, 0x80000}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001340)={@fallback=r0, r3, 0x0, 0x6, r14, @void, @value=r16, @void, @void, r15}, 0x20) perf_event_open(&(0x7f0000001600)={0x4, 0x80, 0x9, 0x1, 0x2, 0xff, 0x0, 0x20000000000, 0x1002, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x9f, 0x8}, 0x1024, 0x3, 0x1000, 0x0, 0x8, 0x5, 0xffff, 0x0, 0x5, 0x0, 0x1}, 0x0, 0x9, 0xffffffffffffffff, 0x0) 1.481668176s ago: executing program 0 (id=14303): perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x33}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xe4}, 0x70) 1.481226406s ago: executing program 0 (id=14304): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2a}]}, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000080180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0xffa4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xb5}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='GPL\x00') ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xe3) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x3, 0xffffffff, 0x0, 0x7, 0x800000, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x1, 0x40, 0x5, 0x41}, 0x50) close(0x3) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x7, 0x1, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.132856154s ago: executing program 0 (id=14311): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x4800) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001b40)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_clone(0xe0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 1.078200477s ago: executing program 1 (id=14312): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xc, 0x7}, 0x1450, 0x2000000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xf}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_freezer_state(r2, &(0x7f0000000340)='FREEZING\x00', 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x945, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147}, 0x94) 982.247551ms ago: executing program 4 (id=14313): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0xf, &(0x7f00000002c0)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x14}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x1, 0x2000000}}, [], {{0x7, 0x1, 0x7, 0x8}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 946.088443ms ago: executing program 1 (id=14314): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x8}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r0}, 0xc) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb3, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000, 0x1d3}, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$cgroup_devices(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1e0408003c5c980128876360864668f82ffdd569d2f6b9aa859f6e2ee7a7c5b1474ead5e30b5e033ff11edf1c5ffc733d2acb165fe"], 0xffdd) 864.783267ms ago: executing program 2 (id=14315): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x53, 0x5, 0x0, 0x0, 0x0, 0x4, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x0, @perf_config_ext={0x3, 0x8001}, 0x0, 0x2e, 0x4, 0x3, 0x2, 0xfffffffe, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair(0x1e, 0x0, 0x1, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001b0000000000000061197c00000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) 863.830587ms ago: executing program 4 (id=14316): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1401000000000000180000000000000000000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9c, &(0x7f0000000000)=""/156}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f00000004c0)=ANY=[], 0xfdef) mkdirat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x5, 0xf, &(0x7f0000000000)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x800}, {{}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 817.951479ms ago: executing program 3 (id=14317): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x9, 0x8, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, @perf_config_ext={0x200000101, 0x100000001}, 0x4010, 0x4000000000000, 0xfffffffe, 0xa2ed0d70c7c787cf, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0xfffffffc, 0x0, 0x1}, 0xffffffffffffffff, 0x200007, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x72, 0x0, 0xf3, 0x6, 0x0, 0x45e, 0xd006e1258c48358c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0xc20, 0xc8, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x2}, 0x0, 0x10, r2, 0x9) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63"], 0xfdef) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x40, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xd000, 0x0, 0xfffffffa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0xffffffffffffffd6, 0x0, 0x40, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x2, 0x4}, 0xa100, 0xc8, 0x1000003, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x7, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63f580fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0xfe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x100, 0x7}, 0x481a, 0x0, 0x0, 0x7, 0x0, 0x0, 0xf792, 0x0, 0xffffffff, 0x0, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[], 0xfdef) 773.366511ms ago: executing program 3 (id=14318): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63f580fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r2, &(0x7f00000004c0)=ANY=[], 0xfdef) 712.873425ms ago: executing program 1 (id=14319): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd8, &(0x7f0000000380)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xf8, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000001d80)=ANY=[@ANYBLOB="b70200001a000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b70600007fffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000002b000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e6185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946e0ebc622003b538dfd8e012e79578e51bc5f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f659cb132b803000000661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7b148ba532e6ea09c346dfebd38608b32a0080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c61a137462c7f2539479f49d4eb2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e14861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc16e7c337642d3e5a815232f5e16b089f37b3591a15c0a9be6eb18208404c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b74cd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f50714600fb6241c6e955031795b2c2f56411e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c0977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6040099d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663dd472021d202eedd005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe3594d4a3f2239cfe00000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed180d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35f267632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e80339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd52364600000000000000000000000000000000000000000000dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000a5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f3390343c12a851810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f314001a62863f6e04b4506ac2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab79e609c57a2a7332f4d8764c302ccd5aac114482b619fca4d97a0ae75ccf11e29a854380e2b4bb9905a1517ec40bb3fa44f9959bad67ccaba76408da35e9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff17320adda5867947257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a927de6f4c09f4b742e037381c85d2ec7bb2a8152f0d6a99a0370e0cbd65744eb2efd7b65f04aa7e72588757b9612bb4253a63bb303c0c68a07f115d104f2007237a4f771416741bfd63fdfe3ae6f8bea755d8b7202c2bbae137dc1c3cf40db74a4c1c219d8ddec8f91dae2cdea1353fe062830fa1d233296e99d8317872257e154665485e7f31cdbfbf435517faf93015b57417d84b8bc8662e097d5ba55000048e150695ffae3a676555b10da11751865126d19336116a1e58ab727dda6b343cc97f9479136a66f552abf8fe3d134f6d69df1cf7800b4bda4db5e68aaccf44d24e09f8a769e3ae7bf246673f15e3d1adae4384bdb7cd30a33e30466b421feb96006c810fd3830a1c75af2580727ffc699d2b04f476acc21419fad9b1baec88974da2db29b80859bde08b85c8086e4b7f1fd568042ad5396d3179c71b1dc43291e450ce9b8d7d80fcb44966d7ad4691a37870000000000000000000000000000000000000000000000000000000000000000000083a5765d06da91165d24bc316607e2d69344aa1c07ff7cd7bc3d17f122478b6e81077782b9c298edc2546045feff90e7aa7dc1a869fa5551b873e2c838e979e033b7707df75b93cf5b8d25242741a88f2d54a7107375b25911aa11efa3a4f87fc14f180e353615b3cb9a5cf5ea843014a277c3694a5a83266f73ef039dd739187923715548d58ff43be997e357e0cbed29faef19c0082e26fb867bf0ff0000000000000000000000a0616252abda1102c3eee13eddef0275f21752ee474e32d790ae1f3df77e303ae1968c2a4419d1ca13b97b2c3123ab5b8473b880644e6acfe1d346d1528262c6e91f38029ec24eeb4fe5c1b3726bcfd386ba153fed11692170e5a09432bd02fa9dba861ecad4dbf61a93733a21aeff5f541b8f78bccbf1ac0000000000000000000000145aaaa62ff74b216b2977e7b9261824f663cea60ec6e0fa03bd596cec6d12316c8ed147d4cdd140857444c27c1946b1afcd4ec260694cb71e421744cf1f860840b0decf9be35aeb02d1bf6137b3189edb2d21557e6804ed52305e7deace8b97cd2b423cb79c541762097e29c386634a4bcc3ee91266d808706aadbc4650183d71bf5341edfe4c815d3a87c05d75da20b260d39cdd8559292000cb06faf9972683d379565dcd932fbc6bfb13f938a693252fc3af8088fcf8e06a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, @fallback=0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe, 0x6000002c, &(0x7f0000000100)="b9ff03316844268cb89e14f0080048e0050000000000008877fbac141516e0000001440404feb180008903040000845013f2325f003901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0103461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014c0000c0adc043084617d7ecf41effff38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d7da058f6efa6d1f5f7ff400"/254, 0x0, 0x14, 0x60000000, 0x0, 0xfffffffe}, 0x2c) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000009c0), 0x121440, 0x0) close(r2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@o_path={&(0x7f00000007c0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001", @ANYRES32=0x0], 0x50) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0xa482}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x5c31, 0x841, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x3, @perf_config_ext={0xf}, 0x100c, 0x0, 0x2, 0x0, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0}, 0x200, 0x2, 0x0, 0x0, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x5) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x9c, 0x0, 0x6}, {0x6}]}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000800)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_int(r6, &(0x7f0000000100)=0x200000, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1e}, 0x48) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)='cpuset.memory_spread_page\x00', 0x2, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0xc, 0x9, 0x0, 0x1, 0x2000000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x80ffffff}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x5}, {0x18, 0x2, 0x2, 0x0, r3}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 711.697015ms ago: executing program 3 (id=14320): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1}, 0x50) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, 0x0, 0x0) sendmsg$inet(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) 648.435157ms ago: executing program 3 (id=14321): perf_event_open(&(0x7f0000000200)={0x2, 0x78, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x80080, 0xd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xb}, 0x200602, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xe, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b700000081000000bfa300000000000007030000f1feffff720af0fff8ffffff71a4f0ff0000000071103d00000000007d400500000000002604000001ed00000f030000000000007c440000000000006b0a00fe000000007203000000000006b5000000000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f18564a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fe51bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c26fc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe031b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343ce3c953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccc99069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93f04bf072f0861f7580e69db384ac7eeedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba34015ea5aacb1188883ad24b89b6a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00e10000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c87852730a3bd7ac923fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f6f096753b639a924599c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca4856ff03b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d490cba8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e1461173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec860cde7c79f7b4d4e24c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b450100000001000000393cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd84990453f006694d461b76a58d88cf0f520310a1e80dc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6432399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff28861aac8302d268569dd42e194e330c7aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3be18a1a2b65079cc1c00400000000000f59dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e38534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ed1012fd7a8139166fd599c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336d205c5913ef67cf0216e2d81e6127bd9d7fab28800eaab2355992f8ce4cd38add4b272c0bee4076ca4847ffa691cf78fb7ec212bad3bef29f577ea7159b7f3025b3d977ff7c91024cf71126233cb80610eb37bd2d40ebdfed687f0b093e68f10b72146a0b749ee2105e2da94a288146abbbaf7c0b24fe0000000000000000f1a4f4de6a8d12dc9e71a20cbd412898586843b534d36e21379a8a06133c1babde9e5bd5b6afc5f684aada43ee560e800f58cb33b8483f6518abde7c86bd5d389c1b3c40fdd4bebe4adf87b1025ff57eb50984cc5bad9ea1c15484ea627c3c1501d612ed65939266e7332966f03e0376076e7c5dfe25f367dda7f69db89829b360dd2f59cbaad10f13e269eca792725bbacb96aa0a5c426ca76f84322661"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x8000000}, 0xffa3}, 0x48) 513.789054ms ago: executing program 1 (id=14322): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, 0x0, &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57b00000000000000000104"], 0xfe1b) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x400}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="851000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000454d6ae1b56635"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x19, 0x8, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x50}}]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 513.040715ms ago: executing program 3 (id=14323): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x8, 0x2, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250}, 0x23) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x45, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x61) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES64=r0], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000010000000000"], 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x101501, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0xa0200, 0x0) 464.278447ms ago: executing program 1 (id=14324): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=0x10, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@cgroup, 0x8, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000080)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0]}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x58, &(0x7f0000000300)}, 0x10) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000003c0)=0xffffffffffffffff, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000002c0)={r2, r1, 0x4}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000001300)=""/181, 0x26, 0xb5, 0x1}, 0x28) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) write$cgroup_int(r5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r6) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_subtree(r8, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000680)=ANY=[@ANYBLOB='+cpu'], 0x5) write$cgroup_subtree(r9, &(0x7f0000000500)=ANY=[@ANYBLOB='-cpu'], 0x5) r10 = openat$cgroup_type(r7, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r10, &(0x7f0000000080), 0x9) 271.586266ms ago: executing program 0 (id=14325): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x3) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000000c0)={0x2, &(0x7f0000000000)=[{0x84}, {0x6}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000300)='z\xe5\xb8\xfd\x80\xfd\xe39\xf2\xac\xa5\xf5\xb4\vtd\x98K\xcd\xb9\xc3(\xa6\x1e\xb5\x0f\x98\x9b\xb2\xe7\x8d\x8as\xc3dr\x12\xd3\xb0\xcc&Wr\xa1\xc5:q187\xb9\x9f\xf4\x98\x80\x1f\x15\xd8F+R/I\xb2\xa2\x03\xbd\x10\x9a\xe2S\x8a\xa7i6\x83>\x1b@\xd3\xba\xad\xd0f\xae\xdb\xa8k\x98\xff\x18m\xab\x81\xc6\xf7\xb3\x87\xfd\xe9\xed\xbb\x82H\xfb\x18\xd5h\b~\xf1\xcb+a\'j\x16\b\xf9iI\x85\xd9\xfdA\xea\xca\xe8\xda\xca\x1a_\xb9\x9f\x97-z\x83\xef{x\x96\x93_\x15\xdb\xb8>\xfb\x9d\x9e\x11s\xaa\xb3\xc6\xa2NH\xaf\x85s\x80A;\'\n\x7fcV\x9d\xa3\"%U\x8f\xc00\x82v\xa3B%v\x8fq{]\xab\xa8\b)\xbd1\xcb\xc3\x86\x1f\rc\xc2\xc0z\x86\x05\xf8\xdf\x8dF\xbf\xd7-\xca-\x17\xec\xef\x00J\x85\xfa\xabz-\xb1\x06\xddO\xa3\xc6\x14\x9c\xc5\x9b\x14U\x06LV\xa6+\x13\xe2\\R\xed$>]b\xfe\xff(_\xd9\xbb\bX\x00\x00\xd4\xa9e\xfb*$\xea\xf4e\xc7\xd2K\xbc\x0f\x1e_&P\xef\x02/\x0e\xfc\xc6\xdd\v\xd1jr\xb0\x11|\xeb\x06\xda\xb6<\x8f\x9fP\xfe\x1b\xa8\xbc\xea\xe1\xe1\xb5\x86u\xffy\x86\x87\xf0ft(\xa2.\xd0]t\xf6\xd0A;RK^.j\\WQ\xb66\"\x9a\xf1\xed\x92\x18\xfb\xa3\xc0H8\xd5%}\xb1\x7f\xc0\x87\xf6\xf1\nL\xbf\xfaJ\xb4(\xfbZ$(\xb0I\xa6!AG\x14(\r_\x80\x83\x7f\x9ce@\xe6\xef\'p') (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x47, 0x5, 0x0, 0x0, 0x0, 0x200000000000f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x0, 0x4, 0x0, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000540)) (async, rerun: 32) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb601288763608646667033", @ANYRESDEC], 0xffdd) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110c230000) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x50) (rerun: 64) ioctl$TUNSETOFFLOAD(r1, 0x4004743c, 0xf0ff1f00000000) 43.163258ms ago: executing program 3 (id=14326): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r3}, &(0x7f0000000280), &(0x7f00000002c0)=r4}, 0x20) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, 0x0) write$cgroup_devices(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8, 0x0, 0x58c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a03f0fff0ffffff79a4f0ff00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000030a00006a0a00fe0000000c8500000087000000b70000000000002995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a851"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x94) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xfffffffffffffd27}, 0x48) 42.661148ms ago: executing program 0 (id=14327): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x11}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'pim6reg0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454c9, 0x3) ioctl$TUNSETDEBUG(r3, 0x400454c9, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x10, &(0x7f0000000040), 0x4) sendmsg$sock(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001d00)='M', 0x1}], 0x1}, 0x4000880) close(r2) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000084ffffffff000000000300000000000000000000000200000000000009000000000000000d00000000000000000000000602"], 0x0, 0x56, 0x0, 0xfffffffe}, 0x28) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x140, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000600)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB="020000000600000000400000", @ANYRES32, @ANYBLOB="76788ca579d9e5185b2c918bb307000000dc6f156b7d53719f23ecec0880edc14dbd640d12b29421c4e351b4d01fba046cf071abec73781b8804ecb56a3ea07755c767bc5f3553b5823b32522974b7c63faf701998d79b790f63acf714d54df202304046d337fec9f2294255f32d13555b79c8fbd27eb37614420beda8fd8eb7a5f53a4520ec8cc56e878070746d86b4cc3f1bf820a19dc8063be4bab892d73502e68688e5794640d768d951fc8fafd49a1275f3e49556a6854a40518f1f25645bfe7bf22cbf496ac83b6c347fd36eb4e2d1e32cfb4e35a120726613b87f193a5f742bef8c46bf6ab0fb0f0b3c7dd5fcdc77b19ea7", @ANYRES64=0x0], 0x10) 16.653029ms ago: executing program 1 (id=14328): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="09000000160000000800000040"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0xf, &(0x7f0000000100)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xcd9}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x7, 0x0, 0xb, 0x6}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x39}}}, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, @cgroup_sock_addr=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) (async, rerun: 32) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async, rerun: 32) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async, rerun: 64) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f00000003c0)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x14, &(0x7f0000000000), 0x1, 0x10, &(0x7f0000000000), 0xa}, 0x70) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x40000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x10000, 0x8, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) (rerun: 32) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x35}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000500)=""/64}, 0x20) (async) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x1b) 0s ago: executing program 4 (id=14329): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000005a0000008500000022000000180100002020702500000000002020200100000000000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff"], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) kernel console output (not intermixed with test programs): 0000038 RSI: 0000200000000300 RDI: 000000000000001a [ 532.615462][T21241] RBP: 00007ff867452090 R08: 0000000000000000 R09: 0000000000000000 [ 532.623548][T21241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 532.631543][T21241] R13: 00007ff868c71038 R14: 00007ff868c70fa0 R15: 00007ffef2d89168 [ 532.788949][T21238] device sit0 entered promiscuous mode [ 533.395952][T21266] device syzkaller0 entered promiscuous mode [ 533.409786][T21265] -1: renamed from syzkaller0 [ 533.452396][T21268] FAULT_INJECTION: forcing a failure. [ 533.452396][T21268] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 533.486044][T21268] CPU: 1 PID: 21268 Comm: syz.0.7814 Tainted: G W syzkaller #0 [ 533.495035][T21268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 533.505125][T21268] Call Trace: [ 533.508456][T21268] __dump_stack+0x21/0x24 [ 533.512830][T21268] dump_stack_lvl+0x1a7/0x208 [ 533.517637][T21268] ? show_regs_print_info+0x18/0x18 [ 533.523052][T21268] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 533.528895][T21268] dump_stack+0x15/0x1c [ 533.533270][T21268] should_fail+0x3c1/0x510 [ 533.537806][T21268] should_fail_usercopy+0x1a/0x20 [ 533.542869][T21268] _copy_from_user+0x20/0xd0 [ 533.547509][T21268] generic_map_update_batch+0x45b/0x760 [ 533.553310][T21268] ? bpf_enable_instrumentation+0x50/0x50 [ 533.559088][T21268] ? bpf_enable_instrumentation+0x50/0x50 [ 533.565742][T21268] bpf_map_do_batch+0x463/0x5f0 [ 533.571879][T21268] __se_sys_bpf+0x5bf/0x740 [ 533.576526][T21268] ? __x64_sys_bpf+0x90/0x90 [ 533.581722][T21268] ? debug_smp_processor_id+0x17/0x20 [ 533.587421][T21268] __x64_sys_bpf+0x7b/0x90 [ 533.592624][T21268] do_syscall_64+0x31/0x40 [ 533.597539][T21268] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 533.603667][T21268] RIP: 0033:0x7ff8689f7799 [ 533.608638][T21268] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 533.629037][T21268] RSP: 002b:00007ff867452028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 533.637583][T21268] RAX: ffffffffffffffda RBX: 00007ff868c70fa0 RCX: 00007ff8689f7799 [ 533.645591][T21268] RDX: 0000000000000038 RSI: 0000200000000300 RDI: 000000000000001a [ 533.653690][T21268] RBP: 00007ff867452090 R08: 0000000000000000 R09: 0000000000000000 [ 533.661690][T21268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 533.669699][T21268] R13: 00007ff868c71038 R14: 00007ff868c70fa0 R15: 00007ffef2d89168 [ 533.791046][T21270] device syzkaller0 entered promiscuous mode [ 534.340613][T21301] FAULT_INJECTION: forcing a failure. [ 534.340613][T21301] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 534.411105][T21301] CPU: 0 PID: 21301 Comm: syz.0.7828 Tainted: G W syzkaller #0 [ 534.420134][T21301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 534.430492][T21301] Call Trace: [ 534.433936][T21301] __dump_stack+0x21/0x24 [ 534.438300][T21301] dump_stack_lvl+0x1a7/0x208 [ 534.443101][T21301] ? show_regs_print_info+0x18/0x18 [ 534.448454][T21301] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 534.454382][T21301] dump_stack+0x15/0x1c [ 534.458559][T21301] should_fail+0x3c1/0x510 [ 534.463102][T21301] should_fail_usercopy+0x1a/0x20 [ 534.468269][T21301] _copy_from_user+0x20/0xd0 [ 534.472979][T21301] generic_map_update_batch+0x4ad/0x760 [ 534.478923][T21301] ? bpf_enable_instrumentation+0x50/0x50 [ 534.484973][T21301] ? bpf_enable_instrumentation+0x50/0x50 [ 534.490810][T21301] bpf_map_do_batch+0x463/0x5f0 [ 534.495695][T21301] __se_sys_bpf+0x5bf/0x740 [ 534.500217][T21301] ? __x64_sys_bpf+0x90/0x90 [ 534.504842][T21301] ? debug_smp_processor_id+0x17/0x20 [ 534.510237][T21301] __x64_sys_bpf+0x7b/0x90 [ 534.514681][T21301] do_syscall_64+0x31/0x40 [ 534.519127][T21301] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 534.525081][T21301] RIP: 0033:0x7ff8689f7799 [ 534.529513][T21301] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 534.549361][T21301] RSP: 002b:00007ff867452028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 534.557908][T21301] RAX: ffffffffffffffda RBX: 00007ff868c70fa0 RCX: 00007ff8689f7799 [ 534.566163][T21301] RDX: 0000000000000038 RSI: 0000200000000300 RDI: 000000000000001a [ 534.574338][T21301] RBP: 00007ff867452090 R08: 0000000000000000 R09: 0000000000000000 [ 534.582442][T21301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 534.590628][T21301] R13: 00007ff868c71038 R14: 00007ff868c70fa0 R15: 00007ffef2d89168 [ 535.049669][T21331] device syzkaller0 entered promiscuous mode [ 535.368627][T21352] FAULT_INJECTION: forcing a failure. [ 535.368627][T21352] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 535.413598][T21352] CPU: 1 PID: 21352 Comm: syz.4.7848 Tainted: G W syzkaller #0 [ 535.422713][T21352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 535.433010][T21352] Call Trace: [ 535.436341][T21352] __dump_stack+0x21/0x24 [ 535.440695][T21352] dump_stack_lvl+0x1a7/0x208 [ 535.445410][T21352] ? show_regs_print_info+0x18/0x18 [ 535.450763][T21352] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 535.456696][T21352] dump_stack+0x15/0x1c [ 535.460963][T21352] should_fail+0x3c1/0x510 [ 535.465523][T21352] should_fail_usercopy+0x1a/0x20 [ 535.470601][T21352] _copy_from_user+0x20/0xd0 [ 535.475331][T21352] generic_map_update_batch+0x45b/0x760 [ 535.480925][T21352] ? bpf_enable_instrumentation+0x50/0x50 [ 535.486682][T21352] ? bpf_enable_instrumentation+0x50/0x50 [ 535.492433][T21352] bpf_map_do_batch+0x463/0x5f0 [ 535.497309][T21352] __se_sys_bpf+0x5bf/0x740 [ 535.501931][T21352] ? __x64_sys_bpf+0x90/0x90 [ 535.506551][T21352] ? debug_smp_processor_id+0x17/0x20 [ 535.511939][T21352] __x64_sys_bpf+0x7b/0x90 [ 535.516371][T21352] do_syscall_64+0x31/0x40 [ 535.520868][T21352] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 535.526780][T21352] RIP: 0033:0x7fd2ff34b799 [ 535.531235][T21352] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 535.551140][T21352] RSP: 002b:00007fd2fdda6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 535.559627][T21352] RAX: ffffffffffffffda RBX: 00007fd2ff5c4fa0 RCX: 00007fd2ff34b799 [ 535.567714][T21352] RDX: 0000000000000038 RSI: 0000200000000300 RDI: 000000000000001a [ 535.575833][T21352] RBP: 00007fd2fdda6090 R08: 0000000000000000 R09: 0000000000000000 [ 535.583946][T21352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 535.592140][T21352] R13: 00007fd2ff5c5038 R14: 00007fd2ff5c4fa0 R15: 00007ffe76875eb8 [ 535.878767][T21381] device syzkaller0 entered promiscuous mode [ 538.060710][T21439] device syzkaller0 entered promiscuous mode [ 538.923339][T21461] device veth1_macvtap left promiscuous mode [ 539.056980][T21467] device veth1_macvtap entered promiscuous mode [ 539.068908][T21467] device macsec0 entered promiscuous mode [ 539.477488][T21488] bridge0: port 2(bridge_slave_1) entered disabled state [ 539.485608][T21488] bridge0: port 1(bridge_slave_0) entered disabled state [ 540.562651][T21519] device syzkaller0 entered promiscuous mode [ 540.634435][T21521] device syzkaller0 left promiscuous mode [ 540.752551][T21525] device syzkaller0 entered promiscuous mode [ 541.004039][T21529] device syzkaller0 entered promiscuous mode [ 541.013754][T21532] tap0: tun_chr_ioctl cmd 1074025677 [ 541.020972][T21532] tap0: linktype set to 778 [ 541.471144][T21549] device syzkaller0 entered promiscuous mode [ 542.116620][T21593] device veth1_macvtap entered promiscuous mode [ 542.146689][T21593] device macsec0 entered promiscuous mode [ 542.226403][T21579] bridge0: port 1(bridge_slave_0) entered blocking state [ 542.253007][T21579] bridge0: port 1(bridge_slave_0) entered disabled state [ 542.351947][T21579] device bridge_slave_0 entered promiscuous mode [ 542.392490][T21579] bridge0: port 2(bridge_slave_1) entered blocking state [ 542.399709][T21579] bridge0: port 2(bridge_slave_1) entered disabled state [ 542.407355][T21579] device bridge_slave_1 entered promiscuous mode [ 542.431440][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 543.033204][T21611] device syzkaller0 entered promiscuous mode [ 543.080110][T21616] device syzkaller0 entered promiscuous mode [ 543.209980][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 543.218069][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 543.281807][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 543.292484][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 543.300798][ T389] bridge0: port 1(bridge_slave_0) entered blocking state [ 543.307923][ T389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 543.330898][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 543.339629][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 543.348579][ T389] bridge0: port 2(bridge_slave_1) entered blocking state [ 543.355880][ T389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 543.363495][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 543.372280][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 543.380569][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 543.470969][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 543.513260][T21633] device syzkaller0 entered promiscuous mode [ 543.530794][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 543.548339][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 543.556267][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 543.624191][T21579] device veth0_vlan entered promiscuous mode [ 543.648259][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 543.724004][T21579] device veth1_macvtap entered promiscuous mode [ 543.802974][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 543.813527][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 543.878948][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 543.938090][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 544.034029][ T8354] bridge0: port 3(gretap0) entered disabled state [ 544.084802][ T8354] device gretap0 left promiscuous mode [ 544.115274][ T8354] bridge0: port 3(gretap0) entered disabled state [ 544.223593][T21650] device veth1_macvtap left promiscuous mode [ 544.230393][T21650] device macsec0 left promiscuous mode [ 544.504610][T21658] device syzkaller0 entered promiscuous mode [ 544.607384][ T8354] device bridge_slave_1 left promiscuous mode [ 544.617115][ T8354] bridge0: port 2(bridge_slave_1) entered disabled state [ 544.637614][ T8354] device bridge_slave_0 left promiscuous mode [ 544.644194][ T8354] bridge0: port 1(bridge_slave_0) entered disabled state [ 544.653105][ T8354] device veth1_macvtap left promiscuous mode [ 544.659201][ T8354] device veth0_vlan left promiscuous mode [ 544.990914][T21664] device syzkaller0 entered promiscuous mode [ 545.226096][T21670] device syzkaller0 entered promiscuous mode [ 546.522355][T21712] device syzkaller0 entered promiscuous mode [ 548.364874][T21748] device syzkaller0 entered promiscuous mode [ 550.525449][T21802] device veth1_macvtap left promiscuous mode [ 550.897568][T21817] device syzkaller0 left promiscuous mode [ 550.924896][T21817] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 550.991411][ C1] syzkaller0: tun_net_xmit 76 [ 551.034870][T21821] device syzkaller0 entered promiscuous mode [ 551.259420][T21828] device veth1_macvtap entered promiscuous mode [ 551.314023][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 551.451388][ C1] syzkaller0: tun_net_xmit 76 [ 551.677857][T21852] device syzkaller0 entered promiscuous mode [ 551.733763][T20646] syzkaller0: tun_net_xmit 72 [ 552.547813][T21886] device syzkaller0 entered promiscuous mode [ 552.813674][T20646] syzkaller0: tun_net_xmit 76 [ 552.818574][T20646] syzkaller0: tun_net_xmit 48 [ 552.857509][T21899] device syzkaller0 entered promiscuous mode [ 553.731384][ C1] syzkaller0: tun_net_xmit 76 [ 553.772102][T21929] device syzkaller0 entered promiscuous mode [ 554.698862][T21966] device syzkaller0 entered promiscuous mode [ 554.721092][T21971] device syzkaller0 entered promiscuous mode [ 554.751947][ C0] syzkaller0: tun_net_xmit 76 [ 554.785873][T21962] syzkaller0: create flow: hash 2303772106 index 4 [ 554.811939][ C0] syzkaller0: tun_net_xmit 76 [ 554.928630][T21969] device syzkaller0 entered promiscuous mode [ 554.955930][T21957] syzkaller0: delete flow: hash 2303772106 index 4 [ 554.977778][T21974] device macsec0 left promiscuous mode [ 555.011391][ C0] syzkaller0: tun_net_xmit 76 [ 555.094006][T21990] device syzkaller0 entered promiscuous mode [ 555.483105][T22009] device syzkaller0 entered promiscuous mode [ 555.542274][ C0] syzkaller0: tun_net_xmit 76 [ 555.640001][ T6072] syzkaller0: tun_net_xmit 76 [ 555.644937][ T6072] syzkaller0: tun_net_xmit 48 [ 555.675139][T22013] device veth1_macvtap left promiscuous mode [ 555.861656][ C0] syzkaller0: tun_net_xmit 76 [ 556.849159][T22066] device syzkaller0 entered promiscuous mode [ 557.421187][T22087] device syzkaller0 entered promiscuous mode [ 557.853451][T22106] device syzkaller0 entered promiscuous mode [ 557.968202][T22110] device syzkaller0 entered promiscuous mode [ 558.770973][T22164] device veth1_macvtap left promiscuous mode [ 558.842292][T22163] device macsec0 entered promiscuous mode [ 559.811863][ C0] syzkaller0: tun_net_xmit 48 [ 559.913516][T22223] device veth1_macvtap entered promiscuous mode [ 559.920692][T22223] device macsec0 entered promiscuous mode [ 559.982894][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 560.910875][T22274] device syzkaller0 entered promiscuous mode [ 561.541237][T22289] device syzkaller0 entered promiscuous mode [ 562.248831][T22321] device macsec0 left promiscuous mode [ 562.477249][T22326] device syzkaller0 entered promiscuous mode [ 562.542166][ C1] syzkaller0: tun_net_xmit 76 [ 562.608850][T22334] syzkaller0: tun_net_xmit 1280 [ 562.614105][T22334] syzkaller0: create flow: hash 4119696263 index 4 [ 562.631414][ C1] syzkaller0: tun_net_xmit 76 [ 562.671427][ C1] syzkaller0: tun_net_xmit 76 [ 562.698345][T22338] device syzkaller0 entered promiscuous mode [ 562.741377][ C1] syzkaller0: tun_net_xmit 76 [ 562.781782][T22329] syzkaller0: delete flow: hash 4119696263 index 4 [ 562.862400][ C1] syzkaller0: tun_net_xmit 76 [ 562.991417][ C0] syzkaller0: tun_net_xmit 76 [ 563.115094][T22361] device veth1_macvtap entered promiscuous mode [ 563.148092][T22361] device macsec0 entered promiscuous mode [ 563.203924][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 563.455453][T22374] device syzkaller0 entered promiscuous mode [ 563.543197][T22384] device syzkaller0 entered promiscuous mode [ 563.581460][ C0] syzkaller0: tun_net_xmit 76 [ 563.631210][T22388] device syzkaller0 entered promiscuous mode [ 563.865419][T22405] device syzkaller0 entered promiscuous mode [ 564.645661][T22423] device syzkaller0 entered promiscuous mode [ 564.873277][T22434] device syzkaller0 entered promiscuous mode [ 566.393969][T22484] device syzkaller0 entered promiscuous mode [ 566.564070][T22485] device syzkaller0 entered promiscuous mode [ 566.619165][ T4664] syzkaller0: tun_net_xmit 48 [ 568.131893][ C0] syzkaller0: tun_net_xmit 48 [ 568.300575][T22544] device syzkaller0 entered promiscuous mode [ 569.307579][T22590] device syzkaller0 entered promiscuous mode [ 569.722309][T22607] device wg2 left promiscuous mode [ 569.796112][T22610] device wg2 entered promiscuous mode [ 570.595997][T22638] device macsec0 entered promiscuous mode [ 570.991400][ C1] syzkaller0: tun_net_xmit 76 [ 571.701018][T22680] device syzkaller0 entered promiscuous mode [ 571.732383][ C1] syzkaller0: tun_net_xmit 76 [ 572.420038][T22718] device veth1_macvtap entered promiscuous mode [ 572.505842][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 573.240672][T22744] device syzkaller0 entered promiscuous mode [ 573.273954][T22748] syzkaller0: create flow: hash 3014568010 index 4 [ 573.291397][ C0] syzkaller0: tun_net_xmit 76 [ 573.320143][T22745] syzkaller0: delete flow: hash 3014568010 index 4 [ 573.341890][ C0] syzkaller0: tun_net_xmit 76 [ 573.411398][ C0] syzkaller0: tun_net_xmit 76 [ 573.732078][ C0] syzkaller0: tun_net_xmit 76 [ 574.622630][T22792] device syzkaller0 entered promiscuous mode [ 574.835641][T22801] device syzkaller0 entered promiscuous mode [ 575.142915][T22812] device macsec0 left promiscuous mode [ 575.253476][T22812] device macsec0 entered promiscuous mode [ 575.705808][T22841] device veth1_macvtap left promiscuous mode [ 575.761975][T22841] device macsec0 left promiscuous mode [ 575.835832][T22844] device veth1_macvtap entered promiscuous mode [ 575.872379][T22844] device macsec0 entered promiscuous mode [ 576.047604][T22848] device syzkaller0 entered promiscuous mode [ 576.568177][T22869] device syzkaller0 entered promiscuous mode [ 576.691202][T22869] syzkaller0: tun_net_xmit 1280 [ 577.401515][ C1] syzkaller0: tun_net_xmit 76 [ 577.518322][T22921] device veth0_vlan left promiscuous mode [ 577.540372][T22921] device veth0_vlan entered promiscuous mode [ 577.546683][ C1] syzkaller0: tun_net_xmit 76 [ 577.584436][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 577.603007][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 577.621937][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 577.703037][ C1] syzkaller0: tun_net_xmit 76 [ 577.801945][ C1] syzkaller0: tun_net_xmit 76 [ 578.263687][T22943] device syzkaller0 entered promiscuous mode [ 578.532033][ C1] syzkaller0: tun_net_xmit 76 [ 578.859250][T22955] device syzkaller0 entered promiscuous mode [ 579.210870][T22979] device syzkaller0 entered promiscuous mode [ 579.312360][T22981] device syzkaller0 entered promiscuous mode [ 580.393373][T23010] device syzkaller0 entered promiscuous mode [ 580.771788][ C0] syzkaller0: tun_net_xmit 76 [ 580.838411][T23035] syzkaller0: create flow: hash 4170650831 index 4 [ 580.989534][T23027] syzkaller0: delete flow: hash 4170650831 index 4 [ 581.011785][ C0] syzkaller0: tun_net_xmit 76 [ 581.091879][ C0] syzkaller0: tun_net_xmit 76 [ 581.161987][ C0] syzkaller0: tun_net_xmit 76 [ 581.972455][ C0] syzkaller0: tun_net_xmit 76 [ 582.487561][T23070] device syzkaller0 entered promiscuous mode [ 583.930934][T23115] device syzkaller0 entered promiscuous mode [ 585.412632][ C0] syzkaller0: tun_net_xmit 48 [ 586.924032][T23202] syzkaller0: tun_net_xmit 1280 [ 586.952046][ C0] syzkaller0: tun_net_xmit 76 [ 586.991322][T23202] syzkaller0: create flow: hash 4119696263 index 2 [ 587.021397][ C0] syzkaller0: tun_net_xmit 76 [ 587.241083][T23219] FAULT_INJECTION: forcing a failure. [ 587.241083][T23219] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 587.313960][T23219] CPU: 1 PID: 23219 Comm: syz.4.8538 Tainted: G W syzkaller #0 [ 587.323142][T23219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 587.333312][T23219] Call Trace: [ 587.336638][T23219] __dump_stack+0x21/0x24 [ 587.340998][T23219] dump_stack_lvl+0x1a7/0x208 [ 587.345701][T23219] ? show_regs_print_info+0x18/0x18 [ 587.351047][T23219] ? vfs_write+0xb27/0xdc0 [ 587.355491][T23219] dump_stack+0x15/0x1c [ 587.359680][T23219] should_fail+0x3c1/0x510 [ 587.364346][T23219] should_fail_usercopy+0x1a/0x20 [ 587.369459][T23219] _copy_from_user+0x20/0xd0 [ 587.374268][T23219] __se_sys_bpf+0x1bb/0x740 [ 587.378816][T23219] ? __x64_sys_bpf+0x90/0x90 [ 587.383674][T23219] ? debug_smp_processor_id+0x17/0x20 [ 587.389094][T23219] __x64_sys_bpf+0x7b/0x90 [ 587.393749][T23219] do_syscall_64+0x31/0x40 [ 587.398394][T23219] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 587.404673][T23219] RIP: 0033:0x7fd2ff34b799 [ 587.409224][T23219] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 587.429423][T23219] RSP: 002b:00007fd2fdda6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 587.437882][T23219] RAX: ffffffffffffffda RBX: 00007fd2ff5c4fa0 RCX: 00007fd2ff34b799 [ 587.446103][T23219] RDX: 0000000000000094 RSI: 00002000000004c0 RDI: 0000000000000005 [ 587.454282][T23219] RBP: 00007fd2fdda6090 R08: 0000000000000000 R09: 0000000000000000 [ 587.462378][T23219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 587.470683][T23219] R13: 00007fd2ff5c5038 R14: 00007fd2ff5c4fa0 R15: 00007ffe76875eb8 [ 587.731953][ C0] syzkaller0: tun_net_xmit 76 [ 587.735587][T23225] device syzkaller0 entered promiscuous mode [ 587.899265][T23230] device syzkaller0 left promiscuous mode [ 588.341926][ C0] syzkaller0: tun_net_xmit 76 [ 588.451929][ C0] syzkaller0: tun_net_xmit 76 [ 588.865928][T23257] FAULT_INJECTION: forcing a failure. [ 588.865928][T23257] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 588.879174][T23257] CPU: 1 PID: 23257 Comm: syz.2.8551 Tainted: G W syzkaller #0 [ 588.888056][T23257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 588.898152][T23257] Call Trace: [ 588.901475][T23257] __dump_stack+0x21/0x24 [ 588.905825][T23257] dump_stack_lvl+0x1a7/0x208 [ 588.910529][T23257] ? show_regs_print_info+0x18/0x18 [ 588.915750][T23257] dump_stack+0x15/0x1c [ 588.919924][T23257] should_fail+0x3c1/0x510 [ 588.924365][T23257] should_fail_usercopy+0x1a/0x20 [ 588.929411][T23257] strncpy_from_user+0x24/0x2e0 [ 588.934378][T23257] bpf_prog_load+0x18c/0x14a0 [ 588.939080][T23257] ? avc_has_perm_noaudit+0x260/0x260 [ 588.944643][T23257] ? map_freeze+0x320/0x320 [ 588.949179][T23257] ? vfs_write+0xb27/0xdc0 [ 588.953834][T23257] ? selinux_bpf+0xc7/0xf0 [ 588.958400][T23257] ? security_bpf+0x82/0xa0 [ 588.963022][T23257] __se_sys_bpf+0x49a/0x740 [ 588.967700][T23257] ? __x64_sys_bpf+0x90/0x90 [ 588.972518][T23257] ? debug_smp_processor_id+0x17/0x20 [ 588.977998][T23257] __x64_sys_bpf+0x7b/0x90 [ 588.982630][T23257] do_syscall_64+0x31/0x40 [ 588.987076][T23257] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 588.993110][T23257] RIP: 0033:0x7f505da97799 [ 588.997541][T23257] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 589.017657][T23257] RSP: 002b:00007f505c4f2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 589.026103][T23257] RAX: ffffffffffffffda RBX: 00007f505dd10fa0 RCX: 00007f505da97799 [ 589.034186][T23257] RDX: 0000000000000094 RSI: 00002000000004c0 RDI: 0000000000000005 [ 589.042179][T23257] RBP: 00007f505c4f2090 R08: 0000000000000000 R09: 0000000000000000 [ 589.044941][ C0] syzkaller0: tun_net_xmit 76 [ 589.050250][T23257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 589.050260][T23257] R13: 00007f505dd11038 R14: 00007f505dd10fa0 R15: 00007ffd420f52c8 [ 589.866441][T23288] device syzkaller0 entered promiscuous mode [ 590.291497][ C1] syzkaller0: delete flow: hash 4119696263 index 2 [ 590.357467][T23296] bridge0: port 1(bridge_slave_0) entered blocking state [ 590.364998][T23296] bridge0: port 1(bridge_slave_0) entered disabled state [ 590.373061][T23296] device bridge_slave_0 entered promiscuous mode [ 590.445239][T23296] bridge0: port 2(bridge_slave_1) entered blocking state [ 590.452553][T23296] bridge0: port 2(bridge_slave_1) entered disabled state [ 590.460256][T23296] device bridge_slave_1 entered promiscuous mode [ 590.939547][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 590.958034][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 591.007955][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 591.090292][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 591.099117][T20153] bridge0: port 1(bridge_slave_0) entered blocking state [ 591.106524][T20153] bridge0: port 1(bridge_slave_0) entered forwarding state [ 591.115184][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 591.124068][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 591.133151][T20153] bridge0: port 2(bridge_slave_1) entered blocking state [ 591.140247][T20153] bridge0: port 2(bridge_slave_1) entered forwarding state [ 591.203652][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 591.282965][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 591.355872][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 591.409481][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 591.418242][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 591.647607][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 591.658379][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 591.705136][T23296] device veth0_vlan entered promiscuous mode [ 591.727544][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 591.739811][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 591.758611][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 591.787201][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 591.885585][T23296] device veth1_macvtap entered promiscuous mode [ 591.895629][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 591.904919][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 591.913419][ C0] syzkaller0: tun_net_xmit 76 [ 591.919824][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 591.951404][ C1] syzkaller0: tun_net_xmit 76 [ 592.008269][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 592.016850][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 592.025661][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 592.034677][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 592.053550][T23324] syzkaller0: tun_net_xmit 1280 [ 592.058549][T23324] syzkaller0: create flow: hash 4119696263 index 4 [ 592.071370][ C0] syzkaller0: tun_net_xmit 76 [ 592.107066][T23323] syzkaller0: delete flow: hash 4119696263 index 4 [ 592.151392][ C1] syzkaller0: tun_net_xmit 76 [ 592.312003][ C1] syzkaller0: tun_net_xmit 76 [ 592.734021][ T112] device veth1_macvtap left promiscuous mode [ 593.163083][T23355] device syzkaller0 entered promiscuous mode [ 593.332215][ C1] syzkaller0: tun_net_xmit 76 [ 593.357272][T23359] device macsec0 left promiscuous mode [ 593.721377][ C1] syzkaller0: tun_net_xmit 76 [ 593.804236][T23361] device macsec0 entered promiscuous mode [ 593.852025][T23374] syzkaller0: tun_net_xmit 1280 [ 593.862045][ C0] syzkaller0: tun_net_xmit 76 [ 593.884937][T23374] syzkaller0: create flow: hash 4119696263 index 4 [ 593.980228][T23373] syzkaller0: delete flow: hash 4119696263 index 4 [ 594.032894][ C0] syzkaller0: tun_net_xmit 76 [ 594.771442][ C0] syzkaller0: tun_net_xmit 76 [ 594.825012][T23419] device syzkaller0 entered promiscuous mode [ 595.474822][T23453] device syzkaller0 entered promiscuous mode [ 596.260563][T23473] device syzkaller0 entered promiscuous mode [ 597.670154][T23504] device syzkaller0 entered promiscuous mode [ 598.362147][T23530] FAULT_INJECTION: forcing a failure. [ 598.362147][T23530] name failslab, interval 1, probability 0, space 0, times 0 [ 598.375052][T23530] CPU: 0 PID: 23530 Comm: syz.4.8639 Tainted: G W syzkaller #0 [ 598.384454][T23530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 598.395138][T23530] Call Trace: [ 598.398550][T23530] __dump_stack+0x21/0x24 [ 598.402905][T23530] dump_stack_lvl+0x1a7/0x208 [ 598.407624][T23530] ? show_regs_print_info+0x18/0x18 [ 598.412966][T23530] ? __kasan_check_write+0x14/0x20 [ 598.418578][T23530] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 598.424359][T23530] dump_stack+0x15/0x1c [ 598.428730][T23530] should_fail+0x3c1/0x510 [ 598.433608][T23530] ? __alloc_skb+0x9e/0x520 [ 598.438468][T23530] __should_failslab+0xa4/0xe0 [ 598.443360][T23530] should_failslab+0x9/0x20 [ 598.447991][T23530] kmem_cache_alloc+0x3d/0x2d0 [ 598.452972][T23530] ? remove_wait_queue+0x140/0x140 [ 598.458173][T23530] __alloc_skb+0x9e/0x520 [ 598.462553][T23530] ? __kasan_check_write+0x14/0x20 [ 598.467813][T23530] __neigh_notify+0x83/0x130 [ 598.472454][T23530] neigh_cleanup_and_release+0x2c/0x1a0 [ 598.478119][T23530] neigh_flush_dev+0x642/0x820 [ 598.483110][T23530] ? _raw_write_lock_bh+0x94/0xf0 [ 598.488348][T23530] neigh_changeaddr+0x30/0x40 [ 598.493147][T23530] ndisc_netdev_event+0x10b/0x3e0 [ 598.498204][T23530] raw_notifier_call_chain+0x90/0x100 [ 598.503613][T23530] dev_set_mac_address+0x320/0x430 [ 598.508762][T23530] ? dev_pre_changeaddr_notify+0x1e0/0x1e0 [ 598.514607][T23530] dev_set_mac_address_user+0x31/0x50 [ 598.520282][T23530] dev_ifsioc+0x675/0xa90 [ 598.524771][T23530] ? dev_ioctl+0xb80/0xb80 [ 598.529237][T23530] dev_ioctl+0x550/0xb80 [ 598.533634][T23530] sock_do_ioctl+0x27b/0x380 [ 598.538269][T23530] ? sock_show_fdinfo+0xa0/0xa0 [ 598.543165][T23530] ? selinux_file_ioctl+0x3a0/0x4d0 [ 598.548663][T23530] ? mutex_trylock+0xa0/0xa0 [ 598.553296][T23530] ? __fget_files+0x2c4/0x320 [ 598.558017][T23530] sock_ioctl+0x4bd/0x760 [ 598.562606][T23530] ? sock_poll+0x350/0x350 [ 598.567053][T23530] ? __fget_files+0x2c4/0x320 [ 598.571776][T23530] ? security_file_ioctl+0x84/0xa0 [ 598.577456][T23530] ? sock_poll+0x350/0x350 [ 598.581923][T23530] __se_sys_ioctl+0x121/0x1a0 [ 598.586741][T23530] __x64_sys_ioctl+0x7b/0x90 [ 598.591477][T23530] do_syscall_64+0x31/0x40 [ 598.595908][T23530] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 598.601900][T23530] RIP: 0033:0x7fbf0cf59799 [ 598.606343][T23530] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 598.626247][T23530] RSP: 002b:00007fbf0b9b4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 598.634786][T23530] RAX: ffffffffffffffda RBX: 00007fbf0d1d2fa0 RCX: 00007fbf0cf59799 [ 598.642792][T23530] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000004 [ 598.650834][T23530] RBP: 00007fbf0b9b4090 R08: 0000000000000000 R09: 0000000000000000 [ 598.658843][T23530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 598.667369][T23530] R13: 00007fbf0d1d3038 R14: 00007fbf0d1d2fa0 R15: 00007ffdc3c9ada8 [ 598.935843][T23535] device veth1_macvtap left promiscuous mode [ 598.960076][T23535] device macsec0 left promiscuous mode [ 599.248689][T23551] device syzkaller0 entered promiscuous mode [ 600.583026][T23593] syzkaller0: tun_net_xmit 1280 [ 600.591371][ C1] syzkaller0: tun_net_xmit 76 [ 600.591986][T23593] syzkaller0: create flow: hash 4119696263 index 3 [ 600.627624][T23595] device syzkaller0 entered promiscuous mode [ 600.637536][T23590] syzkaller0: delete flow: hash 4119696263 index 3 [ 600.671383][ C1] syzkaller0: tun_net_xmit 76 [ 600.689515][T23599] device syzkaller0 left promiscuous mode [ 600.731423][ C1] syzkaller0: tun_net_xmit 76 [ 601.181668][ C1] syzkaller0: tun_net_xmit 76 [ 601.571867][T20656] syzkaller0: tun_net_xmit 76 [ 601.576973][T20656] syzkaller0: tun_net_xmit 48 [ 601.632721][ C1] syzkaller0: tun_net_xmit 76 [ 601.785036][T23633] device syzkaller0 entered promiscuous mode [ 601.841399][ C0] syzkaller0: tun_net_xmit 76 [ 601.857906][T23635] device syzkaller0 entered promiscuous mode [ 601.905219][T23635] syzkaller0: tun_net_xmit 1280 [ 601.931372][ C0] syzkaller0: tun_net_xmit 76 [ 601.961398][ C0] syzkaller0: tun_net_xmit 76 [ 602.082854][T23656] device syzkaller0 left promiscuous mode [ 602.151386][ C0] syzkaller0: tun_net_xmit 76 [ 602.301639][T23674] device veth1_macvtap entered promiscuous mode [ 602.312083][T23674] device macsec0 entered promiscuous mode [ 602.337859][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 602.461395][ C0] syzkaller0: tun_net_xmit 76 [ 603.005138][ T767] syzkaller0: tun_net_xmit 76 [ 603.010325][ T767] syzkaller0: tun_net_xmit 48 [ 603.351381][ C1] syzkaller0: tun_net_xmit 76 [ 603.811405][ C0] syzkaller0: tun_net_xmit 76 [ 604.211996][ C1] syzkaller0: tun_net_xmit 76 [ 604.909266][T23724] device syzkaller0 entered promiscuous mode [ 605.104110][T23724] FAULT_INJECTION: forcing a failure. [ 605.104110][T23724] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 605.143893][T23724] CPU: 0 PID: 23724 Comm: syz.2.8706 Tainted: G W syzkaller #0 [ 605.152880][T23724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 605.163217][T23724] Call Trace: [ 605.166753][T23724] __dump_stack+0x21/0x24 [ 605.171126][T23724] dump_stack_lvl+0x1a7/0x208 [ 605.175880][T23724] ? show_regs_print_info+0x18/0x18 [ 605.181312][T23724] dump_stack+0x15/0x1c [ 605.185493][T23724] should_fail+0x3c1/0x510 [ 605.190294][T23724] should_fail_usercopy+0x1a/0x20 [ 605.195345][T23724] strncpy_from_user+0x24/0x2e0 [ 605.200261][T23724] bpf_prog_load+0x18c/0x14a0 [ 605.204977][T23724] ? avc_has_perm_noaudit+0x260/0x260 [ 605.210465][T23724] ? map_freeze+0x320/0x320 [ 605.215231][T23724] ? vfs_write+0xb27/0xdc0 [ 605.220706][T23724] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 605.226734][T23724] ? selinux_bpf+0xc7/0xf0 [ 605.231298][T23724] ? security_bpf+0x82/0xa0 [ 605.235926][T23724] __se_sys_bpf+0x49a/0x740 [ 605.240541][T23724] ? __x64_sys_bpf+0x90/0x90 [ 605.245285][T23724] ? debug_smp_processor_id+0x17/0x20 [ 605.250800][T23724] __x64_sys_bpf+0x7b/0x90 [ 605.255846][T23724] do_syscall_64+0x31/0x40 [ 605.260383][T23724] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 605.266736][T23724] RIP: 0033:0x7f505da97799 [ 605.271427][T23724] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 605.291339][T23724] RSP: 002b:00007f505c4f2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 605.300355][T23724] RAX: ffffffffffffffda RBX: 00007f505dd10fa0 RCX: 00007f505da97799 [ 605.308448][T23724] RDX: 0000000000000048 RSI: 00002000000017c0 RDI: 0000000000000005 [ 605.316844][T23724] RBP: 00007f505c4f2090 R08: 0000000000000000 R09: 0000000000000000 [ 605.324846][T23724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 605.332952][T23724] R13: 00007f505dd11038 R14: 00007f505dd10fa0 R15: 00007ffd420f52c8 [ 605.671914][ C1] syzkaller0: tun_net_xmit 76 [ 605.835701][T23745] device syzkaller0 entered promiscuous mode [ 605.868961][T20655] syzkaller0: tun_net_xmit 48 [ 605.886955][T23750] device syzkaller0 entered promiscuous mode [ 605.921986][ C1] syzkaller0: tun_net_xmit 76 [ 605.927133][T20655] syzkaller0: tun_net_xmit 76 [ 605.941502][T20655] syzkaller0: tun_net_xmit 48 [ 605.951582][ C1] syzkaller0: tun_net_xmit 76 [ 606.121581][ C1] syzkaller0: tun_net_xmit 76 [ 606.155610][T23759] device syzkaller0 entered promiscuous mode [ 606.191354][ C1] syzkaller0: tun_net_xmit 76 [ 606.387143][T23770] device syzkaller0 entered promiscuous mode [ 606.590122][T23785] device syzkaller0 entered promiscuous mode [ 607.172396][ C1] syzkaller0: tun_net_xmit 76 [ 607.255762][T23822] syzkaller0: tun_net_xmit 1280 [ 607.291335][ C0] syzkaller0: tun_net_xmit 76 [ 607.531878][ C0] syzkaller0: tun_net_xmit 76 [ 608.615564][T23868] device syzkaller0 entered promiscuous mode [ 608.924481][ T7745] syzkaller0: tun_net_xmit 48 [ 609.765214][T23915] device syzkaller0 entered promiscuous mode [ 609.869065][T23921] device syzkaller0 entered promiscuous mode [ 610.287651][T23934] device syzkaller0 entered promiscuous mode [ 611.066379][T23964] device macsec0 entered promiscuous mode [ 611.418696][ T24] audit: type=1400 audit(1774023839.060:173): avc: denied { create } for pid=23993 comm="syz.4.8808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 612.337524][T24018] device syzkaller0 entered promiscuous mode [ 612.454228][T24028] syzkaller0: tun_net_xmit 1280 [ 612.691814][ C0] syzkaller0: tun_net_xmit 48 [ 613.612830][T24080] device syzkaller0 entered promiscuous mode [ 614.615279][T24123] device syzkaller0 entered promiscuous mode [ 615.194957][T24136] device syzkaller0 entered promiscuous mode [ 616.699458][T24169] bridge0: port 1(bridge_slave_0) entered blocking state [ 616.707601][T24169] bridge0: port 1(bridge_slave_0) entered disabled state [ 616.715504][T24169] device bridge_slave_0 entered promiscuous mode [ 616.731411][T24169] bridge0: port 2(bridge_slave_1) entered blocking state [ 616.738527][T24169] bridge0: port 2(bridge_slave_1) entered disabled state [ 616.746424][T24169] device bridge_slave_1 entered promiscuous mode [ 617.072992][T24202] device veth0_vlan left promiscuous mode [ 617.096346][T24202] device veth0_vlan entered promiscuous mode [ 617.246265][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 617.269434][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 617.339408][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 617.387488][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 617.396092][ T389] bridge0: port 1(bridge_slave_0) entered blocking state [ 617.403300][ T389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 617.436508][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 617.445070][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 617.474112][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 617.602648][ T389] bridge0: port 2(bridge_slave_1) entered blocking state [ 617.609946][ T389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 617.723263][ T300] device bridge_slave_1 left promiscuous mode [ 617.729669][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 617.793245][ T300] device bridge_slave_0 left promiscuous mode [ 617.818227][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 617.833059][ T300] device veth1_macvtap left promiscuous mode [ 618.055704][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 618.064368][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 618.109153][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 618.138238][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 618.220858][T24169] device veth0_vlan entered promiscuous mode [ 618.241725][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 618.254789][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 618.273232][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 618.281002][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 618.300358][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 618.309254][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 618.319225][T24169] device veth1_macvtap entered promiscuous mode [ 618.405598][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 618.422833][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 618.432551][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 618.491420][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 618.504209][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 619.483897][T24293] device syzkaller0 entered promiscuous mode [ 620.611672][ C0] syzkaller0: tun_net_xmit 48 [ 620.932514][T24337] device syzkaller0 entered promiscuous mode [ 621.134677][T24352] device syzkaller0 entered promiscuous mode [ 621.251076][T24351] dvmrp1: tun_chr_ioctl cmd 1074812118 [ 621.402012][T24370] device syzkaller0 entered promiscuous mode [ 623.873339][T24462] device syzkaller0 left promiscuous mode [ 623.946207][T24463] device macsec0 entered promiscuous mode [ 624.407639][T24487] device syzkaller0 entered promiscuous mode [ 624.421953][ T764] syzkaller0: tun_net_xmit 76 [ 624.432783][ T764] syzkaller0: tun_net_xmit 48 [ 624.452473][ C0] syzkaller0: tun_net_xmit 76 [ 625.012172][ C0] syzkaller0: tun_net_xmit 76 [ 625.036201][T24521] device syzkaller0 entered promiscuous mode [ 625.042375][ C0] syzkaller0: tun_net_xmit 76 [ 625.111360][ C1] syzkaller0: tun_net_xmit 76 [ 625.167869][T24526] device syzkaller0 entered promiscuous mode [ 625.191345][ C1] syzkaller0: tun_net_xmit 76 [ 625.216514][T24526] syzkaller0: tun_net_xmit 1280 [ 625.241477][ C1] syzkaller0: tun_net_xmit 76 [ 625.291355][ C1] syzkaller0: tun_net_xmit 76 [ 625.360770][T24534] device syzkaller0 entered promiscuous mode [ 625.377659][T24536] tap0: tun_chr_ioctl cmd 2147767520 [ 625.416507][T24534] syzkaller0: tun_net_xmit 1280 [ 625.565681][T24549] device syzkaller0 left promiscuous mode [ 625.611391][ C0] syzkaller0: tun_net_xmit 76 [ 625.793422][T24564] device syzkaller0 entered promiscuous mode [ 625.834706][T20652] syzkaller0: tun_net_xmit 76 [ 625.839631][T20652] syzkaller0: tun_net_xmit 48 [ 625.942989][T24569] device syzkaller0 entered promiscuous mode [ 626.028792][T24569] syzkaller0: tun_net_xmit 1280 [ 626.051361][ C1] syzkaller0: tun_net_xmit 76 [ 626.371356][ C0] syzkaller0: tun_net_xmit 76 [ 626.815337][T24620] device syzkaller0 entered promiscuous mode [ 628.041402][T24669] device vlan0 entered promiscuous mode [ 628.194586][T24675] device syzkaller0 entered promiscuous mode [ 628.291803][ C1] syzkaller0: tun_net_xmit 76 [ 628.356814][T24677] device syzkaller0 entered promiscuous mode [ 628.381058][T24678] device syzkaller0 entered promiscuous mode [ 628.451442][ C0] syzkaller0: tun_net_xmit 76 [ 628.551405][ C0] syzkaller0: tun_net_xmit 76 [ 628.602091][ C0] syzkaller0: tun_net_xmit 76 [ 628.619588][T24678] syzkaller0: tun_net_xmit 1280 [ 628.681366][ C1] syzkaller0: tun_net_xmit 76 [ 628.951596][ T764] syzkaller0: tun_net_xmit 76 [ 628.956656][ T764] syzkaller0: tun_net_xmit 48 [ 628.985812][T24707] syzkaller0: tun_net_xmit 1280 [ 629.001373][ C0] syzkaller0: tun_net_xmit 76 [ 629.006345][ C0] syzkaller0: tun_net_xmit 76 [ 629.081925][ C0] syzkaller0: tun_net_xmit 76 [ 629.121392][ C1] syzkaller0: tun_net_xmit 76 [ 629.371939][ C1] syzkaller0: tun_net_xmit 76 [ 629.413149][T24720] device macsec0 left promiscuous mode [ 629.421382][ C1] syzkaller0: tun_net_xmit 76 [ 629.675595][T24728] device syzkaller0 entered promiscuous mode [ 629.683121][T24731] €Â: renamed from bond_slave_0 [ 629.697013][T24728] syzkaller0: tun_net_xmit 1280 [ 629.881345][ C0] syzkaller0: tun_net_xmit 76 [ 630.191763][ C0] syzkaller0: tun_net_xmit 76 [ 630.613866][T24787] device syzkaller0 entered promiscuous mode [ 630.895557][T24804] device syzkaller0 left promiscuous mode [ 630.931368][ C0] syzkaller0: tun_net_xmit 76 [ 630.953728][T24803] device syzkaller0 entered promiscuous mode [ 631.021956][ C0] syzkaller0: tun_net_xmit 76 [ 631.201800][ C0] syzkaller0: tun_net_xmit 76 [ 631.271668][T24713] syzkaller0: tun_net_xmit 76 [ 631.276538][T24713] syzkaller0: tun_net_xmit 48 [ 631.411356][ C0] syzkaller0: tun_net_xmit 76 [ 631.600803][T24835] device syzkaller0 entered promiscuous mode [ 631.999073][T24848] device syzkaller0 entered promiscuous mode [ 633.399019][T24895] device syzkaller0 entered promiscuous mode [ 633.501351][ C1] syzkaller0: tun_net_xmit 76 [ 634.011359][ C1] syzkaller0: tun_net_xmit 76 [ 634.027162][T24937] device syzkaller0 entered promiscuous mode [ 634.391353][ C1] syzkaller0: tun_net_xmit 76 [ 635.361994][T25008] device syzkaller0 entered promiscuous mode [ 635.412030][ C0] syzkaller0: tun_net_xmit 48 [ 635.436055][T25008] syzkaller0: tun_net_xmit 1280 [ 636.641833][ C0] syzkaller0: tun_net_xmit 76 [ 637.055805][T25070] device syzkaller0 entered promiscuous mode [ 637.071805][ C1] syzkaller0: tun_net_xmit 76 [ 637.171945][ C0] syzkaller0: tun_net_xmit 76 [ 637.382247][ T764] syzkaller0: tun_net_xmit 76 [ 637.387129][ T764] syzkaller0: tun_net_xmit 48 [ 637.501902][ C0] syzkaller0: tun_net_xmit 76 [ 637.971354][ C0] syzkaller0: tun_net_xmit 76 [ 637.995368][T25096] syzkaller0: tun_net_xmit 1280 [ 638.021663][ C0] syzkaller0: tun_net_xmit 76 [ 638.086958][T25098] device syzkaller0 entered promiscuous mode [ 638.121368][ C1] syzkaller0: tun_net_xmit 76 [ 638.157359][T25114] FAULT_INJECTION: forcing a failure. [ 638.157359][T25114] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 638.191659][T25114] CPU: 1 PID: 25114 Comm: syz.0.9224 Tainted: G W syzkaller #0 [ 638.200998][T25114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 638.211256][T25114] Call Trace: [ 638.214674][T25114] __dump_stack+0x21/0x24 [ 638.219047][T25114] dump_stack_lvl+0x1a7/0x208 [ 638.223891][T25114] ? show_regs_print_info+0x18/0x18 [ 638.229118][T25114] ? vfs_write+0xb27/0xdc0 [ 638.233550][T25114] dump_stack+0x15/0x1c [ 638.237732][T25114] should_fail+0x3c1/0x510 [ 638.242157][T25114] should_fail_usercopy+0x1a/0x20 [ 638.247216][T25114] _copy_from_user+0x20/0xd0 [ 638.251814][T25114] __se_sys_bpf+0x1bb/0x740 [ 638.256329][T25114] ? __x64_sys_bpf+0x90/0x90 [ 638.260927][T25114] ? debug_smp_processor_id+0x17/0x20 [ 638.266509][T25114] __x64_sys_bpf+0x7b/0x90 [ 638.271064][T25114] do_syscall_64+0x31/0x40 [ 638.275699][T25114] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 638.281600][T25114] RIP: 0033:0x7ff8689f7799 [ 638.286024][T25114] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 638.305902][T25114] RSP: 002b:00007ff867452028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 638.314409][T25114] RAX: ffffffffffffffda RBX: 00007ff868c70fa0 RCX: 00007ff8689f7799 [ 638.322588][T25114] RDX: 0000000000000050 RSI: 0000200000000780 RDI: 000000000000000a [ 638.330933][T25114] RBP: 00007ff867452090 R08: 0000000000000000 R09: 0000000000000000 [ 638.339004][T25114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 638.347304][T25114] R13: 00007ff868c71038 R14: 00007ff868c70fa0 R15: 00007ffef2d89168 [ 638.397206][T25122] device team_slave_1 entered promiscuous mode [ 638.429540][T25118] device syzkaller0 entered promiscuous mode [ 638.436789][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 638.450019][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 638.465254][ C1] syzkaller0: tun_net_xmit 76 [ 639.191608][T25140] ªªªªªª™™: renamed from vlan0 [ 639.561827][ C0] syzkaller0: tun_net_xmit 76 [ 639.663191][ C1] syzkaller0: tun_net_xmit 76 [ 640.612285][ C1] syzkaller0: tun_net_xmit 76 [ 640.775168][T25192] bridge0: port 2(bridge_slave_1) entered disabled state [ 640.782502][T25192] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.966025][T25192] bridge0: port 2(bridge_slave_1) entered blocking state [ 640.973630][T25192] bridge0: port 2(bridge_slave_1) entered forwarding state [ 640.981584][T25192] bridge0: port 1(bridge_slave_0) entered blocking state [ 640.988662][T25192] bridge0: port 1(bridge_slave_0) entered forwarding state [ 641.120267][T25192] device bridge0 entered promiscuous mode [ 641.251937][ C0] syzkaller0: tun_net_xmit 48 [ 642.307896][T25285] FAULT_INJECTION: forcing a failure. [ 642.307896][T25285] name failslab, interval 1, probability 0, space 0, times 0 [ 642.321784][T25285] CPU: 1 PID: 25285 Comm: syz.2.9290 Tainted: G W syzkaller #0 [ 642.330678][T25285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 642.341126][T25285] Call Trace: [ 642.344540][T25285] __dump_stack+0x21/0x24 [ 642.348891][T25285] dump_stack_lvl+0x1a7/0x208 [ 642.353688][T25285] ? show_regs_print_info+0x18/0x18 [ 642.359096][T25285] dump_stack+0x15/0x1c [ 642.363266][T25285] should_fail+0x3c1/0x510 [ 642.367722][T25285] ? __build_skb+0x2d/0x310 [ 642.372354][T25285] __should_failslab+0xa4/0xe0 [ 642.377155][T25285] should_failslab+0x9/0x20 [ 642.381680][T25285] kmem_cache_alloc+0x3d/0x2d0 [ 642.386743][T25285] __build_skb+0x2d/0x310 [ 642.391091][T25285] ? __kasan_check_write+0x14/0x20 [ 642.396222][T25285] build_skb+0x24/0x200 [ 642.400401][T25285] bpf_prog_test_run_skb+0x31d/0x10b0 [ 642.405890][T25285] ? __kasan_check_write+0x14/0x20 [ 642.411139][T25285] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 642.417239][T25285] bpf_prog_test_run+0x350/0x3c0 [ 642.422623][T25285] __se_sys_bpf+0x501/0x740 [ 642.427161][T25285] ? __x64_sys_bpf+0x90/0x90 [ 642.431970][T25285] ? debug_smp_processor_id+0x17/0x20 [ 642.437405][T25285] __x64_sys_bpf+0x7b/0x90 [ 642.441925][T25285] do_syscall_64+0x31/0x40 [ 642.446406][T25285] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 642.452684][T25285] RIP: 0033:0x7f505da97799 [ 642.457402][T25285] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 642.479595][T25285] RSP: 002b:00007f505c4f2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 642.488602][T25285] RAX: ffffffffffffffda RBX: 00007f505dd10fa0 RCX: 00007f505da97799 [ 642.496694][T25285] RDX: 0000000000000050 RSI: 0000200000000780 RDI: 000000000000000a [ 642.504686][T25285] RBP: 00007f505c4f2090 R08: 0000000000000000 R09: 0000000000000000 [ 642.512792][T25285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 642.520904][T25285] R13: 00007f505dd11038 R14: 00007f505dd10fa0 R15: 00007ffd420f52c8 [ 643.744825][T25325] device syzkaller0 entered promiscuous mode [ 644.606044][T25366] device syzkaller0 entered promiscuous mode [ 645.699199][T25417] device syzkaller0 entered promiscuous mode [ 649.291346][ C1] syzkaller0: tun_net_xmit 76 [ 649.303878][T25481] bridge0: port 1(bridge_slave_0) entered blocking state [ 649.311150][T25481] bridge0: port 1(bridge_slave_0) entered disabled state [ 649.319985][T25481] device bridge_slave_0 entered promiscuous mode [ 649.328754][T25481] bridge0: port 2(bridge_slave_1) entered blocking state [ 649.336397][T25481] bridge0: port 2(bridge_slave_1) entered disabled state [ 649.356144][T25481] device bridge_slave_1 entered promiscuous mode [ 649.431593][ C0] syzkaller0: tun_net_xmit 48 [ 649.551342][ C0] syzkaller0: tun_net_xmit 76 [ 649.601311][ C0] syzkaller0: tun_net_xmit 76 [ 649.647473][T25523] syzkaller0: tun_net_xmit 1280 [ 649.669988][T25481] bridge0: port 2(bridge_slave_1) entered blocking state [ 649.677375][T25481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 649.684944][T25481] bridge0: port 1(bridge_slave_0) entered blocking state [ 649.692280][T25481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 649.699879][ C1] syzkaller0: tun_net_xmit 76 [ 649.766318][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 649.785745][T20153] bridge0: port 1(bridge_slave_0) entered disabled state [ 649.803427][T20153] bridge0: port 2(bridge_slave_1) entered disabled state [ 649.840204][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 649.855528][T20153] bridge0: port 1(bridge_slave_0) entered blocking state [ 649.862872][T20153] bridge0: port 1(bridge_slave_0) entered forwarding state [ 649.880809][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 649.890740][T20153] bridge0: port 2(bridge_slave_1) entered blocking state [ 649.898026][T20153] bridge0: port 2(bridge_slave_1) entered forwarding state [ 649.913632][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 649.962008][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 649.979598][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 650.029291][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 650.042761][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 650.061669][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 650.093246][T25481] device veth0_vlan entered promiscuous mode [ 650.123047][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 650.153345][T25481] device veth1_macvtap entered promiscuous mode [ 650.216434][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 650.234933][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 650.307563][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 650.338204][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 650.612146][ C1] syzkaller0: tun_net_xmit 76 [ 650.638756][ T389] device bridge_slave_1 left promiscuous mode [ 650.650333][ T389] bridge0: port 2(bridge_slave_1) entered disabled state [ 650.701552][ T389] device bridge_slave_0 left promiscuous mode [ 650.714650][ T389] bridge0: port 1(bridge_slave_0) entered disabled state [ 650.725447][ T389] device veth0_vlan left promiscuous mode [ 650.979124][T25596] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 650.990831][T25596] device syzkaller0 entered promiscuous mode [ 651.131369][ C0] syzkaller0: tun_net_xmit 76 [ 651.197646][T25604] device macsec0 entered promiscuous mode [ 651.253008][ C0] syzkaller0: tun_net_xmit 76 [ 651.302423][T25611] syzkaller0: tun_net_xmit 1280 [ 651.331487][ C1] syzkaller0: tun_net_xmit 76 [ 651.432091][ C0] syzkaller0: tun_net_xmit 76 [ 651.528733][T25616] device syzkaller0 entered promiscuous mode [ 651.551160][T25613] device wg2 entered promiscuous mode [ 651.668595][T25627] device syzkaller0 entered promiscuous mode [ 651.731368][ C1] syzkaller0: tun_net_xmit 76 [ 651.778069][T25636] device syzkaller0 entered promiscuous mode [ 651.798985][T25636] syzkaller0: tun_net_xmit 1280 [ 652.143029][ C1] syzkaller0: tun_net_xmit 76 [ 652.261035][T25673] device syzkaller0 entered promiscuous mode [ 652.686978][T25690] syzkaller0: tun_net_xmit 1280 [ 652.692124][ C1] syzkaller0: tun_net_xmit 76 [ 652.741418][ C1] syzkaller0: tun_net_xmit 76 [ 654.036789][T25774] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 654.125695][T25773] device syzkaller0 entered promiscuous mode [ 654.708778][T25754] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 655.970057][T25837] device syzkaller0 entered promiscuous mode [ 656.468877][T25850] ÿÿÿÿÿÿ: renamed from vlan1 [ 658.855339][T25963] device syzkaller0 entered promiscuous mode [ 659.816894][T25990] FAULT_INJECTION: forcing a failure. [ 659.816894][T25990] name failslab, interval 1, probability 0, space 0, times 0 [ 659.851582][T25990] CPU: 0 PID: 25990 Comm: syz.1.9537 Tainted: G W syzkaller #0 [ 659.860663][T25990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 659.870833][T25990] Call Trace: [ 659.874163][T25990] __dump_stack+0x21/0x24 [ 659.879106][T25990] dump_stack_lvl+0x1a7/0x208 [ 659.883816][T25990] ? show_regs_print_info+0x18/0x18 [ 659.889142][T25990] dump_stack+0x15/0x1c [ 659.893413][T25990] should_fail+0x3c1/0x510 [ 659.897927][T25990] ? alloc_skb_with_frags+0xa2/0x560 [ 659.903220][T25990] __should_failslab+0xa4/0xe0 [ 659.908033][T25990] should_failslab+0x9/0x20 [ 659.912542][T25990] __kmalloc_track_caller+0x5f/0x320 [ 659.917960][T25990] ? kmem_cache_alloc+0x162/0x2d0 [ 659.923017][T25990] ? __alloc_skb+0x9e/0x520 [ 659.927537][T25990] ? alloc_skb_with_frags+0xa2/0x560 [ 659.932837][T25990] __alloc_skb+0xdc/0x520 [ 659.937184][T25990] alloc_skb_with_frags+0xa2/0x560 [ 659.942420][T25990] sock_alloc_send_pskb+0x87f/0x9a0 [ 659.947641][T25990] ? sock_kzfree_s+0x60/0x60 [ 659.952257][T25990] ? __kasan_check_write+0x14/0x20 [ 659.957505][T25990] ? _raw_spin_lock+0x94/0xf0 [ 659.962289][T25990] ? _raw_spin_trylock_bh+0x150/0x150 [ 659.967673][T25990] unix_dgram_sendmsg+0x601/0x17e0 [ 659.972800][T25990] ? selinux_socket_accept+0x570/0x570 [ 659.978285][T25990] ? unix_dgram_poll+0x630/0x630 [ 659.983237][T25990] ? ____kasan_slab_free+0x125/0x160 [ 659.988648][T25990] ? __kasan_slab_free+0x11/0x20 [ 659.993681][T25990] ? slab_free_freelist_hook+0xc5/0x190 [ 659.999363][T25990] ? security_socket_sendmsg+0x82/0xa0 [ 660.004831][T25990] ? unix_dgram_poll+0x630/0x630 [ 660.009778][T25990] ____sys_sendmsg+0x5b7/0x8f0 [ 660.014558][T25990] ? __sys_sendmsg_sock+0x40/0x40 [ 660.019774][T25990] ? import_iovec+0x7c/0xb0 [ 660.024456][T25990] ___sys_sendmsg+0x236/0x2e0 [ 660.029234][T25990] ? __sys_sendmsg+0x280/0x280 [ 660.034019][T25990] ? rw_verify_area+0x1c0/0x360 [ 660.039015][T25990] ? __fdget+0x1a1/0x230 [ 660.043261][T25990] __x64_sys_sendmsg+0x1f9/0x2c0 [ 660.048234][T25990] ? fput+0x1a/0x20 [ 660.052045][T25990] ? ___sys_sendmsg+0x2e0/0x2e0 [ 660.057197][T25990] ? debug_smp_processor_id+0x17/0x20 [ 660.062592][T25990] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 660.068663][T25990] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 660.074306][T25990] do_syscall_64+0x31/0x40 [ 660.078732][T25990] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 660.084746][T25990] RIP: 0033:0x7ffa2965f799 [ 660.089269][T25990] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 660.109182][T25990] RSP: 002b:00007ffa28099028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 660.117643][T25990] RAX: ffffffffffffffda RBX: 00007ffa298d9090 RCX: 00007ffa2965f799 [ 660.125715][T25990] RDX: 0000000020000000 RSI: 0000200000000100 RDI: 0000000000000004 [ 660.134058][T25990] RBP: 00007ffa28099090 R08: 0000000000000000 R09: 0000000000000000 [ 660.142042][T25990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 660.150205][T25990] R13: 00007ffa298d9128 R14: 00007ffa298d9090 R15: 00007ffd4d0a5348 [ 660.162418][T25989] device syzkaller0 entered promiscuous mode [ 660.309021][T25997] device syzkaller0 entered promiscuous mode [ 660.813666][T26021] device syzkaller0 entered promiscuous mode [ 661.453539][T26051] device syzkaller0 entered promiscuous mode [ 661.661287][T26063] device syzkaller0 entered promiscuous mode [ 662.012613][T26076] device syzkaller0 entered promiscuous mode [ 662.116662][T26080] device wg2 left promiscuous mode [ 662.189305][T26080] device wg2 entered promiscuous mode [ 662.362753][T26089] batadv0: tun_chr_ioctl cmd 2147767521 [ 662.471168][T26102] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 662.513651][T26102] syzkaller0: linktype set to 825 [ 662.625770][T26101] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 662.851164][T26108] device syzkaller0 entered promiscuous mode [ 663.189043][T26124] device syzkaller0 entered promiscuous mode [ 663.662036][T26150] device syzkaller0 entered promiscuous mode [ 667.523241][T26271] device syzkaller0 entered promiscuous mode [ 667.529513][T26271] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 668.605741][T26284] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.613223][T26284] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.622125][T26284] device bridge_slave_0 entered promiscuous mode [ 668.631139][T26284] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.640754][T26284] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.651987][T26284] device bridge_slave_1 entered promiscuous mode [ 668.664473][T20076] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 668.830105][T26299] device syzkaller0 entered promiscuous mode [ 669.071730][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 669.082562][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 669.115414][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 669.154937][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 669.199774][T20153] bridge0: port 1(bridge_slave_0) entered blocking state [ 669.206924][T20153] bridge0: port 1(bridge_slave_0) entered forwarding state [ 669.214924][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 669.236459][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 669.328902][T20153] bridge0: port 2(bridge_slave_1) entered blocking state [ 669.336146][T20153] bridge0: port 2(bridge_slave_1) entered forwarding state [ 669.345302][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 669.447083][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 669.497372][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 669.605373][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 669.679519][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 669.748485][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 669.766180][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 669.776164][T26284] device veth0_vlan entered promiscuous mode [ 669.793563][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 669.824813][T26284] device veth1_macvtap entered promiscuous mode [ 669.875843][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 669.906347][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 669.974190][T26354] device syzkaller0 entered promiscuous mode [ 669.990759][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 670.032622][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 670.583312][ T8354] nr0: port 1(macsec0) entered disabled state [ 670.601076][ T8354] device bridge_slave_1 left promiscuous mode [ 670.626897][ T8354] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.671710][ T8354] device bridge_slave_0 left promiscuous mode [ 670.712867][ T8354] bridge0: port 1(bridge_slave_0) entered disabled state [ 670.725176][ T8354] device veth1_macvtap left promiscuous mode [ 671.705441][T26450] bridge0: port 2(bridge_slave_1) entered disabled state [ 671.712845][T26450] bridge0: port 1(bridge_slave_0) entered disabled state [ 671.961368][T26450] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 671.967954][T26450] syzkaller0: linktype set to 0 [ 673.028502][T26481] device syzkaller0 entered promiscuous mode [ 673.367264][T26507] FAULT_INJECTION: forcing a failure. [ 673.367264][T26507] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 673.410642][T26507] CPU: 0 PID: 26507 Comm: syz.0.9725 Tainted: G W syzkaller #0 [ 673.419699][T26507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 673.429898][T26507] Call Trace: [ 673.433233][T26507] __dump_stack+0x21/0x24 [ 673.437592][T26507] dump_stack_lvl+0x1a7/0x208 [ 673.442381][T26507] ? show_regs_print_info+0x18/0x18 [ 673.447688][T26507] ? pick_next_task_fair+0x812/0xa40 [ 673.453180][T26507] dump_stack+0x15/0x1c [ 673.457542][T26507] should_fail+0x3c1/0x510 [ 673.462088][T26507] should_fail_alloc_page+0x4f/0x60 [ 673.467505][T26507] __alloc_pages_nodemask+0x119/0x620 [ 673.472917][T26507] ? memcpy+0x56/0x70 [ 673.476928][T26507] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 673.482615][T26507] ? avc_denied+0x1b0/0x1b0 [ 673.487156][T26507] ? avc_has_perm+0x168/0x3d0 [ 673.492172][T26507] kmalloc_order+0x4c/0x160 [ 673.496802][T26507] kmalloc_order_trace+0x16/0x80 [ 673.501780][T26507] __kmalloc+0x1eb/0x330 [ 673.506068][T26507] kvmalloc_node+0x88/0x130 [ 673.510599][T26507] alloc_netdev_mqs+0x88/0xc80 [ 673.515473][T26507] ? selinux_tun_dev_create+0x95/0xb0 [ 673.520888][T26507] ? tun_not_capable+0x1f0/0x1f0 [ 673.525862][T26507] tun_set_iff+0x535/0xe00 [ 673.530312][T26507] __tun_chr_ioctl+0x82a/0x1d00 [ 673.535185][T26507] ? tun_flow_create+0x320/0x320 [ 673.540143][T26507] ? __fget_files+0x2c4/0x320 [ 673.544845][T26507] tun_chr_ioctl+0x2a/0x40 [ 673.549395][T26507] ? tun_chr_poll+0x6b0/0x6b0 [ 673.554498][T26507] __se_sys_ioctl+0x121/0x1a0 [ 673.559193][T26507] __x64_sys_ioctl+0x7b/0x90 [ 673.563997][T26507] do_syscall_64+0x31/0x40 [ 673.568451][T26507] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 673.574369][T26507] RIP: 0033:0x7f25dfe9b799 [ 673.578815][T26507] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 673.598813][T26507] RSP: 002b:00007f25de8f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 673.607486][T26507] RAX: ffffffffffffffda RBX: 00007f25e0114fa0 RCX: 00007f25dfe9b799 [ 673.615572][T26507] RDX: 0000200000000080 RSI: 00000000400454ca RDI: 0000000000000003 [ 673.623659][T26507] RBP: 00007f25de8f6090 R08: 0000000000000000 R09: 0000000000000000 [ 673.631830][T26507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 673.640038][T26507] R13: 00007f25e0115038 R14: 00007f25e0114fa0 R15: 00007ffe22ca0b98 [ 673.888295][T26522] device syzkaller0 entered promiscuous mode [ 673.944793][T26526] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 673.965950][T26526] device syzkaller0 entered promiscuous mode [ 674.999802][T26566] device syzkaller0 entered promiscuous mode [ 677.047227][T26636] device syzkaller0 entered promiscuous mode [ 677.114029][T20644] syzkaller0: tun_net_xmit 48 [ 678.412059][T26681] device syzkaller0 entered promiscuous mode [ 678.652997][T26694] FAULT_INJECTION: forcing a failure. [ 678.652997][T26694] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 678.759175][T26694] CPU: 0 PID: 26694 Comm: syz.3.9787 Tainted: G W syzkaller #0 [ 678.768564][T26694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 678.779119][T26694] Call Trace: [ 678.782551][T26694] __dump_stack+0x21/0x24 [ 678.786915][T26694] dump_stack_lvl+0x1a7/0x208 [ 678.791731][T26694] ? show_regs_print_info+0x18/0x18 [ 678.797732][T26694] dump_stack+0x15/0x1c [ 678.801917][T26694] should_fail+0x3c1/0x510 [ 678.806560][T26694] should_fail_alloc_page+0x4f/0x60 [ 678.811810][T26694] __alloc_pages_nodemask+0x119/0x620 [ 678.817397][T26694] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 678.823099][T26694] kmalloc_order+0x4c/0x160 [ 678.827746][T26694] kmalloc_order_trace+0x16/0x80 [ 678.832985][T26694] __kmalloc+0x1eb/0x330 [ 678.837374][T26694] kvmalloc_node+0x88/0x130 [ 678.841931][T26694] alloc_netdev_mqs+0x844/0xc80 [ 678.847010][T26694] tun_set_iff+0x535/0xe00 [ 678.851826][T26694] __tun_chr_ioctl+0x82a/0x1d00 [ 678.856971][T26694] ? tun_flow_create+0x320/0x320 [ 678.861998][T26694] ? __fget_files+0x2c4/0x320 [ 678.867010][T26694] tun_chr_ioctl+0x2a/0x40 [ 678.871495][T26694] ? tun_chr_poll+0x6b0/0x6b0 [ 678.876232][T26694] __se_sys_ioctl+0x121/0x1a0 [ 678.880953][T26694] __x64_sys_ioctl+0x7b/0x90 [ 678.885580][T26694] do_syscall_64+0x31/0x40 [ 678.890055][T26694] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 678.896330][T26694] RIP: 0033:0x7fd40e5fc799 [ 678.900778][T26694] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 678.920692][T26694] RSP: 002b:00007fd40d057028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 678.929254][T26694] RAX: ffffffffffffffda RBX: 00007fd40e875fa0 RCX: 00007fd40e5fc799 [ 678.937426][T26694] RDX: 0000200000000080 RSI: 00000000400454ca RDI: 0000000000000003 [ 678.945615][T26694] RBP: 00007fd40d057090 R08: 0000000000000000 R09: 0000000000000000 [ 678.953847][T26694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 678.962324][T26694] R13: 00007fd40e876038 R14: 00007fd40e875fa0 R15: 00007ffeccf3a338 [ 679.014972][T26699] device veth0_vlan left promiscuous mode [ 679.023486][T26699] device veth0_vlan entered promiscuous mode [ 679.038230][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 679.047120][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 679.058201][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 679.856160][T26740] FAULT_INJECTION: forcing a failure. [ 679.856160][T26740] name failslab, interval 1, probability 0, space 0, times 0 [ 679.870172][T26740] CPU: 0 PID: 26740 Comm: syz.4.9806 Tainted: G W syzkaller #0 [ 679.879330][T26740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 679.889769][T26740] Call Trace: [ 679.893103][T26740] __dump_stack+0x21/0x24 [ 679.897509][T26740] dump_stack_lvl+0x1a7/0x208 [ 679.902297][T26740] ? show_regs_print_info+0x18/0x18 [ 679.907532][T26740] ? del_random_ready_callback+0x170/0x170 [ 679.913557][T26740] dump_stack+0x15/0x1c [ 679.917740][T26740] should_fail+0x3c1/0x510 [ 679.922188][T26740] ? register_netdevice+0x226/0x13e0 [ 679.927699][T26740] __should_failslab+0xa4/0xe0 [ 679.932529][T26740] should_failslab+0x9/0x20 [ 679.937180][T26740] kmem_cache_alloc_trace+0x3a/0x2e0 [ 679.942612][T26740] ? dev_get_valid_name+0x312/0x370 [ 679.948093][T26740] register_netdevice+0x226/0x13e0 [ 679.953231][T26740] ? xdp_rxq_info_reg+0xec/0x2e0 [ 679.958199][T26740] ? netif_stacked_transfer_operstate+0x220/0x220 [ 679.964731][T26740] ? get_random_bytes+0x1c/0x30 [ 679.969631][T26740] tun_set_iff+0x812/0xe00 [ 679.974251][T26740] __tun_chr_ioctl+0x82a/0x1d00 [ 679.979139][T26740] ? tun_flow_create+0x320/0x320 [ 679.984173][T26740] ? __fget_files+0x2c4/0x320 [ 679.989035][T26740] tun_chr_ioctl+0x2a/0x40 [ 679.993496][T26740] ? tun_chr_poll+0x6b0/0x6b0 [ 679.998191][T26740] __se_sys_ioctl+0x121/0x1a0 [ 680.002888][T26740] __x64_sys_ioctl+0x7b/0x90 [ 680.007502][T26740] do_syscall_64+0x31/0x40 [ 680.011930][T26740] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 680.018053][T26740] RIP: 0033:0x7fbf0cf59799 [ 680.022494][T26740] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 680.042216][T26740] RSP: 002b:00007fbf0b9b4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 680.050808][T26740] RAX: ffffffffffffffda RBX: 00007fbf0d1d2fa0 RCX: 00007fbf0cf59799 [ 680.058786][T26740] RDX: 0000200000000080 RSI: 00000000400454ca RDI: 0000000000000003 [ 680.066768][T26740] RBP: 00007fbf0b9b4090 R08: 0000000000000000 R09: 0000000000000000 [ 680.074874][T26740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 680.082942][T26740] R13: 00007fbf0d1d3038 R14: 00007fbf0d1d2fa0 R15: 00007ffdc3c9ada8 [ 681.347547][T26786] device syzkaller0 entered promiscuous mode [ 681.443771][T26792] device syzkaller0 entered promiscuous mode [ 681.656425][T26801] device syzkaller0 entered promiscuous mode [ 682.879120][T26840] device syzkaller0 entered promiscuous mode [ 683.713695][T26855] device syzkaller0 entered promiscuous mode [ 684.089445][T26874] device syzkaller0 entered promiscuous mode [ 684.405066][T26905] device wg2 entered promiscuous mode [ 686.468770][T26965] ÿÿÿÿÿÿ: renamed from vlan1 [ 686.748686][T27002] FAULT_INJECTION: forcing a failure. [ 686.748686][T27002] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 686.766866][T27002] CPU: 0 PID: 27002 Comm: syz.0.9901 Tainted: G W syzkaller #0 [ 686.775896][T27002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 686.786198][T27002] Call Trace: [ 686.789602][T27002] __dump_stack+0x21/0x24 [ 686.793973][T27002] dump_stack_lvl+0x1a7/0x208 [ 686.799069][T27002] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 686.805262][T27002] ? show_regs_print_info+0x18/0x18 [ 686.810585][T27002] ? dump_stack+0x9/0x1c [ 686.814886][T27002] ? dump_stack_lvl+0x1/0x208 [ 686.819779][T27002] dump_stack+0x15/0x1c [ 686.824078][T27002] should_fail+0x3c1/0x510 [ 686.828716][T27002] should_fail_alloc_page+0x4f/0x60 [ 686.833951][T27002] __alloc_pages_nodemask+0x119/0x620 [ 686.839454][T27002] ? irq_exit_rcu+0x9/0x10 [ 686.843901][T27002] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 686.849500][T27002] ? _raw_spin_trylock_bh+0x150/0x150 [ 686.855117][T27002] __get_free_pages+0xe/0x30 [ 686.859826][T27002] kasan_populate_vmalloc_pte+0x29/0x120 [ 686.865489][T27002] __apply_to_page_range+0x74e/0x9e0 [ 686.871349][T27002] ? kasan_populate_vmalloc+0x70/0x70 [ 686.876838][T27002] ? kasan_populate_vmalloc+0x70/0x70 [ 686.882316][T27002] apply_to_page_range+0x3b/0x50 [ 686.887274][T27002] kasan_populate_vmalloc+0x60/0x70 [ 686.892500][T27002] alloc_vmap_area+0x18e0/0x1a20 [ 686.897763][T27002] ? vm_map_ram+0x9c0/0x9c0 [ 686.902408][T27002] ? __get_vm_area_node+0x113/0x450 [ 686.907652][T27002] __get_vm_area_node+0x147/0x450 [ 686.912707][T27002] __vmalloc_node_range+0xe0/0x790 [ 686.917953][T27002] ? sock_hash_alloc+0x36c/0x620 [ 686.923118][T27002] ? __vmalloc_node_range+0x1/0x790 [ 686.928448][T27002] bpf_map_area_alloc+0xd5/0xe0 [ 686.933326][T27002] ? sock_hash_alloc+0x36c/0x620 [ 686.938362][T27002] sock_hash_alloc+0x36c/0x620 [ 686.943151][T27002] map_create+0x44e/0x2090 [ 686.947584][T27002] __se_sys_bpf+0x24b/0x740 [ 686.952101][T27002] ? __x64_sys_bpf+0x90/0x90 [ 686.956922][T27002] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 686.963357][T27002] __x64_sys_bpf+0x7b/0x90 [ 686.967891][T27002] do_syscall_64+0x31/0x40 [ 686.972439][T27002] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 686.978555][T27002] RIP: 0033:0x7f25dfe9b799 [ 686.983045][T27002] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 687.002969][T27002] RSP: 002b:00007f25de8f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 687.011583][T27002] RAX: ffffffffffffffda RBX: 00007f25e0114fa0 RCX: 00007f25dfe9b799 [ 687.019568][T27002] RDX: 0000000000000050 RSI: 00002000000005c0 RDI: 0000000000000000 [ 687.027905][T27002] RBP: 00007f25de8f6090 R08: 0000000000000000 R09: 0000000000000000 [ 687.035982][T27002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 687.044058][T27002] R13: 00007f25e0115038 R14: 00007f25e0114fa0 R15: 00007ffe22ca0b98 [ 690.069264][T27105] device syzkaller0 entered promiscuous mode [ 693.004792][T27239] 7B’ç÷ï: renamed from syzkaller0 [ 694.840286][T27288] device syzkaller0 entered promiscuous mode [ 695.085352][T27317] device syzkaller0 entered promiscuous mode [ 695.716465][T27334] bridge0: port 2(bridge_slave_1) entered disabled state [ 695.723770][T27334] bridge0: port 1(bridge_slave_0) entered disabled state [ 695.865728][T27334] bridge0: port 2(bridge_slave_1) entered blocking state [ 695.872989][T27334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 695.880359][T27334] bridge0: port 1(bridge_slave_0) entered blocking state [ 695.887520][T27334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 695.896481][T27334] device bridge0 entered promiscuous mode [ 695.982833][T27340] syzkaller1: tun_chr_ioctl cmd 21731 [ 696.019483][T27340] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 696.120006][T27342] device syzkaller0 entered promiscuous mode [ 696.397598][T27359] FAULT_INJECTION: forcing a failure. [ 696.397598][T27359] name failslab, interval 1, probability 0, space 0, times 0 [ 696.413875][T27359] CPU: 1 PID: 27359 Comm: syz.0.10031 Tainted: G W syzkaller #0 [ 696.423123][T27359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 696.433297][T27359] Call Trace: [ 696.436620][T27359] __dump_stack+0x21/0x24 [ 696.440992][T27359] dump_stack_lvl+0x1a7/0x208 [ 696.445701][T27359] ? show_regs_print_info+0x18/0x18 [ 696.450945][T27359] ? selinux_kernfs_init_security+0x143/0x450 [ 696.457234][T27359] dump_stack+0x15/0x1c [ 696.461451][T27359] should_fail+0x3c1/0x510 [ 696.465911][T27359] ? __kernfs_new_node+0xe3/0x6b0 [ 696.471318][T27359] __should_failslab+0xa4/0xe0 [ 696.476201][T27359] should_failslab+0x9/0x20 [ 696.480767][T27359] kmem_cache_alloc+0x3d/0x2d0 [ 696.485645][T27359] __kernfs_new_node+0xe3/0x6b0 [ 696.490685][T27359] ? __kasan_check_write+0x14/0x20 [ 696.495905][T27359] ? kernfs_new_node+0x260/0x260 [ 696.500972][T27359] ? __kasan_check_write+0x14/0x20 [ 696.506111][T27359] ? up_write+0x57/0x120 [ 696.510411][T27359] kernfs_new_node+0x150/0x260 [ 696.515190][T27359] __kernfs_create_file+0x4e/0x270 [ 696.520435][T27359] sysfs_add_file_mode_ns+0x29a/0x350 [ 696.525836][T27359] internal_create_group+0x495/0xd00 [ 696.531229][T27359] ? __kasan_check_write+0x14/0x20 [ 696.536354][T27359] ? sysfs_create_group+0x30/0x30 [ 696.541701][T27359] ? kernfs_create_link+0x186/0x200 [ 696.546912][T27359] sysfs_create_groups+0x58/0x120 [ 696.551964][T27359] device_add_attrs+0x8c/0x430 [ 696.556772][T27359] ? device_add_class_symlinks+0x27e/0x2c0 [ 696.562831][T27359] device_add+0x504/0xc10 [ 696.567184][T27359] ? device_initialize+0x1e1/0x420 [ 696.572312][T27359] netdev_register_kobject+0x1bc/0x360 [ 696.577815][T27359] ? raw_notifier_call_chain+0xe9/0x100 [ 696.583395][T27359] register_netdevice+0xdf0/0x13e0 [ 696.588924][T27359] ? netif_stacked_transfer_operstate+0x220/0x220 [ 696.595648][T27359] ? get_random_bytes+0x1c/0x30 [ 696.600525][T27359] tun_set_iff+0x812/0xe00 [ 696.604965][T27359] __tun_chr_ioctl+0x82a/0x1d00 [ 696.609939][T27359] ? tun_flow_create+0x320/0x320 [ 696.615100][T27359] ? __fget_files+0x2c4/0x320 [ 696.619801][T27359] tun_chr_ioctl+0x2a/0x40 [ 696.624241][T27359] ? tun_chr_poll+0x6b0/0x6b0 [ 696.629210][T27359] __se_sys_ioctl+0x121/0x1a0 [ 696.633901][T27359] __x64_sys_ioctl+0x7b/0x90 [ 696.638501][T27359] do_syscall_64+0x31/0x40 [ 696.642923][T27359] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 696.648817][T27359] RIP: 0033:0x7f25dfe9b799 [ 696.653338][T27359] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 696.673199][T27359] RSP: 002b:00007f25de8f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 696.682195][T27359] RAX: ffffffffffffffda RBX: 00007f25e0114fa0 RCX: 00007f25dfe9b799 [ 696.690434][T27359] RDX: 0000200000000080 RSI: 00000000400454ca RDI: 0000000000000003 [ 696.698848][T27359] RBP: 00007f25de8f6090 R08: 0000000000000000 R09: 0000000000000000 [ 696.706825][T27359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 696.714920][T27359] R13: 00007f25e0115038 R14: 00007f25e0114fa0 R15: 00007ffe22ca0b98 [ 698.014684][T27398] device veth1_macvtap left promiscuous mode [ 698.257844][T27414] device syzkaller0 entered promiscuous mode [ 698.277162][T27412] device syzkaller0 entered promiscuous mode [ 699.026123][T27468] device syzkaller0 entered promiscuous mode [ 699.555488][T27490] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 699.581405][T27490] syzkaller0: linktype set to 773 [ 699.587825][T27490] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 699.914105][T27498] device syzkaller0 entered promiscuous mode [ 700.127048][T27507] device syzkaller0 entered promiscuous mode [ 702.504762][T27566] device wg2 entered promiscuous mode [ 703.061961][T27587] bond_slave_0: mtu less than device minimum [ 703.159211][T27594] FAULT_INJECTION: forcing a failure. [ 703.159211][T27594] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 703.332425][T27594] CPU: 0 PID: 27594 Comm: syz.1.10115 Tainted: G W syzkaller #0 [ 703.341510][T27594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 703.351590][T27594] Call Trace: [ 703.354914][T27594] __dump_stack+0x21/0x24 [ 703.359445][T27594] dump_stack_lvl+0x1a7/0x208 [ 703.364216][T27594] ? show_regs_print_info+0x18/0x18 [ 703.369645][T27594] ? vfs_write+0xb27/0xdc0 [ 703.374162][T27594] dump_stack+0x15/0x1c [ 703.378613][T27594] should_fail+0x3c1/0x510 [ 703.383174][T27594] should_fail_usercopy+0x1a/0x20 [ 703.388214][T27594] _copy_from_user+0x20/0xd0 [ 703.392820][T27594] __se_sys_bpf+0x1bb/0x740 [ 703.397458][T27594] ? __x64_sys_bpf+0x90/0x90 [ 703.402274][T27594] ? debug_smp_processor_id+0x17/0x20 [ 703.407658][T27594] __x64_sys_bpf+0x7b/0x90 [ 703.412089][T27594] do_syscall_64+0x31/0x40 [ 703.416525][T27594] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 703.422542][T27594] RIP: 0033:0x7ffa2965f799 [ 703.427027][T27594] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 703.446666][T27594] RSP: 002b:00007ffa280ba028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 703.455870][T27594] RAX: ffffffffffffffda RBX: 00007ffa298d8fa0 RCX: 00007ffa2965f799 [ 703.463979][T27594] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 703.471981][T27594] RBP: 00007ffa280ba090 R08: 0000000000000000 R09: 0000000000000000 [ 703.480249][T27594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 703.488233][T27594] R13: 00007ffa298d9038 R14: 00007ffa298d8fa0 R15: 00007ffd4d0a5348 [ 704.342328][T27621] device syzkaller0 entered promiscuous mode [ 705.160251][T27672] device syzkaller0 entered promiscuous mode [ 705.443665][T27689] device syzkaller0 entered promiscuous mode [ 706.442162][T27732] FAULT_INJECTION: forcing a failure. [ 706.442162][T27732] name failslab, interval 1, probability 0, space 0, times 0 [ 706.480979][T27732] CPU: 1 PID: 27732 Comm: syz.2.10161 Tainted: G W syzkaller #0 [ 706.490184][T27732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 706.500640][T27732] Call Trace: [ 706.503970][T27732] __dump_stack+0x21/0x24 [ 706.508323][T27732] dump_stack_lvl+0x1a7/0x208 [ 706.513013][T27732] ? thaw_kernel_threads+0x220/0x220 [ 706.518484][T27732] ? show_regs_print_info+0x18/0x18 [ 706.523728][T27732] dump_stack+0x15/0x1c [ 706.528008][T27732] should_fail+0x3c1/0x510 [ 706.532449][T27732] ? sk_prot_alloc+0xb2/0x340 [ 706.537150][T27732] __should_failslab+0xa4/0xe0 [ 706.541942][T27732] should_failslab+0x9/0x20 [ 706.546471][T27732] __kmalloc+0x60/0x330 [ 706.550650][T27732] sk_prot_alloc+0xb2/0x340 [ 706.555273][T27732] sk_alloc+0x38/0x4e0 [ 706.559367][T27732] ? bpf_ctx_init+0x173/0x1b0 [ 706.564073][T27732] ? _copy_from_user+0x95/0xd0 [ 706.569000][T27732] bpf_prog_test_run_skb+0x2fd/0x10b0 [ 706.574417][T27732] ? __kasan_check_write+0x14/0x20 [ 706.579572][T27732] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 706.585592][T27732] bpf_prog_test_run+0x350/0x3c0 [ 706.590567][T27732] __se_sys_bpf+0x501/0x740 [ 706.595190][T27732] ? __x64_sys_bpf+0x90/0x90 [ 706.600053][T27732] ? debug_smp_processor_id+0x17/0x20 [ 706.605555][T27732] __x64_sys_bpf+0x7b/0x90 [ 706.610004][T27732] do_syscall_64+0x31/0x40 [ 706.614441][T27732] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 706.620347][T27732] RIP: 0033:0x7f505da97799 [ 706.624776][T27732] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 706.644668][T27732] RSP: 002b:00007f505c4f2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 706.653279][T27732] RAX: ffffffffffffffda RBX: 00007f505dd10fa0 RCX: 00007f505da97799 [ 706.661270][T27732] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 706.669347][T27732] RBP: 00007f505c4f2090 R08: 0000000000000000 R09: 0000000000000000 [ 706.677334][T27732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 706.685322][T27732] R13: 00007f505dd11038 R14: 00007f505dd10fa0 R15: 00007ffd420f52c8 [ 706.855916][T27744] device syzkaller0 entered promiscuous mode [ 706.946429][T27750] device syzkaller0 entered promiscuous mode [ 707.689091][T27789] device syzkaller0 entered promiscuous mode [ 708.465468][T27830] device syzkaller0 entered promiscuous mode [ 708.561176][T27834] FAULT_INJECTION: forcing a failure. [ 708.561176][T27834] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 708.601305][T27834] CPU: 0 PID: 27834 Comm: syz.0.10196 Tainted: G W syzkaller #0 [ 708.610494][T27834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 708.621244][T27834] Call Trace: [ 708.624660][T27834] __dump_stack+0x21/0x24 [ 708.629191][T27834] dump_stack_lvl+0x1a7/0x208 [ 708.634246][T27834] ? thaw_kernel_threads+0x220/0x220 [ 708.639679][T27834] ? show_regs_print_info+0x18/0x18 [ 708.645396][T27834] ? proc_fail_nth_read+0x220/0x220 [ 708.650823][T27834] dump_stack+0x15/0x1c [ 708.655200][T27834] should_fail+0x3c1/0x510 [ 708.659647][T27834] should_fail_usercopy+0x1a/0x20 [ 708.664706][T27834] _copy_from_user+0x20/0xd0 [ 708.669462][T27834] perf_copy_attr+0x14c/0x730 [ 708.674570][T27834] __se_sys_perf_event_open+0x100/0x1b90 [ 708.680519][T27834] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 708.687087][T27834] __x64_sys_perf_event_open+0xbf/0xd0 [ 708.692852][T27834] do_syscall_64+0x31/0x40 [ 708.697394][T27834] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 708.703354][T27834] RIP: 0033:0x7f25dfe9b799 [ 708.707794][T27834] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 708.727445][T27834] RSP: 002b:00007f25de8f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 708.736112][T27834] RAX: ffffffffffffffda RBX: 00007f25e0114fa0 RCX: 00007f25dfe9b799 [ 708.744206][T27834] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000380 [ 708.752574][T27834] RBP: 00007f25de8f6090 R08: 0000000000000000 R09: 0000000000000000 [ 708.760932][T27834] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 708.769353][T27834] R13: 00007f25e0115038 R14: 00007f25e0114fa0 R15: 00007ffe22ca0b98 [ 709.616604][T27869] device syzkaller0 entered promiscuous mode [ 709.660005][T27873] FAULT_INJECTION: forcing a failure. [ 709.660005][T27873] name failslab, interval 1, probability 0, space 0, times 0 [ 709.691642][T27873] CPU: 0 PID: 27873 Comm: syz.1.10211 Tainted: G W syzkaller #0 [ 709.700638][T27873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 709.711164][T27873] Call Trace: [ 709.714639][T27873] __dump_stack+0x21/0x24 [ 709.719391][T27873] dump_stack_lvl+0x1a7/0x208 [ 709.724102][T27873] ? show_regs_print_info+0x18/0x18 [ 709.729451][T27873] ? expand_files+0xdc/0x900 [ 709.734125][T27873] dump_stack+0x15/0x1c [ 709.738497][T27873] should_fail+0x3c1/0x510 [ 709.742956][T27873] ? perf_event_alloc+0xd0/0x1990 [ 709.748110][T27873] __should_failslab+0xa4/0xe0 [ 709.752928][T27873] should_failslab+0x9/0x20 [ 709.757461][T27873] kmem_cache_alloc_trace+0x3a/0x2e0 [ 709.762791][T27873] perf_event_alloc+0xd0/0x1990 [ 709.767951][T27873] ? __alloc_fd+0x498/0x530 [ 709.772655][T27873] __se_sys_perf_event_open+0x73a/0x1b90 [ 709.779123][T27873] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 709.784819][T27873] __x64_sys_perf_event_open+0xbf/0xd0 [ 709.790410][T27873] do_syscall_64+0x31/0x40 [ 709.794948][T27873] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 709.801386][T27873] RIP: 0033:0x7ffa2965f799 [ 709.805832][T27873] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 709.825490][T27873] RSP: 002b:00007ffa280ba028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 709.834553][T27873] RAX: ffffffffffffffda RBX: 00007ffa298d8fa0 RCX: 00007ffa2965f799 [ 709.842548][T27873] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000380 [ 709.850617][T27873] RBP: 00007ffa280ba090 R08: 0000000000000000 R09: 0000000000000000 [ 709.858614][T27873] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 709.866735][T27873] R13: 00007ffa298d9038 R14: 00007ffa298d8fa0 R15: 00007ffd4d0a5348 [ 710.210842][T27886] device syzkaller0 entered promiscuous mode [ 710.319464][T27886] syzkaller0: tun_net_xmit 1280 [ 710.369791][T27890] device wg2 entered promiscuous mode [ 710.779093][T27907] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 710.794385][T27907] device syzkaller0 entered promiscuous mode [ 712.314387][T27955] device syzkaller0 entered promiscuous mode [ 712.719560][T27978] FAULT_INJECTION: forcing a failure. [ 712.719560][T27978] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 712.765703][T27974] device syzkaller0 entered promiscuous mode [ 712.788763][T27980] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 712.807288][T27974] syzkaller0: tun_net_xmit 1280 [ 712.812486][T27978] CPU: 0 PID: 27978 Comm: syz.3.10247 Tainted: G W syzkaller #0 [ 712.821906][T27978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 712.832101][T27978] Call Trace: [ 712.835429][T27978] __dump_stack+0x21/0x24 [ 712.839919][T27978] dump_stack_lvl+0x1a7/0x208 [ 712.844641][T27978] ? show_regs_print_info+0x18/0x18 [ 712.849872][T27978] ? queue_stack_map_push_elem+0x540/0x540 [ 712.855702][T27978] dump_stack+0x15/0x1c [ 712.859930][T27978] should_fail+0x3c1/0x510 [ 712.864383][T27978] should_fail_usercopy+0x1a/0x20 [ 712.869545][T27978] _copy_to_user+0x20/0x90 [ 712.873985][T27978] bpf_test_finish+0x1e8/0x3c0 [ 712.878769][T27978] ? convert_skb_to___skb+0x360/0x360 [ 712.884169][T27978] ? convert_skb_to___skb+0x203/0x360 [ 712.889579][T27978] bpf_prog_test_run_skb+0xba4/0x10b0 [ 712.895142][T27978] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 712.901071][T27978] bpf_prog_test_run+0x350/0x3c0 [ 712.906037][T27978] __se_sys_bpf+0x501/0x740 [ 712.910572][T27978] ? __x64_sys_bpf+0x90/0x90 [ 712.915292][T27978] ? debug_smp_processor_id+0x17/0x20 [ 712.920687][T27978] __x64_sys_bpf+0x7b/0x90 [ 712.925137][T27978] do_syscall_64+0x31/0x40 [ 712.929579][T27978] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 712.935489][T27978] RIP: 0033:0x7fd40e5fc799 [ 712.940015][T27978] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 712.959902][T27978] RSP: 002b:00007fd40d057028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 712.968336][T27978] RAX: ffffffffffffffda RBX: 00007fd40e875fa0 RCX: 00007fd40e5fc799 [ 712.976606][T27978] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 712.984707][T27978] RBP: 00007fd40d057090 R08: 0000000000000000 R09: 0000000000000000 [ 712.993059][T27978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 713.001054][T27978] R13: 00007fd40e876038 R14: 00007fd40e875fa0 R15: 00007ffeccf3a338 [ 714.280272][T28050] device syzkaller0 entered promiscuous mode [ 715.043562][T28071] device syzkaller0 entered promiscuous mode [ 717.675538][T28170] device syzkaller0 entered promiscuous mode [ 718.117140][T28195] device syzkaller0 entered promiscuous mode [ 718.487251][T28221] device syzkaller0 entered promiscuous mode [ 719.136132][T28259] device syzkaller0 entered promiscuous mode [ 719.380358][T28274] device syzkaller0 entered promiscuous mode [ 719.421365][T28274] syzkaller0: tun_net_xmit 1280 [ 719.920378][T28306] device syzkaller0 entered promiscuous mode [ 720.349539][T28323] device veth1_macvtap entered promiscuous mode [ 720.401284][ T8354] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 721.041883][T28370] device wg2 left promiscuous mode [ 721.421088][T28384] device syzkaller0 entered promiscuous mode [ 721.675595][T28392] device syzkaller0 entered promiscuous mode [ 721.743386][T28392] syzkaller0: tun_net_xmit 1280 [ 722.374974][T28418] device syzkaller0 entered promiscuous mode [ 722.512663][T28422] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 724.366819][T28513] nr0: port 1(macsec0) entered blocking state [ 724.391296][T28513] nr0: port 1(macsec0) entered disabled state [ 724.428393][T28513] device macsec0 entered promiscuous mode [ 724.555986][T28509] tap0: tun_chr_ioctl cmd 2147767517 [ 724.592766][T28509] tap0: tun_chr_ioctl cmd 1074025675 [ 724.605716][T28509] tap0: persist enabled [ 724.612482][T28509] tap0: tun_chr_ioctl cmd 1074025675 [ 724.621311][T28509] tap0: persist enabled [ 725.625998][T28565] device syzkaller0 entered promiscuous mode [ 726.860590][T28620] device syzkaller0 entered promiscuous mode [ 727.172054][T28650] device syzkaller0 entered promiscuous mode [ 727.503745][T28666] device syzkaller0 entered promiscuous mode [ 730.182388][T28767] device syzkaller0 entered promiscuous mode [ 730.701927][T28792] device syzkaller0 entered promiscuous mode [ 730.724592][T28790] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 730.773678][T28792] syzkaller0: tun_net_xmit 1280 [ 730.906196][T28801] device syzkaller0 entered promiscuous mode [ 731.166215][T28816] device syzkaller0 entered promiscuous mode [ 731.488431][T28838] bridge0: port 2(bridge_slave_1) entered disabled state [ 731.495955][T28838] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.514786][T28838] bridge0: port 2(bridge_slave_1) entered blocking state [ 731.522069][T28838] bridge0: port 2(bridge_slave_1) entered forwarding state [ 731.529647][T28838] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.536978][T28838] bridge0: port 1(bridge_slave_0) entered forwarding state [ 731.546731][T28838] device bridge0 entered promiscuous mode [ 731.857470][T28862] syz.0.10562[28862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 731.857544][T28862] syz.0.10562[28862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 732.050934][T28866] batadv0: tun_chr_ioctl cmd 2148553947 [ 732.431262][T28903] geneve0: tun_chr_ioctl cmd 1074025677 [ 732.459911][T28903] geneve0: linktype set to 1 [ 733.037073][T28930] device syzkaller0 entered promiscuous mode [ 733.339031][T28940] device syzkaller0 entered promiscuous mode [ 734.093371][T28966] device syzkaller0 entered promiscuous mode [ 734.500418][T28993] : port 1(ip6gretap0) entered blocking state [ 734.507511][T28993] : port 1(ip6gretap0) entered disabled state [ 734.520062][T28993] device ip6gretap0 entered promiscuous mode [ 734.560100][T28993] device ip6gretap0 left promiscuous mode [ 734.569583][T28993] : port 1(ip6gretap0) entered disabled state [ 735.426012][T29045] geneve0: tun_chr_ioctl cmd 1074025677 [ 735.431774][T29045] geneve0: linktype set to 1 [ 735.824231][T29089] bridge0: port 2(bridge_slave_1) entered disabled state [ 735.831440][T29089] bridge0: port 1(bridge_slave_0) entered disabled state [ 735.865372][T29089] device bridge0 left promiscuous mode [ 736.281669][T29118] device macsec0 left promiscuous mode [ 736.323835][T29121] device macsec0 entered promiscuous mode [ 736.347958][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 737.766903][T29211] device syzkaller0 entered promiscuous mode [ 737.807881][T29211] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 737.910410][T29225] FAULT_INJECTION: forcing a failure. [ 737.910410][T29225] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 737.941451][T29225] CPU: 1 PID: 29225 Comm: syz.0.10696 Tainted: G W syzkaller #0 [ 737.950474][T29225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 737.960673][T29225] Call Trace: [ 737.964099][T29225] __dump_stack+0x21/0x24 [ 737.968461][T29225] dump_stack_lvl+0x1a7/0x208 [ 737.973179][T29225] ? show_regs_print_info+0x18/0x18 [ 737.978510][T29225] dump_stack+0x15/0x1c [ 737.982701][T29225] should_fail+0x3c1/0x510 [ 737.987148][T29225] should_fail_usercopy+0x1a/0x20 [ 737.992212][T29225] strncpy_from_user+0x24/0x2e0 [ 737.997355][T29225] bpf_prog_load+0x18c/0x14a0 [ 738.002064][T29225] ? avc_has_perm_noaudit+0x260/0x260 [ 738.007456][T29225] ? map_freeze+0x320/0x320 [ 738.012256][T29225] ? vfs_write+0xb27/0xdc0 [ 738.016810][T29225] ? selinux_bpf+0xc7/0xf0 [ 738.021522][T29225] ? security_bpf+0x82/0xa0 [ 738.026198][T29225] __se_sys_bpf+0x49a/0x740 [ 738.030754][T29225] ? __x64_sys_bpf+0x90/0x90 [ 738.035474][T29225] ? debug_smp_processor_id+0x17/0x20 [ 738.040882][T29225] __x64_sys_bpf+0x7b/0x90 [ 738.045329][T29225] do_syscall_64+0x31/0x40 [ 738.049913][T29225] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 738.055915][T29225] RIP: 0033:0x7f25dfe9b799 [ 738.060354][T29225] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 738.080510][T29225] RSP: 002b:00007f25de8f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 738.088948][T29225] RAX: ffffffffffffffda RBX: 00007f25e0114fa0 RCX: 00007f25dfe9b799 [ 738.096958][T29225] RDX: 0000000000000090 RSI: 0000200000000880 RDI: 0000000000000005 [ 738.104958][T29225] RBP: 00007f25de8f6090 R08: 0000000000000000 R09: 0000000000000000 [ 738.113026][T29225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 738.121208][T29225] R13: 00007f25e0115038 R14: 00007f25e0114fa0 R15: 00007ffe22ca0b98 [ 738.151537][T29229] geneve0: tun_chr_ioctl cmd 1074025677 [ 738.168084][T29229] geneve0: linktype set to 1 [ 738.513539][T29249] device syzkaller0 entered promiscuous mode [ 738.594059][T29252] device wg2 left promiscuous mode [ 739.129557][T29278] geneve0: tun_chr_ioctl cmd 1074025677 [ 739.139565][T29278] geneve0: linktype set to 1 [ 739.274415][T29293] device pim6reg1 entered promiscuous mode [ 739.388507][T29292] device syzkaller0 entered promiscuous mode [ 739.531768][T29298] device syzkaller0 entered promiscuous mode [ 742.648357][T29399] device syzkaller0 entered promiscuous mode [ 743.052755][T29416] device syzkaller0 entered promiscuous mode [ 743.079826][T20626] syzkaller0: tun_net_xmit 48 [ 743.410960][T29434] syz.4.10771[29434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 743.411040][T29434] syz.4.10771[29434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 743.947174][T29459] device syzkaller0 entered promiscuous mode [ 744.004971][T29458] syzkaller0: tun_net_xmit 1280 [ 744.657829][T29480] device syzkaller0 entered promiscuous mode [ 745.127552][T29499] device syzkaller0 entered promiscuous mode [ 745.840775][T29523] device syzkaller0 entered promiscuous mode [ 746.686289][T29543] device sit0 entered promiscuous mode [ 748.173196][T29612] device syzkaller0 entered promiscuous mode [ 748.284439][T29617] device syzkaller0 entered promiscuous mode [ 748.323147][T29619] device syzkaller0 entered promiscuous mode [ 748.384970][T29619] syzkaller0: tun_net_xmit 1280 [ 748.583683][T29629] device syzkaller0 entered promiscuous mode [ 749.089872][T29652] bridge0: port 2(bridge_slave_1) entered disabled state [ 749.097287][T29652] bridge0: port 1(bridge_slave_0) entered disabled state [ 749.167706][T29652] device bridge0 left promiscuous mode [ 749.351133][T29657] device syzkaller0 entered promiscuous mode [ 749.849038][T29681] device wg2 left promiscuous mode [ 749.886440][T29674] device wg2 entered promiscuous mode [ 750.010513][T29667] bridge0: port 1(bridge_slave_0) entered blocking state [ 750.055841][T29667] bridge0: port 1(bridge_slave_0) entered disabled state [ 750.075523][T29667] device bridge_slave_0 entered promiscuous mode [ 750.119263][T29667] bridge0: port 2(bridge_slave_1) entered blocking state [ 750.149535][T29667] bridge0: port 2(bridge_slave_1) entered disabled state [ 750.190532][T29667] device bridge_slave_1 entered promiscuous mode [ 750.669607][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 750.690529][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 750.776978][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 750.790078][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 750.799233][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 750.806570][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 750.832952][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 750.853695][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 750.920777][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 750.941288][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 750.948385][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 751.110028][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 751.128019][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 751.164350][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 751.182080][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 751.237462][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 751.337437][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 751.365304][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 751.404346][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 751.440948][T29667] device veth0_vlan entered promiscuous mode [ 751.487318][ T8354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 751.534788][ T8354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 751.561149][T29667] device veth1_macvtap entered promiscuous mode [ 751.604825][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 751.613026][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 751.627984][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 751.682086][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 751.700780][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 751.884822][ T389] device bridge_slave_1 left promiscuous mode [ 751.891992][ T389] bridge0: port 2(bridge_slave_1) entered disabled state [ 751.971783][ T389] device bridge_slave_0 left promiscuous mode [ 751.978111][ T389] bridge0: port 1(bridge_slave_0) entered disabled state [ 752.074205][ T389] device veth1_macvtap left promiscuous mode [ 752.113015][ T389] device veth0_vlan left promiscuous mode [ 752.358432][T29786] device macsec0 entered promiscuous mode [ 752.697202][T29811] device syzkaller0 entered promiscuous mode [ 753.037510][T29842] device syzkaller0 entered promiscuous mode [ 753.428663][T29859] device syzkaller0 entered promiscuous mode [ 754.072220][T29884] device syzkaller0 entered promiscuous mode [ 754.100732][T29884] syzkaller0: tun_net_xmit 1280 [ 754.577313][T29907] device syzkaller0 entered promiscuous mode [ 754.880084][T29925] device syzkaller0 entered promiscuous mode [ 754.915576][T29925] syzkaller0: tun_net_xmit 1280 [ 755.268256][T29947] device syzkaller0 entered promiscuous mode [ 755.400306][T29953] FAULT_INJECTION: forcing a failure. [ 755.400306][T29953] name failslab, interval 1, probability 0, space 0, times 0 [ 755.555939][T29953] CPU: 0 PID: 29953 Comm: syz.0.10952 Tainted: G W syzkaller #0 [ 755.565017][T29953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 755.575225][T29953] Call Trace: [ 755.578602][T29953] __dump_stack+0x21/0x24 [ 755.582993][T29953] dump_stack_lvl+0x1a7/0x208 [ 755.587710][T29953] ? thaw_kernel_threads+0x220/0x220 [ 755.593030][T29953] ? show_regs_print_info+0x18/0x18 [ 755.598477][T29953] ? selinux_capable+0x2b6/0x3b0 [ 755.603792][T29953] ? selinux_capset+0xf0/0xf0 [ 755.609148][T29953] dump_stack+0x15/0x1c [ 755.613428][T29953] should_fail+0x3c1/0x510 [ 755.617970][T29953] ? bpf_map_area_alloc+0x49/0xe0 [ 755.623118][T29953] __should_failslab+0xa4/0xe0 [ 755.627908][T29953] should_failslab+0x9/0x20 [ 755.632430][T29953] __kmalloc+0x60/0x330 [ 755.636609][T29953] ? __kasan_check_write+0x14/0x20 [ 755.641740][T29953] bpf_map_area_alloc+0x49/0xe0 [ 755.646608][T29953] array_map_alloc+0x338/0x7d0 [ 755.651393][T29953] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 755.657365][T29953] ? array_map_alloc_check+0x2c2/0x390 [ 755.663111][T29953] map_create+0x44e/0x2090 [ 755.667560][T29953] __se_sys_bpf+0x24b/0x740 [ 755.672093][T29953] ? __x64_sys_bpf+0x90/0x90 [ 755.676709][T29953] ? __fdget+0x1b3/0x230 [ 755.681185][T29953] ? debug_smp_processor_id+0x17/0x20 [ 755.686679][T29953] __x64_sys_bpf+0x7b/0x90 [ 755.691125][T29953] do_syscall_64+0x31/0x40 [ 755.695572][T29953] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 755.701670][T29953] RIP: 0033:0x7f25dfe9b799 [ 755.706306][T29953] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 755.726381][T29953] RSP: 002b:00007f25de8f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 755.735035][T29953] RAX: ffffffffffffffda RBX: 00007f25e0114fa0 RCX: 00007f25dfe9b799 [ 755.743039][T29953] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 2000000000000000 [ 755.751118][T29953] RBP: 00007f25de8f6090 R08: 0000000000000000 R09: 0000000000000000 [ 755.759120][T29953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 755.767215][T29953] R13: 00007f25e0115038 R14: 00007f25e0114fa0 R15: 00007ffe22ca0b98 [ 756.151532][T29965] bridge0: port 2(bridge_slave_1) entered disabled state [ 756.158789][T29965] bridge0: port 1(bridge_slave_0) entered disabled state [ 756.850872][T29989] FAULT_INJECTION: forcing a failure. [ 756.850872][T29989] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 757.010736][T29989] CPU: 1 PID: 29989 Comm: syz.0.10966 Tainted: G W syzkaller #0 [ 757.019839][T29989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 757.030231][T29989] Call Trace: [ 757.033668][T29989] __dump_stack+0x21/0x24 [ 757.038128][T29989] dump_stack_lvl+0x1a7/0x208 [ 757.042857][T29989] ? thaw_kernel_threads+0x220/0x220 [ 757.048185][T29989] ? vsnprintf+0x189c/0x1990 [ 757.052811][T29989] ? show_regs_print_info+0x18/0x18 [ 757.058048][T29989] dump_stack+0x15/0x1c [ 757.062230][T29989] should_fail+0x3c1/0x510 [ 757.066747][T29989] should_fail_usercopy+0x1a/0x20 [ 757.071787][T29989] _copy_to_user+0x20/0x90 [ 757.076278][T29989] simple_read_from_buffer+0xe9/0x160 [ 757.081847][T29989] proc_fail_nth_read+0x1a6/0x220 [ 757.087207][T29989] ? proc_fault_inject_write+0x310/0x310 [ 757.092859][T29989] ? rw_verify_area+0x1c0/0x360 [ 757.097724][T29989] ? proc_fault_inject_write+0x310/0x310 [ 757.103407][T29989] vfs_read+0x209/0xa60 [ 757.107665][T29989] ? kernel_read+0x70/0x70 [ 757.112182][T29989] ? __kasan_check_write+0x14/0x20 [ 757.117330][T29989] ? mutex_lock+0x92/0xf0 [ 757.121674][T29989] ? mutex_trylock+0xa0/0xa0 [ 757.126317][T29989] ? __fget_files+0x2c4/0x320 [ 757.131012][T29989] ? __fdget_pos+0x2d2/0x380 [ 757.135820][T29989] ? ksys_read+0x71/0x250 [ 757.140164][T29989] ksys_read+0x149/0x250 [ 757.144511][T29989] ? vfs_write+0xdc0/0xdc0 [ 757.149054][T29989] ? __fdget+0x1b3/0x230 [ 757.153325][T29989] ? __kasan_check_read+0x11/0x20 [ 757.158364][T29989] __x64_sys_read+0x7b/0x90 [ 757.163148][T29989] do_syscall_64+0x31/0x40 [ 757.167585][T29989] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 757.173576][T29989] RIP: 0033:0x7f25dfe5bfce [ 757.178110][T29989] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 757.197918][T29989] RSP: 002b:00007f25de8f5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 757.206354][T29989] RAX: ffffffffffffffda RBX: 00007f25de8f66c0 RCX: 00007f25dfe5bfce [ 757.214343][T29989] RDX: 000000000000000f RSI: 00007f25de8f60a0 RDI: 0000000000000005 [ 757.222340][T29989] RBP: 00007f25de8f6090 R08: 0000000000000000 R09: 0000000000000000 [ 757.230443][T29989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 757.238431][T29989] R13: 00007f25e0115038 R14: 00007f25e0114fa0 R15: 00007ffe22ca0b98 [ 758.394504][T30033] device syzkaller0 entered promiscuous mode [ 758.420836][T30033] syzkaller0: tun_net_xmit 1280 [ 759.460651][T30069] device syzkaller0 entered promiscuous mode [ 760.651904][T30109] device syzkaller0 entered promiscuous mode [ 760.775655][T30113] device syzkaller0 entered promiscuous mode [ 762.412685][T30159] device syzkaller0 entered promiscuous mode [ 762.670183][T30171] device pim6reg1 entered promiscuous mode [ 763.950133][T30216] device syzkaller0 entered promiscuous mode [ 765.118607][T30259] device syzkaller0 entered promiscuous mode [ 765.332971][T30270] device syzkaller0 entered promiscuous mode [ 766.618563][T30318] device syzkaller0 entered promiscuous mode [ 766.914035][T30329] device syzkaller0 entered promiscuous mode [ 766.985224][T30329] syzkaller0: tun_net_xmit 1280 [ 767.355991][T30373] syz.2.11102[30373] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 767.496043][T30393] device syzkaller0 entered promiscuous mode [ 768.325647][T30435] device syzkaller0 entered promiscuous mode [ 769.008371][T30452] device veth0_vlan left promiscuous mode [ 769.028363][T30452] device veth0_vlan entered promiscuous mode [ 769.063528][ T8354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 769.072500][ T8354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 769.080247][ T8354] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 769.154757][T30464] device syzkaller0 entered promiscuous mode [ 770.799039][T30545] device syzkaller0 entered promiscuous mode [ 770.933620][T30551] device syzkaller0 entered promiscuous mode [ 770.940855][T20618] syzkaller0: tun_net_xmit 48 [ 771.207843][T30561] device syzkaller0 entered promiscuous mode [ 772.083077][T30587] device syzkaller0 entered promiscuous mode [ 772.126620][T30587] syzkaller0: tun_net_xmit 1280 [ 772.307896][T30597] device syzkaller0 entered promiscuous mode [ 773.185612][T30618] device syzkaller0 entered promiscuous mode [ 773.393096][T30636] device syzkaller0 entered promiscuous mode [ 773.445805][T30634] device syzkaller0 entered promiscuous mode [ 774.594635][T30671] device syzkaller0 entered promiscuous mode [ 775.510764][T30705] device syzkaller0 entered promiscuous mode [ 777.207158][T30764] device syzkaller0 entered promiscuous mode [ 778.368704][T30825] device syzkaller0 entered promiscuous mode [ 778.418437][T30825] syzkaller0: tun_net_xmit 1280 [ 780.027264][T30906] bridge0: port 2(bridge_slave_1) entered disabled state [ 780.035129][T30906] bridge0: port 1(bridge_slave_0) entered disabled state [ 780.205066][T30917] bridge0: port 2(bridge_slave_1) entered blocking state [ 780.212289][T30917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 780.219816][T30917] bridge0: port 1(bridge_slave_0) entered blocking state [ 780.226917][T30917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 780.304682][T30917] device bridge0 entered promiscuous mode [ 780.450517][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 781.299468][T30978] device syzkaller0 entered promiscuous mode [ 781.365903][T30978] syzkaller0: tun_net_xmit 1280 [ 781.571518][T30995] device syzkaller0 entered promiscuous mode [ 783.539864][T31058] device syzkaller0 entered promiscuous mode [ 783.889413][T31072] device wg2 left promiscuous mode [ 784.009245][T31074] device wg2 entered promiscuous mode [ 784.119053][T31081] device veth1_macvtap left promiscuous mode [ 784.134286][T31081] device macsec0 left promiscuous mode [ 784.179691][T31081] device veth1_macvtap entered promiscuous mode [ 784.211149][T31081] device macsec0 entered promiscuous mode [ 784.492802][T31099] device syzkaller0 entered promiscuous mode [ 784.532396][T31103] device syzkaller0 entered promiscuous mode [ 784.563206][T31102] device macsec0 left promiscuous mode [ 784.580592][T31102] device macsec0 entered promiscuous mode [ 784.626789][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 785.125026][T31135] device syzkaller0 entered promiscuous mode [ 785.348978][T31146] device wg2 left promiscuous mode [ 785.381075][T31146] device wg2 entered promiscuous mode [ 786.695120][T31184] bridge0: port 1(bridge_slave_0) entered blocking state [ 786.702409][T31184] bridge0: port 1(bridge_slave_0) entered disabled state [ 786.710834][T31184] device bridge_slave_0 entered promiscuous mode [ 786.759184][T31184] bridge0: port 2(bridge_slave_1) entered blocking state [ 786.786250][T31184] bridge0: port 2(bridge_slave_1) entered disabled state [ 786.797721][T31184] device bridge_slave_1 entered promiscuous mode [ 787.092364][T31200] device syzkaller0 entered promiscuous mode [ 787.550531][T31184] bridge0: port 2(bridge_slave_1) entered blocking state [ 787.557680][T31184] bridge0: port 2(bridge_slave_1) entered forwarding state [ 787.565154][T31184] bridge0: port 1(bridge_slave_0) entered blocking state [ 787.572387][T31184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 787.707751][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 787.740085][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 787.769661][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 787.845934][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 787.902243][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 787.963382][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 787.970471][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 787.986329][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 787.994914][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 788.031782][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 788.038883][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 788.046681][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 788.057015][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 788.174819][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 788.189828][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 788.219753][T31225] FAULT_INJECTION: forcing a failure. [ 788.219753][T31225] name failslab, interval 1, probability 0, space 0, times 0 [ 788.271768][T31225] CPU: 1 PID: 31225 Comm: syz.3.11412 Tainted: G W syzkaller #0 [ 788.280841][T31225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 788.291201][T31225] Call Trace: [ 788.294530][T31225] __dump_stack+0x21/0x24 [ 788.298967][T31225] dump_stack_lvl+0x1a7/0x208 [ 788.303671][T31225] ? show_regs_print_info+0x18/0x18 [ 788.308883][T31225] dump_stack+0x15/0x1c [ 788.313148][T31225] should_fail+0x3c1/0x510 [ 788.317583][T31225] ? kvmalloc_node+0x88/0x130 [ 788.322275][T31225] __should_failslab+0xa4/0xe0 [ 788.327057][T31225] should_failslab+0x9/0x20 [ 788.331605][T31225] __kmalloc+0x60/0x330 [ 788.335781][T31225] kvmalloc_node+0x88/0x130 [ 788.340387][T31225] alloc_netdev_mqs+0x61e/0xc80 [ 788.345258][T31225] __ip_tunnel_create+0x20e/0x390 [ 788.350295][T31225] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 788.356469][T31225] ? ip_tunnel_init_net+0x730/0x730 [ 788.361766][T31225] ? ip_tunnel_ctl+0x1e2/0x1990 [ 788.367034][T31225] ? __sanitizer_cov_trace_const_cmp1+0x30/0x90 [ 788.373324][T31225] ip_tunnel_ctl+0xaef/0x1990 [ 788.378039][T31225] ipgre_tunnel_ctl+0x2a1/0x790 [ 788.382940][T31225] ip_tunnel_ioctl+0x158/0x230 [ 788.387743][T31225] ? ip_tunnel_update+0xca0/0xca0 [ 788.392821][T31225] dev_ifsioc+0x6b4/0xa90 [ 788.397183][T31225] ? dev_ioctl+0xb80/0xb80 [ 788.401672][T31225] dev_ioctl+0x5ea/0xb80 [ 788.405941][T31225] sock_ioctl+0x6ce/0x760 [ 788.410300][T31225] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 788.416498][T31225] ? sock_poll+0x350/0x350 [ 788.421020][T31225] ? security_file_ioctl+0x84/0xa0 [ 788.426520][T31225] ? sock_poll+0x350/0x350 [ 788.430968][T31225] __se_sys_ioctl+0x121/0x1a0 [ 788.435814][T31225] __x64_sys_ioctl+0x7b/0x90 [ 788.440431][T31225] do_syscall_64+0x31/0x40 [ 788.444970][T31225] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 788.450878][T31225] RIP: 0033:0x7fd40e5fc799 [ 788.455312][T31225] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 788.474944][T31225] RSP: 002b:00007fd40d057028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 788.483379][T31225] RAX: ffffffffffffffda RBX: 00007fd40e875fa0 RCX: 00007fd40e5fc799 [ 788.491373][T31225] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000009 [ 788.499568][T31225] RBP: 00007fd40d057090 R08: 0000000000000000 R09: 0000000000000000 [ 788.507855][T31225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 788.515847][T31225] R13: 00007fd40e876038 R14: 00007fd40e875fa0 R15: 00007ffeccf3a338 [ 788.581295][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 788.590557][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 788.923287][T31237] device syzkaller0 entered promiscuous mode [ 788.940450][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 788.968650][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 789.025394][T31184] device veth0_vlan entered promiscuous mode [ 789.111725][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 789.131053][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 789.196834][T31184] device veth1_macvtap entered promiscuous mode [ 789.251391][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 789.294874][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 789.326222][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 789.435451][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 789.464712][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 789.684472][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 789.711100][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 789.785662][T31263] device macsec0 entered promiscuous mode [ 789.825128][T31265] bridge0: port 3(gretap0) entered blocking state [ 789.842005][T31265] bridge0: port 3(gretap0) entered disabled state [ 789.889458][T31265] device gretap0 entered promiscuous mode [ 790.070750][T31275] FAULT_INJECTION: forcing a failure. [ 790.070750][T31275] name failslab, interval 1, probability 0, space 0, times 0 [ 790.116246][T31275] CPU: 1 PID: 31275 Comm: syz.3.11428 Tainted: G W syzkaller #0 [ 790.125594][T31275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 790.136027][T31275] Call Trace: [ 790.139350][T31275] __dump_stack+0x21/0x24 [ 790.143819][T31275] dump_stack_lvl+0x1a7/0x208 [ 790.149050][T31275] ? show_regs_print_info+0x18/0x18 [ 790.154370][T31275] dump_stack+0x15/0x1c [ 790.158999][T31275] should_fail+0x3c1/0x510 [ 790.163481][T31275] ? kvmalloc_node+0x88/0x130 [ 790.168379][T31275] __should_failslab+0xa4/0xe0 [ 790.173186][T31275] should_failslab+0x9/0x20 [ 790.177803][T31275] __kmalloc+0x60/0x330 [ 790.181995][T31275] kvmalloc_node+0x88/0x130 [ 790.186523][T31275] alloc_netdev_mqs+0x844/0xc80 [ 790.191486][T31275] __ip_tunnel_create+0x20e/0x390 [ 790.196646][T31275] ? ip_tunnel_init_net+0x730/0x730 [ 790.201880][T31275] ? ns_capable+0x8c/0xf0 [ 790.206234][T31275] ip_tunnel_ctl+0xaef/0x1990 [ 790.211025][T31275] ipgre_tunnel_ctl+0x2a1/0x790 [ 790.215932][T31275] ip_tunnel_ioctl+0x158/0x230 [ 790.220731][T31275] ? ip_tunnel_update+0xca0/0xca0 [ 790.225901][T31275] dev_ifsioc+0x6b4/0xa90 [ 790.230425][T31275] ? dev_ioctl+0xb80/0xb80 [ 790.235063][T31275] dev_ioctl+0x5ea/0xb80 [ 790.239673][T31275] sock_ioctl+0x6ce/0x760 [ 790.244044][T31275] ? sock_poll+0x350/0x350 [ 790.248513][T31275] ? __fget_files+0x2c4/0x320 [ 790.253310][T31275] ? security_file_ioctl+0x84/0xa0 [ 790.258522][T31275] ? sock_poll+0x350/0x350 [ 790.262965][T31275] __se_sys_ioctl+0x121/0x1a0 [ 790.267749][T31275] __x64_sys_ioctl+0x7b/0x90 [ 790.272356][T31275] do_syscall_64+0x31/0x40 [ 790.276923][T31275] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 790.282870][T31275] RIP: 0033:0x7fd40e5fc799 [ 790.287294][T31275] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 790.306922][T31275] RSP: 002b:00007fd40d057028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 790.315714][T31275] RAX: ffffffffffffffda RBX: 00007fd40e875fa0 RCX: 00007fd40e5fc799 [ 790.323694][T31275] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000009 [ 790.331678][T31275] RBP: 00007fd40d057090 R08: 0000000000000000 R09: 0000000000000000 [ 790.339836][T31275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 790.347906][T31275] R13: 00007fd40e876038 R14: 00007fd40e875fa0 R15: 00007ffeccf3a338 [ 790.472691][T20153] device bridge_slave_1 left promiscuous mode [ 790.481336][T20153] bridge0: port 2(bridge_slave_1) entered disabled state [ 790.495625][T20153] device bridge_slave_0 left promiscuous mode [ 790.534304][T20153] bridge0: port 1(bridge_slave_0) entered disabled state [ 790.575964][T20153] device veth0_vlan left promiscuous mode [ 792.213013][T31337] FAULT_INJECTION: forcing a failure. [ 792.213013][T31337] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 792.261347][T31337] CPU: 0 PID: 31337 Comm: syz.0.11448 Tainted: G W syzkaller #0 [ 792.270529][T31337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 792.280633][T31337] Call Trace: [ 792.283942][T31337] __dump_stack+0x21/0x24 [ 792.288283][T31337] dump_stack_lvl+0x1a7/0x208 [ 792.292968][T31337] ? show_regs_print_info+0x18/0x18 [ 792.298191][T31337] dump_stack+0x15/0x1c [ 792.302451][T31337] should_fail+0x3c1/0x510 [ 792.306874][T31337] should_fail_alloc_page+0x4f/0x60 [ 792.312174][T31337] __alloc_pages_nodemask+0x119/0x620 [ 792.317556][T31337] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 792.323320][T31337] ? irq_exit_rcu+0x9/0x10 [ 792.327760][T31337] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 792.334119][T31337] get_zeroed_page+0x19/0x40 [ 792.338725][T31337] dev_alloc_name_ns+0x46b/0x890 [ 792.343764][T31337] ? kvm_sched_clock_read+0x18/0x40 [ 792.349219][T31337] ? sched_clock_cpu+0x1b/0x3d0 [ 792.354188][T31337] ? dev_alloc_name+0x50/0x50 [ 792.359076][T31337] ? sched_clock_cpu+0x1b/0x3d0 [ 792.363968][T31337] ? dev_get_valid_name+0x51/0x370 [ 792.369085][T31337] dev_get_valid_name+0x1e8/0x370 [ 792.374163][T31337] register_netdevice+0x1dd/0x13e0 [ 792.379368][T31337] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 792.385710][T31337] ? memset+0x35/0x40 [ 792.389701][T31337] ? xdp_rxq_info_reg+0xec/0x2e0 [ 792.394648][T31337] ? netif_stacked_transfer_operstate+0x220/0x220 [ 792.401359][T31337] ? alloc_netdev_mqs+0xa40/0xc80 [ 792.406403][T31337] ? memcpy+0x56/0x70 [ 792.410407][T31337] __ip_tunnel_create+0x2c7/0x390 [ 792.415588][T31337] ? ip_tunnel_init_net+0x730/0x730 [ 792.420810][T31337] ? ns_capable+0x8c/0xf0 [ 792.425175][T31337] ip_tunnel_ctl+0xaef/0x1990 [ 792.429987][T31337] ipgre_tunnel_ctl+0x2a1/0x790 [ 792.434974][T31337] ip_tunnel_ioctl+0x158/0x230 [ 792.439804][T31337] ? sched_clock+0x3a/0x40 [ 792.444230][T31337] ? ip_tunnel_update+0xca0/0xca0 [ 792.449271][T31337] ? full_name_hash+0xa0/0xf0 [ 792.453965][T31337] dev_ifsioc+0x6b4/0xa90 [ 792.458422][T31337] ? dev_ioctl+0xb80/0xb80 [ 792.462868][T31337] ? dev_load+0x34/0xb0 [ 792.467056][T31337] dev_ioctl+0x5ea/0xb80 [ 792.471314][T31337] sock_ioctl+0x6ce/0x760 [ 792.475740][T31337] ? sock_poll+0x350/0x350 [ 792.480251][T31337] ? __fget_files+0x2c4/0x320 [ 792.484942][T31337] ? security_file_ioctl+0x84/0xa0 [ 792.490186][T31337] ? sock_poll+0x350/0x350 [ 792.494616][T31337] __se_sys_ioctl+0x121/0x1a0 [ 792.499305][T31337] __x64_sys_ioctl+0x7b/0x90 [ 792.503910][T31337] do_syscall_64+0x31/0x40 [ 792.508350][T31337] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 792.514442][T31337] RIP: 0033:0x7f25dfe9b799 [ 792.518952][T31337] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 792.538652][T31337] RSP: 002b:00007f25de8f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 792.547251][T31337] RAX: ffffffffffffffda RBX: 00007f25e0114fa0 RCX: 00007f25dfe9b799 [ 792.555230][T31337] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000009 [ 792.563209][T31337] RBP: 00007f25de8f6090 R08: 0000000000000000 R09: 0000000000000000 [ 792.571382][T31337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 792.579582][T31337] R13: 00007f25e0115038 R14: 00007f25e0114fa0 R15: 00007ffe22ca0b98 [ 792.721010][T31351] device syzkaller0 entered promiscuous mode [ 794.410543][T31404] device syzkaller0 entered promiscuous mode [ 796.494527][T31516] device syzkaller0 entered promiscuous mode [ 797.191375][T31549] 7B’ç÷ï: renamed from syzkaller0 [ 798.360212][T31586] device veth1_macvtap left promiscuous mode [ 798.368948][T31586] device macsec0 left promiscuous mode [ 798.533763][T31598] device syzkaller0 entered promiscuous mode [ 798.608755][T31607] device syzkaller0 entered promiscuous mode [ 798.852731][T31627] device veth1_macvtap left promiscuous mode [ 798.862518][T31627] device veth1_macvtap entered promiscuous mode [ 799.216286][T31645] FAULT_INJECTION: forcing a failure. [ 799.216286][T31645] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 799.331967][T31645] CPU: 1 PID: 31645 Comm: syz.4.11556 Tainted: G W syzkaller #0 [ 799.341252][T31645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 799.351436][T31645] Call Trace: [ 799.355003][T31645] __dump_stack+0x21/0x24 [ 799.359647][T31645] dump_stack_lvl+0x1a7/0x208 [ 799.364493][T31645] ? show_regs_print_info+0x18/0x18 [ 799.369771][T31645] ? kstrtouint_from_user+0x1c4/0x220 [ 799.375536][T31645] dump_stack+0x15/0x1c [ 799.379938][T31645] should_fail+0x3c1/0x510 [ 799.384633][T31645] should_fail_usercopy+0x1a/0x20 [ 799.389811][T31645] _copy_from_user+0x20/0xd0 [ 799.394530][T31645] ___sys_recvmsg+0x173/0x5c0 [ 799.399340][T31645] ? __sys_recvmsg+0x270/0x270 [ 799.404893][T31645] ? __fdget+0x1a1/0x230 [ 799.409466][T31645] __x64_sys_recvmsg+0x1f6/0x2c0 [ 799.414715][T31645] ? fput+0x1a/0x20 [ 799.418827][T31645] ? ___sys_recvmsg+0x5c0/0x5c0 [ 799.423861][T31645] ? debug_smp_processor_id+0x17/0x20 [ 799.429420][T31645] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 799.437081][T31645] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 799.442978][T31645] do_syscall_64+0x31/0x40 [ 799.447921][T31645] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 799.453967][T31645] RIP: 0033:0x7f1361ddb799 [ 799.458937][T31645] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 799.479374][T31645] RSP: 002b:00007f1360836028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 799.487956][T31645] RAX: ffffffffffffffda RBX: 00007f1362054fa0 RCX: 00007f1361ddb799 [ 799.496039][T31645] RDX: 0000000000000000 RSI: 0000200000000900 RDI: 0000000000000005 [ 799.504051][T31645] RBP: 00007f1360836090 R08: 0000000000000000 R09: 0000000000000000 [ 799.512124][T31645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 799.520427][T31645] R13: 00007f1362055038 R14: 00007f1362054fa0 R15: 00007ffe60e6daa8 [ 799.643003][T31651] device syzkaller0 entered promiscuous mode [ 799.670125][T31651] syzkaller0: tun_net_xmit 1280 [ 800.045375][T31677] FAULT_INJECTION: forcing a failure. [ 800.045375][T31677] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 800.085294][T31677] CPU: 1 PID: 31677 Comm: syz.0.11570 Tainted: G W syzkaller #0 [ 800.094501][T31677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 800.104611][T31677] Call Trace: [ 800.107938][T31677] __dump_stack+0x21/0x24 [ 800.112326][T31677] dump_stack_lvl+0x1a7/0x208 [ 800.117139][T31677] ? show_regs_print_info+0x18/0x18 [ 800.122354][T31677] ? debug_smp_processor_id+0x17/0x20 [ 800.127875][T31677] ? perf_tp_event+0x8d1/0x9f0 [ 800.132687][T31677] ? kasan_set_free_info+0x23/0x40 [ 800.137890][T31677] dump_stack+0x15/0x1c [ 800.142070][T31677] should_fail+0x3c1/0x510 [ 800.146618][T31677] should_fail_usercopy+0x1a/0x20 [ 800.151685][T31677] _copy_from_user+0x20/0xd0 [ 800.156815][T31677] iovec_from_user+0x1bc/0x2f0 [ 800.161819][T31677] ? kstrtouint_from_user+0x1c4/0x220 [ 800.167420][T31677] __import_iovec+0x71/0x390 [ 800.172094][T31677] ? memset+0x35/0x40 [ 800.176196][T31677] import_iovec+0x7c/0xb0 [ 800.180575][T31677] ___sys_recvmsg+0x4e9/0x5c0 [ 800.185383][T31677] ? __sys_recvmsg+0x270/0x270 [ 800.190271][T31677] ? __fdget+0x1a1/0x230 [ 800.194533][T31677] __x64_sys_recvmsg+0x1f6/0x2c0 [ 800.199577][T31677] ? fput+0x1a/0x20 [ 800.203810][T31677] ? ___sys_recvmsg+0x5c0/0x5c0 [ 800.208683][T31677] ? debug_smp_processor_id+0x17/0x20 [ 800.214078][T31677] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 800.220541][T31677] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 800.226224][T31677] do_syscall_64+0x31/0x40 [ 800.230787][T31677] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 800.237152][T31677] RIP: 0033:0x7f25dfe9b799 [ 800.241691][T31677] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 800.262105][T31677] RSP: 002b:00007f25de8f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 800.270891][T31677] RAX: ffffffffffffffda RBX: 00007f25e0114fa0 RCX: 00007f25dfe9b799 [ 800.278982][T31677] RDX: 0000000000000000 RSI: 0000200000000900 RDI: 0000000000000005 [ 800.287159][T31677] RBP: 00007f25de8f6090 R08: 0000000000000000 R09: 0000000000000000 [ 800.295171][T31677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 800.303173][T31677] R13: 00007f25e0115038 R14: 00007f25e0114fa0 R15: 00007ffe22ca0b98 [ 800.452733][T31695] device syzkaller0 entered promiscuous mode [ 800.465385][T31695] syzkaller0: tun_net_xmit 1280 [ 800.565828][T31711] device syzkaller0 entered promiscuous mode [ 800.650061][T31715] FAULT_INJECTION: forcing a failure. [ 800.650061][T31715] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 800.680372][T31715] CPU: 1 PID: 31715 Comm: syz.3.11584 Tainted: G W syzkaller #0 [ 800.689376][T31715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 800.699555][T31715] Call Trace: [ 800.702938][T31715] __dump_stack+0x21/0x24 [ 800.707296][T31715] dump_stack_lvl+0x1a7/0x208 [ 800.712009][T31715] ? show_regs_print_info+0x18/0x18 [ 800.717319][T31715] ? avc_has_perm+0x27f/0x3d0 [ 800.722046][T31715] ? avc_has_perm_noaudit+0x260/0x260 [ 800.727456][T31715] dump_stack+0x15/0x1c [ 800.731725][T31715] should_fail+0x3c1/0x510 [ 800.736405][T31715] should_fail_usercopy+0x1a/0x20 [ 800.741475][T31715] _copy_to_iter+0x1df/0xa40 [ 800.746197][T31715] ? __kasan_check_write+0x14/0x20 [ 800.751474][T31715] ? __check_object_size+0x2f4/0x3c0 [ 800.756817][T31715] simple_copy_to_iter+0x50/0x70 [ 800.761777][T31715] __skb_datagram_iter+0xdb/0x700 [ 800.766816][T31715] ? tipc_sk_anc_data_recv+0xb3/0x640 [ 800.772356][T31715] ? skb_copy_datagram_iter+0x150/0x150 [ 800.778053][T31715] ? unwind_get_return_address+0x4d/0x90 [ 800.783717][T31715] skb_copy_datagram_iter+0x43/0x150 [ 800.789022][T31715] tipc_recvmsg+0x7b0/0x13c0 [ 800.793635][T31715] ? tipc_send_packet+0xa0/0xa0 [ 800.798502][T31715] ? perf_tp_event+0x8d1/0x9f0 [ 800.803453][T31715] ? kasan_set_track+0x4a/0x70 [ 800.808321][T31715] ? security_socket_recvmsg+0x87/0xb0 [ 800.813887][T31715] ? tipc_send_packet+0xa0/0xa0 [ 800.818829][T31715] ____sys_recvmsg+0x2cd/0x5e0 [ 800.823610][T31715] ? __sys_recvmsg_sock+0x50/0x50 [ 800.828663][T31715] ? import_iovec+0x7c/0xb0 [ 800.833538][T31715] ___sys_recvmsg+0x21a/0x5c0 [ 800.838526][T31715] ? __sys_recvmsg+0x270/0x270 [ 800.843986][T31715] ? __fdget+0x1a1/0x230 [ 800.848446][T31715] __x64_sys_recvmsg+0x1f6/0x2c0 [ 800.853485][T31715] ? fput+0x1a/0x20 [ 800.857327][T31715] ? ___sys_recvmsg+0x5c0/0x5c0 [ 800.862209][T31715] ? debug_smp_processor_id+0x17/0x20 [ 800.867747][T31715] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 800.873831][T31715] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 800.879682][T31715] do_syscall_64+0x31/0x40 [ 800.884132][T31715] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 800.890192][T31715] RIP: 0033:0x7fd40e5fc799 [ 800.894717][T31715] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 800.915051][T31715] RSP: 002b:00007fd40d057028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 800.923563][T31715] RAX: ffffffffffffffda RBX: 00007fd40e875fa0 RCX: 00007fd40e5fc799 [ 800.931557][T31715] RDX: 0000000000000000 RSI: 0000200000000900 RDI: 0000000000000005 [ 800.939622][T31715] RBP: 00007fd40d057090 R08: 0000000000000000 R09: 0000000000000000 [ 800.947601][T31715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 800.955734][T31715] R13: 00007fd40e876038 R14: 00007fd40e875fa0 R15: 00007ffeccf3a338 [ 801.235081][T31744] bridge0: port 2(bridge_slave_1) entered disabled state [ 801.242477][T31744] bridge0: port 1(bridge_slave_0) entered disabled state [ 801.696352][T31755] FAULT_INJECTION: forcing a failure. [ 801.696352][T31755] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 801.741427][T31755] CPU: 1 PID: 31755 Comm: syz.3.11600 Tainted: G W syzkaller #0 [ 801.750513][T31755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 801.760673][T31755] Call Trace: [ 801.764009][T31755] __dump_stack+0x21/0x24 [ 801.768382][T31755] dump_stack_lvl+0x1a7/0x208 [ 801.773201][T31755] ? thaw_kernel_threads+0x220/0x220 [ 801.778501][T31755] ? vsnprintf+0x189c/0x1990 [ 801.783195][T31755] ? show_regs_print_info+0x18/0x18 [ 801.788413][T31755] dump_stack+0x15/0x1c [ 801.792751][T31755] should_fail+0x3c1/0x510 [ 801.797203][T31755] should_fail_usercopy+0x1a/0x20 [ 801.802340][T31755] _copy_to_user+0x20/0x90 [ 801.806796][T31755] simple_read_from_buffer+0xe9/0x160 [ 801.812277][T31755] proc_fail_nth_read+0x1a6/0x220 [ 801.817328][T31755] ? proc_fault_inject_write+0x310/0x310 [ 801.823310][T31755] ? rw_verify_area+0x1c0/0x360 [ 801.828354][T31755] ? proc_fault_inject_write+0x310/0x310 [ 801.834104][T31755] vfs_read+0x209/0xa60 [ 801.838494][T31755] ? kernel_read+0x70/0x70 [ 801.843489][T31755] ? __kasan_check_write+0x14/0x20 [ 801.848635][T31755] ? mutex_lock+0x92/0xf0 [ 801.852997][T31755] ? mutex_trylock+0xa0/0xa0 [ 801.857785][T31755] ? __fget_files+0x2c4/0x320 [ 801.862493][T31755] ? __fdget_pos+0x2d2/0x380 [ 801.867219][T31755] ? ksys_read+0x71/0x250 [ 801.871565][T31755] ksys_read+0x149/0x250 [ 801.875824][T31755] ? vfs_write+0xdc0/0xdc0 [ 801.880350][T31755] ? debug_smp_processor_id+0x17/0x20 [ 801.885756][T31755] __x64_sys_read+0x7b/0x90 [ 801.890304][T31755] do_syscall_64+0x31/0x40 [ 801.895206][T31755] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 801.901224][T31755] RIP: 0033:0x7fd40e5bcfce [ 801.905707][T31755] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 801.925619][T31755] RSP: 002b:00007fd40d056fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 801.934357][T31755] RAX: ffffffffffffffda RBX: 00007fd40d0576c0 RCX: 00007fd40e5bcfce [ 801.942500][T31755] RDX: 000000000000000f RSI: 00007fd40d0570a0 RDI: 0000000000000007 [ 801.950503][T31755] RBP: 00007fd40d057090 R08: 0000000000000000 R09: 0000000000000000 [ 801.958521][T31755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 801.966692][T31755] R13: 00007fd40e876038 R14: 00007fd40e875fa0 R15: 00007ffeccf3a338 [ 802.702317][T31803] device wg2 left promiscuous mode [ 804.190868][T31843] FAULT_INJECTION: forcing a failure. [ 804.190868][T31843] name failslab, interval 1, probability 0, space 0, times 0 [ 804.341257][T31843] CPU: 1 PID: 31843 Comm: syz.2.11629 Tainted: G W syzkaller #0 [ 804.350724][T31843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 804.360890][T31843] Call Trace: [ 804.364210][T31843] __dump_stack+0x21/0x24 [ 804.368555][T31843] dump_stack_lvl+0x1a7/0x208 [ 804.373335][T31843] ? thaw_kernel_threads+0x220/0x220 [ 804.378632][T31843] ? show_regs_print_info+0x18/0x18 [ 804.384042][T31843] ? unwind_get_return_address+0x4d/0x90 [ 804.389799][T31843] ? stack_trace_save+0xf0/0xf0 [ 804.394674][T31843] dump_stack+0x15/0x1c [ 804.398914][T31843] should_fail+0x3c1/0x510 [ 804.403352][T31843] ? __get_vm_area_node+0x113/0x450 [ 804.408578][T31843] __should_failslab+0xa4/0xe0 [ 804.413616][T31843] should_failslab+0x9/0x20 [ 804.418303][T31843] kmem_cache_alloc_trace+0x3a/0x2e0 [ 804.423695][T31843] __get_vm_area_node+0x113/0x450 [ 804.428830][T31843] __vmalloc_node_range+0xe0/0x790 [ 804.434065][T31843] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 804.439660][T31843] ? _kstrtoull+0x3c0/0x4d0 [ 804.444182][T31843] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 804.449747][T31843] __vmalloc+0x79/0x90 [ 804.453952][T31843] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 804.459602][T31843] bpf_prog_alloc_no_stats+0x3b/0x250 [ 804.465165][T31843] ? bpf_prog_alloc+0x17/0x1f0 [ 804.470087][T31843] bpf_prog_alloc+0x21/0x1f0 [ 804.474696][T31843] bpf_prog_load+0x7c4/0x14a0 [ 804.479411][T31843] ? map_freeze+0x320/0x320 [ 804.483917][T31843] ? vfs_write+0xb27/0xdc0 [ 804.488618][T31843] ? perf_trace_kmem_free+0x3f/0x110 [ 804.494108][T31843] ? selinux_bpf+0xc7/0xf0 [ 804.498640][T31843] ? security_bpf+0x82/0xa0 [ 804.503239][T31843] __se_sys_bpf+0x49a/0x740 [ 804.507748][T31843] ? __x64_sys_bpf+0x90/0x90 [ 804.512525][T31843] ? debug_smp_processor_id+0x17/0x20 [ 804.517943][T31843] __x64_sys_bpf+0x7b/0x90 [ 804.522485][T31843] do_syscall_64+0x31/0x40 [ 804.526936][T31843] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 804.532860][T31843] RIP: 0033:0x7f0a42857799 [ 804.537300][T31843] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 804.557446][T31843] RSP: 002b:00007f0a412b2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 804.566072][T31843] RAX: ffffffffffffffda RBX: 00007f0a42ad0fa0 RCX: 00007f0a42857799 [ 804.574069][T31843] RDX: 0000000000000094 RSI: 0000200000000040 RDI: 0000000000000005 [ 804.582260][T31843] RBP: 00007f0a412b2090 R08: 0000000000000000 R09: 0000000000000000 [ 804.590857][T31843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 804.599041][T31843] R13: 00007f0a42ad1038 R14: 00007f0a42ad0fa0 R15: 00007ffee80d1c78 [ 804.616141][T31843] warn_alloc: 1 callbacks suppressed [ 804.616165][T31843] syz.2.11629: vmalloc: allocation failure: 4096 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 804.661389][T31843] CPU: 0 PID: 31843 Comm: syz.2.11629 Tainted: G W syzkaller #0 [ 804.670475][T31843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 804.680822][T31843] Call Trace: [ 804.684157][T31843] __dump_stack+0x21/0x24 [ 804.688613][T31843] dump_stack_lvl+0x1a7/0x208 [ 804.693463][T31843] ? show_regs_print_info+0x18/0x18 [ 804.698884][T31843] ? pr_cont_kernfs_name+0xe3/0xf0 [ 804.704034][T31843] dump_stack+0x15/0x1c [ 804.708319][T31843] warn_alloc+0x1dc/0x200 [ 804.712912][T31843] ? __get_vm_area_node+0x113/0x450 [ 804.718131][T31843] ? zone_watermark_ok_safe+0x250/0x250 [ 804.724017][T31843] ? __get_vm_area_node+0x345/0x450 [ 804.729510][T31843] __vmalloc_node_range+0x27d/0x790 [ 804.734998][T31843] ? _kstrtoull+0x3c0/0x4d0 [ 804.739625][T31843] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 804.746081][T31843] __vmalloc+0x79/0x90 [ 804.750285][T31843] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 804.756365][T31843] bpf_prog_alloc_no_stats+0x3b/0x250 [ 804.762580][T31843] ? bpf_prog_alloc+0x17/0x1f0 [ 804.767463][T31843] bpf_prog_alloc+0x21/0x1f0 [ 804.772087][T31843] bpf_prog_load+0x7c4/0x14a0 [ 804.776797][T31843] ? map_freeze+0x320/0x320 [ 804.781407][T31843] ? vfs_write+0xb27/0xdc0 [ 804.785858][T31843] ? perf_trace_kmem_free+0x3f/0x110 [ 804.791372][T31843] ? selinux_bpf+0xc7/0xf0 [ 804.795808][T31843] ? security_bpf+0x82/0xa0 [ 804.800457][T31843] __se_sys_bpf+0x49a/0x740 [ 804.805267][T31843] ? __x64_sys_bpf+0x90/0x90 [ 804.809986][T31843] ? debug_smp_processor_id+0x17/0x20 [ 804.815478][T31843] __x64_sys_bpf+0x7b/0x90 [ 804.819929][T31843] do_syscall_64+0x31/0x40 [ 804.824374][T31843] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 804.830416][T31843] RIP: 0033:0x7f0a42857799 [ 804.834961][T31843] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 804.855587][T31843] RSP: 002b:00007f0a412b2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 804.864231][T31843] RAX: ffffffffffffffda RBX: 00007f0a42ad0fa0 RCX: 00007f0a42857799 [ 804.872323][T31843] RDX: 0000000000000094 RSI: 0000200000000040 RDI: 0000000000000005 [ 804.880324][T31843] RBP: 00007f0a412b2090 R08: 0000000000000000 R09: 0000000000000000 [ 804.888415][T31843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 804.896855][T31843] R13: 00007f0a42ad1038 R14: 00007f0a42ad0fa0 R15: 00007ffee80d1c78 [ 805.210489][T31843] Mem-Info: [ 805.214152][T31843] active_anon:38 inactive_anon:11498 isolated_anon:0 [ 805.214152][T31843] active_file:26440 inactive_file:3012 isolated_file:0 [ 805.214152][T31843] unevictable:0 dirty:269 writeback:0 [ 805.214152][T31843] slab_reclaimable:7525 slab_unreclaimable:81156 [ 805.214152][T31843] mapped:30164 shmem:162 pagetables:693 bounce:0 [ 805.214152][T31843] free:1548166 free_pcp:1297 free_cma:0 [ 805.252546][T31843] Node 0 active_anon:152kB inactive_anon:45992kB active_file:105760kB inactive_file:12048kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:120656kB dirty:1076kB writeback:0kB shmem:648kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:6752kB all_unreclaimable? no [ 805.290688][T31843] DMA32 free:2983636kB min:62644kB low:78304kB high:93964kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2986532kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:2896kB local_pcp:1432kB free_cma:0kB [ 805.330116][T31843] lowmem_reserve[]: 0 3941 3941 [ 805.335528][T31843] Normal free:3210868kB min:84808kB low:106008kB high:127208kB reserved_highatomic:0KB active_anon:152kB inactive_anon:45960kB active_file:105760kB inactive_file:12048kB unevictable:0kB writepending:1080kB present:5242880kB managed:4036112kB mlocked:0kB pagetables:2780kB bounce:0kB free_pcp:2256kB local_pcp:1028kB free_cma:0kB [ 805.369192][T31843] lowmem_reserve[]: 0 0 0 [ 805.374012][T31843] DMA32: 7*4kB (UM) 5*8kB (M) 5*16kB (M) 8*32kB (UM) 9*64kB (UM) 6*128kB (UM) 6*256kB (UM) 5*512kB (M) 4*1024kB (UM) 4*2048kB (UM) 724*4096kB (M) = 2983636kB [ 805.414736][T31843] Normal: 1100*4kB (UME) 1524*8kB (UME) 1227*16kB (UME) 953*32kB (UME) 1051*64kB (UME) 313*128kB (UM) 127*256kB (UME) 66*512kB (UM) 23*1024kB (UM) 8*2048kB (UME) 716*4096kB (M) = 3213024kB [ 805.457925][T31843] 29614 total pagecache pages [ 805.463331][T31843] 0 pages in swap cache [ 805.467994][T31843] Swap cache stats: add 0, delete 0, find 0/0 [ 805.474331][T31843] Free swap = 124996kB [ 805.478718][T31843] Total swap = 124996kB [ 805.483218][T31843] 2097051 pages RAM [ 805.487445][T31843] 0 pages HighMem/MovableOnly [ 805.492715][T31843] 341390 pages reserved [ 805.497028][T31843] 0 pages cma reserved [ 805.763122][T31881] device syzkaller0 entered promiscuous mode [ 809.318115][T32024] device syzkaller0 entered promiscuous mode [ 809.643873][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 810.027614][T32073] device syzkaller0 entered promiscuous mode [ 810.946666][T32114] device syzkaller0 entered promiscuous mode [ 811.004960][T32121] FAULT_INJECTION: forcing a failure. [ 811.004960][T32121] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 811.024393][T32121] CPU: 1 PID: 32121 Comm: syz.1.11726 Tainted: G W syzkaller #0 [ 811.033478][T32121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 811.043564][T32121] Call Trace: [ 811.046988][T32121] __dump_stack+0x21/0x24 [ 811.051350][T32121] dump_stack_lvl+0x1a7/0x208 [ 811.056059][T32121] ? thaw_kernel_threads+0x220/0x220 [ 811.061363][T32121] ? vsnprintf+0x189c/0x1990 [ 811.066059][T32121] ? show_regs_print_info+0x18/0x18 [ 811.071298][T32121] dump_stack+0x15/0x1c [ 811.075472][T32121] should_fail+0x3c1/0x510 [ 811.080061][T32121] should_fail_usercopy+0x1a/0x20 [ 811.085120][T32121] _copy_to_user+0x20/0x90 [ 811.089661][T32121] simple_read_from_buffer+0xe9/0x160 [ 811.095247][T32121] proc_fail_nth_read+0x1a6/0x220 [ 811.100297][T32121] ? proc_fault_inject_write+0x310/0x310 [ 811.105968][T32121] ? rw_verify_area+0x1c0/0x360 [ 811.110842][T32121] ? proc_fault_inject_write+0x310/0x310 [ 811.116528][T32121] vfs_read+0x209/0xa60 [ 811.120713][T32121] ? kernel_read+0x70/0x70 [ 811.125253][T32121] ? __kasan_check_write+0x14/0x20 [ 811.130419][T32121] ? mutex_lock+0x92/0xf0 [ 811.134778][T32121] ? mutex_trylock+0xa0/0xa0 [ 811.139635][T32121] ? __fget_files+0x2c4/0x320 [ 811.144339][T32121] ? __fdget_pos+0x2d2/0x380 [ 811.148941][T32121] ? ksys_read+0x71/0x250 [ 811.153279][T32121] ksys_read+0x149/0x250 [ 811.157555][T32121] ? vfs_write+0xdc0/0xdc0 [ 811.161998][T32121] ? debug_smp_processor_id+0x17/0x20 [ 811.167469][T32121] __x64_sys_read+0x7b/0x90 [ 811.172014][T32121] do_syscall_64+0x31/0x40 [ 811.176566][T32121] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 811.182468][T32121] RIP: 0033:0x7ffa2961ffce [ 811.186908][T32121] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 811.206640][T32121] RSP: 002b:00007ffa280b9fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 811.215805][T32121] RAX: ffffffffffffffda RBX: 00007ffa280ba6c0 RCX: 00007ffa2961ffce [ 811.223999][T32121] RDX: 000000000000000f RSI: 00007ffa280ba0a0 RDI: 000000000000000a [ 811.232130][T32121] RBP: 00007ffa280ba090 R08: 0000000000000000 R09: 0000000000000000 [ 811.240227][T32121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 811.248503][T32121] R13: 00007ffa298d9038 R14: 00007ffa298d8fa0 R15: 00007ffd4d0a5348 [ 811.652924][T32152] device pimreg0 entered promiscuous mode [ 812.657536][T32193] device syzkaller0 entered promiscuous mode [ 812.903781][T32198] device syzkaller0 entered promiscuous mode [ 813.862456][T32236] device syzkaller0 entered promiscuous mode [ 815.712136][T32291] device sit0 entered promiscuous mode [ 815.932473][T32292] : renamed from bond_slave_0 [ 816.444756][T32311] device syzkaller0 entered promiscuous mode [ 817.105821][T32331] device syzkaller0 entered promiscuous mode [ 818.000832][T32375] device syzkaller0 entered promiscuous mode [ 819.589945][T32426] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 819.596266][T32426] syzkaller0: linktype set to 825 [ 821.099133][T32497] device syzkaller0 entered promiscuous mode [ 822.380846][T32530] device syzkaller0 entered promiscuous mode [ 823.040768][T32562] device syzkaller0 entered promiscuous mode [ 824.150324][T32591] bridge0: port 1(bridge_slave_0) entered blocking state [ 824.162684][T32591] bridge0: port 1(bridge_slave_0) entered disabled state [ 824.171513][T32591] device bridge_slave_0 entered promiscuous mode [ 824.186899][T32591] bridge0: port 2(bridge_slave_1) entered blocking state [ 824.196293][T32591] bridge0: port 2(bridge_slave_1) entered disabled state [ 824.205779][T32591] device bridge_slave_1 entered promiscuous mode [ 824.367387][T32637] device syzkaller0 entered promiscuous mode [ 824.403034][T32637] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 824.509892][T32591] bridge0: port 2(bridge_slave_1) entered blocking state [ 824.517246][T32591] bridge0: port 2(bridge_slave_1) entered forwarding state [ 824.524606][T32591] bridge0: port 1(bridge_slave_0) entered blocking state [ 824.531900][T32591] bridge0: port 1(bridge_slave_0) entered forwarding state [ 824.740403][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 824.753068][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 824.776286][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 824.825326][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 824.836259][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 824.843613][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 824.854857][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 824.863568][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 824.870737][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 824.908569][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 824.921881][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 824.931840][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 824.940330][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 824.960713][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 824.973956][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 824.989599][T32591] device veth0_vlan entered promiscuous mode [ 824.996307][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 825.005235][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 825.017030][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 825.026109][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 825.052456][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 825.067442][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 825.077532][T32591] device veth1_macvtap entered promiscuous mode [ 825.107127][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 825.118827][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 825.130059][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 825.140718][T32651] tun0: tun_chr_ioctl cmd 1074025673 [ 825.161485][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 825.176792][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 825.755547][ T389] device bridge_slave_1 left promiscuous mode [ 825.769000][ T389] bridge0: port 2(bridge_slave_1) entered disabled state [ 825.826140][ T389] device bridge_slave_0 left promiscuous mode [ 825.846633][ T389] bridge0: port 1(bridge_slave_0) entered disabled state [ 825.864201][ T389] device veth1_macvtap left promiscuous mode [ 826.115861][T32697] bridge0: port 2(bridge_slave_1) entered disabled state [ 826.123249][T32697] bridge0: port 1(bridge_slave_0) entered disabled state [ 828.140010][ T326] sock: sock_set_timeout: `syz.4.11953' (pid 326) tries to set negative timeout [ 828.459487][ T348] device syzkaller0 entered promiscuous mode [ 828.567028][ T352] device sit0 entered promiscuous mode [ 830.025182][ T390] device syzkaller0 entered promiscuous mode [ 830.359906][ T411] device syzkaller0 entered promiscuous mode [ 830.963315][ T432] bridge0: port 2(bridge_slave_1) entered blocking state [ 830.970460][ T432] bridge0: port 2(bridge_slave_1) entered listening state [ 830.977757][ T432] bridge0: port 1(bridge_slave_0) entered blocking state [ 830.984855][ T432] bridge0: port 1(bridge_slave_0) entered listening state [ 831.000083][ T432] device bridge0 entered promiscuous mode [ 831.124459][ T437] device syzkaller0 entered promiscuous mode [ 831.702870][ T446] device syzkaller0 entered promiscuous mode [ 832.810943][ T487] device syzkaller0 entered promiscuous mode [ 833.669589][ T524] device syzkaller0 entered promiscuous mode [ 834.162668][ T556] device syzkaller0 entered promiscuous mode [ 834.861406][ T590] device syzkaller0 entered promiscuous mode [ 835.175013][ T624] Ÿë: port 1(veth0_to_team) entered blocking state [ 835.211463][ T624] Ÿë: port 1(veth0_to_team) entered disabled state [ 835.218848][ T624] device veth0_to_team entered promiscuous mode [ 836.090602][ T671] device syzkaller0 entered promiscuous mode [ 836.324816][ T678] device wg2 entered promiscuous mode [ 836.344413][ T683] device veth1_macvtap entered promiscuous mode [ 836.352444][ T683] device macsec0 entered promiscuous mode [ 836.428743][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 836.588538][ T692] device wg2 left promiscuous mode [ 836.697574][ T692] device wg2 entered promiscuous mode [ 837.453139][ T724] device macsec0 entered promiscuous mode [ 840.523445][ T845] device syzkaller0 entered promiscuous mode [ 840.613229][ T862] device syzkaller0 entered promiscuous mode [ 841.142699][ T883] device syzkaller0 entered promiscuous mode [ 841.703456][ T893] device syzkaller0 entered promiscuous mode [ 842.928626][ T940] bridge0: port 1(bridge_slave_0) entered blocking state [ 843.021203][ T940] bridge0: port 1(bridge_slave_0) entered disabled state [ 843.029079][ T940] device bridge_slave_0 entered promiscuous mode [ 843.052534][ T940] bridge0: port 2(bridge_slave_1) entered blocking state [ 843.063859][ T940] bridge0: port 2(bridge_slave_1) entered disabled state [ 843.082633][ T940] device bridge_slave_1 entered promiscuous mode [ 843.126200][ T954] device syzkaller0 entered promiscuous mode [ 843.513165][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 843.527331][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 843.623672][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 843.717757][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 843.742988][ T389] bridge0: port 1(bridge_slave_0) entered blocking state [ 843.750140][ T389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 843.779759][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 843.815130][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 843.868527][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 843.888737][ T389] bridge0: port 2(bridge_slave_1) entered blocking state [ 843.896028][ T389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 844.017862][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 844.073756][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 844.084744][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 844.137868][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 844.168457][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 844.231381][ T940] device veth0_vlan entered promiscuous mode [ 844.265813][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 844.285540][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 844.297910][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 844.313845][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 844.367729][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 844.402825][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 844.450502][ T940] device veth1_macvtap entered promiscuous mode [ 844.466816][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 844.482461][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 844.491778][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 844.524468][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 844.558214][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 844.633229][ T112] device bridge_slave_1 left promiscuous mode [ 844.639567][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 844.701483][ T112] device bridge_slave_0 left promiscuous mode [ 844.707966][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 844.717069][ T112] device veth1_macvtap left promiscuous mode [ 845.125435][ T1048] device syzkaller0 entered promiscuous mode [ 845.144518][ T1048] syzkaller0: tun_net_xmit 1280 [ 845.150381][ T1048] syzkaller0: create flow: hash 4119696263 index 2 [ 845.182589][ T1045] syzkaller0: delete flow: hash 4119696263 index 2 [ 845.479424][ T1063] device syz_tun entered promiscuous mode [ 845.556732][ T1064] device bridge_slave_1 left promiscuous mode [ 845.586440][ T1064] bridge0: port 2(bridge_slave_1) entered disabled state [ 845.618991][ T1064] device bridge_slave_0 left promiscuous mode [ 845.633436][ T1064] bridge0: port 1(bridge_slave_0) entered disabled state [ 845.968235][ T1079] bridge0: port 3(gretap0) entered blocking state [ 845.983452][ T1079] bridge0: port 3(gretap0) entered disabled state [ 846.018895][ T1079] device gretap0 entered promiscuous mode [ 846.744835][ T1111] FAULT_INJECTION: forcing a failure. [ 846.744835][ T1111] name failslab, interval 1, probability 0, space 0, times 0 [ 846.757725][ T1111] CPU: 0 PID: 1111 Comm: syz.4.12231 Tainted: G W syzkaller #0 [ 846.766710][ T1111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 846.776940][ T1111] Call Trace: [ 846.780440][ T1111] __dump_stack+0x21/0x24 [ 846.785255][ T1111] dump_stack_lvl+0x1a7/0x208 [ 846.790117][ T1111] ? show_regs_print_info+0x18/0x18 [ 846.795449][ T1111] dump_stack+0x15/0x1c [ 846.799727][ T1111] should_fail+0x3c1/0x510 [ 846.804446][ T1111] ? alloc_skb_with_frags+0xa2/0x560 [ 846.809869][ T1111] __should_failslab+0xa4/0xe0 [ 846.814676][ T1111] should_failslab+0x9/0x20 [ 846.819300][ T1111] __kmalloc_track_caller+0x5f/0x320 [ 846.824714][ T1111] ? kmem_cache_alloc+0x219/0x2d0 [ 846.829771][ T1111] ? __alloc_skb+0x9e/0x520 [ 846.834389][ T1111] ? alloc_skb_with_frags+0xa2/0x560 [ 846.839698][ T1111] __alloc_skb+0xdc/0x520 [ 846.844093][ T1111] alloc_skb_with_frags+0xa2/0x560 [ 846.849233][ T1111] sock_alloc_send_pskb+0x87f/0x9a0 [ 846.854451][ T1111] ? sock_kzfree_s+0x60/0x60 [ 846.859159][ T1111] ? __kasan_check_write+0x14/0x20 [ 846.864297][ T1111] ? _raw_spin_lock+0x94/0xf0 [ 846.869000][ T1111] ? _raw_spin_trylock_bh+0x150/0x150 [ 846.874406][ T1111] unix_dgram_sendmsg+0x601/0x17e0 [ 846.879902][ T1111] ? selinux_socket_accept+0x570/0x570 [ 846.885391][ T1111] ? unix_dgram_poll+0x630/0x630 [ 846.890436][ T1111] ? ____kasan_slab_free+0x125/0x160 [ 846.895841][ T1111] ? __kasan_slab_free+0x11/0x20 [ 846.900803][ T1111] ? slab_free_freelist_hook+0xc5/0x190 [ 846.906461][ T1111] ? security_socket_sendmsg+0x82/0xa0 [ 846.911982][ T1111] ? unix_dgram_poll+0x630/0x630 [ 846.916957][ T1111] ____sys_sendmsg+0x5b7/0x8f0 [ 846.921756][ T1111] ? __sys_sendmsg_sock+0x40/0x40 [ 846.926803][ T1111] ? import_iovec+0x7c/0xb0 [ 846.931346][ T1111] ___sys_sendmsg+0x236/0x2e0 [ 846.936055][ T1111] ? __sys_sendmsg+0x280/0x280 [ 846.940887][ T1111] ? rw_verify_area+0x1c0/0x360 [ 846.945782][ T1111] ? __fdget+0x1a1/0x230 [ 846.950078][ T1111] __x64_sys_sendmsg+0x1f9/0x2c0 [ 846.955698][ T1111] ? fput+0x1a/0x20 [ 846.959540][ T1111] ? ___sys_sendmsg+0x2e0/0x2e0 [ 846.964438][ T1111] ? debug_smp_processor_id+0x17/0x20 [ 846.969851][ T1111] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 846.976101][ T1111] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 846.981760][ T1111] do_syscall_64+0x31/0x40 [ 846.986295][ T1111] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 846.992306][ T1111] RIP: 0033:0x7f1361ddb799 [ 846.996741][ T1111] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 847.016376][ T1111] RSP: 002b:00007f1360836028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 847.024813][ T1111] RAX: ffffffffffffffda RBX: 00007f1362054fa0 RCX: 00007f1361ddb799 [ 847.033149][ T1111] RDX: 0000000020000000 RSI: 0000200000000100 RDI: 0000000000000008 [ 847.041306][ T1111] RBP: 00007f1360836090 R08: 0000000000000000 R09: 0000000000000000 [ 847.049389][ T1111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 847.057368][ T1111] R13: 00007f1362055038 R14: 00007f1362054fa0 R15: 00007ffe60e6daa8 [ 850.333350][ T1193] device syzkaller0 entered promiscuous mode [ 850.919251][ T1215] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 851.423179][ T1225] bridge0: port 2(bridge_slave_1) entered disabled state [ 851.430613][ T1225] bridge0: port 1(bridge_slave_0) entered disabled state [ 851.589149][ T1227] device syzkaller0 entered promiscuous mode [ 854.820866][ T1343] device sit0 entered promiscuous mode [ 856.342491][ T1393] device veth1_macvtap left promiscuous mode [ 856.621333][ T1402] device veth1_macvtap entered promiscuous mode [ 856.667451][ T1402] device macsec0 entered promiscuous mode [ 856.764960][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 858.693413][ T24] audit: type=1400 audit(1774024086.340:174): avc: denied { setattr } for pid=1463 comm="syz.3.12344" path="/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 859.586635][ T1489] device veth0_vlan left promiscuous mode [ 859.603374][ T1489] device veth0_vlan entered promiscuous mode [ 860.815848][ T1544] device syzkaller0 entered promiscuous mode [ 864.283928][ T1685] device gretap0 left promiscuous mode [ 864.294520][ T1685] bridge0: port 3(gretap0) entered disabled state [ 864.315880][ T1685] device bridge_slave_1 left promiscuous mode [ 864.328647][ T1685] bridge0: port 2(bridge_slave_1) entered disabled state [ 864.336499][ T1685] device bridge_slave_0 left promiscuous mode [ 864.342976][ T1685] bridge0: port 1(bridge_slave_0) entered disabled state [ 864.922181][ T1705] device syzkaller0 entered promiscuous mode [ 867.013959][ T1772] device syzkaller0 entered promiscuous mode [ 868.075024][ T1805] ÿÿÿÿÿÿ: renamed from vlan1 [ 868.511858][ T1825] device syzkaller0 entered promiscuous mode [ 869.147217][ T1847] device sit0 entered promiscuous mode [ 870.049963][ T1869] device syzkaller0 entered promiscuous mode [ 870.795746][ T1882] device syzkaller0 entered promiscuous mode [ 872.648794][ T1947] device syzkaller0 entered promiscuous mode [ 873.730414][ T1990] syz.2.12518[1990] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 873.730484][ T1990] syz.2.12518[1990] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 873.913648][ T1993] device syzkaller0 entered promiscuous mode [ 874.882076][ T2024] device syzkaller0 entered promiscuous mode [ 875.320902][ T2049] bridge0: port 3(veth1) entered blocking state [ 875.333167][ T2049] bridge0: port 3(veth1) entered disabled state [ 875.378006][ T2049] device veth1 entered promiscuous mode [ 875.415894][ T2038] bridge0: port 1(bridge_slave_0) entered blocking state [ 875.446097][ T2038] bridge0: port 1(bridge_slave_0) entered disabled state [ 875.474135][ T2038] device bridge_slave_0 entered promiscuous mode [ 875.486943][ T2049] device veth1 left promiscuous mode [ 875.493193][ T2049] bridge0: port 3(veth1) entered disabled state [ 875.511225][ T2038] bridge0: port 2(bridge_slave_1) entered blocking state [ 875.518835][ T2038] bridge0: port 2(bridge_slave_1) entered disabled state [ 875.560431][ T2038] device bridge_slave_1 entered promiscuous mode [ 875.696742][ T2063] device syzkaller0 entered promiscuous mode [ 875.872382][ T2076] device syzkaller0 entered promiscuous mode [ 875.929986][ T2038] bridge0: port 2(bridge_slave_1) entered blocking state [ 875.937180][ T2038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 875.944938][ T2038] bridge0: port 1(bridge_slave_0) entered blocking state [ 875.952229][ T2038] bridge0: port 1(bridge_slave_0) entered forwarding state [ 876.131548][T20153] bridge0: port 1(bridge_slave_0) entered disabled state [ 876.158498][T20153] bridge0: port 2(bridge_slave_1) entered disabled state [ 876.511350][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 876.530244][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 876.572239][ T2104] device syzkaller0 entered promiscuous mode [ 876.641363][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 876.661361][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 876.671849][T20153] bridge0: port 1(bridge_slave_0) entered blocking state [ 876.679397][T20153] bridge0: port 1(bridge_slave_0) entered forwarding state [ 876.838228][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 876.871737][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 876.930438][T20153] bridge0: port 2(bridge_slave_1) entered blocking state [ 876.937771][T20153] bridge0: port 2(bridge_slave_1) entered forwarding state [ 876.945791][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 876.954431][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 876.963225][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 876.972495][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 876.994743][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 877.004025][T20153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 877.025171][ T2038] device veth0_vlan entered promiscuous mode [ 877.045099][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 877.070745][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 877.088673][ T2038] device veth1_macvtap entered promiscuous mode [ 877.106736][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 877.116085][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 877.126347][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 877.143915][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 877.161787][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 877.186479][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 877.203059][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 877.303473][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 877.346791][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 878.513158][ T389] device gretap0 left promiscuous mode [ 878.529885][ T389] bridge0: port 3(gretap0) entered disabled state [ 878.893383][ T389] nr0: port 1(macsec0) entered disabled state [ 878.915202][ T389] device bridge_slave_1 left promiscuous mode [ 878.961318][ T389] bridge0: port 2(bridge_slave_1) entered disabled state [ 879.026119][ T389] device bridge_slave_0 left promiscuous mode [ 879.052637][ T389] bridge0: port 1(bridge_slave_0) entered disabled state [ 879.141721][ T389] device veth1_macvtap left promiscuous mode [ 880.717443][ T2244] device syzkaller0 entered promiscuous mode [ 885.544129][ T2411] FAULT_INJECTION: forcing a failure. [ 885.544129][ T2411] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 885.632474][ T2411] CPU: 1 PID: 2411 Comm: syz.1.12650 Tainted: G W syzkaller #0 [ 885.641605][ T2411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 885.651867][ T2411] Call Trace: [ 885.655296][ T2411] __dump_stack+0x21/0x24 [ 885.659820][ T2411] dump_stack_lvl+0x1a7/0x208 [ 885.664543][ T2411] ? show_regs_print_info+0x18/0x18 [ 885.670015][ T2411] dump_stack+0x15/0x1c [ 885.674671][ T2411] should_fail+0x3c1/0x510 [ 885.679125][ T2411] should_fail_usercopy+0x1a/0x20 [ 885.684338][ T2411] _copy_from_user+0x20/0xd0 [ 885.688977][ T2411] __se_sys_bpf+0x1bb/0x740 [ 885.693600][ T2411] ? __x64_sys_bpf+0x90/0x90 [ 885.698305][ T2411] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 885.704606][ T2411] __x64_sys_bpf+0x7b/0x90 [ 885.709154][ T2411] do_syscall_64+0x31/0x40 [ 885.713610][ T2411] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 885.719674][ T2411] RIP: 0033:0x7f6a266f4799 [ 885.724115][ T2411] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 885.744405][ T2411] RSP: 002b:00007f6a2514f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 885.752977][ T2411] RAX: ffffffffffffffda RBX: 00007f6a2696dfa0 RCX: 00007f6a266f4799 [ 885.761423][ T2411] RDX: 0000000000000094 RSI: 0000200000000840 RDI: 0000000000000005 [ 885.769450][ T2411] RBP: 00007f6a2514f090 R08: 0000000000000000 R09: 0000000000000000 [ 885.777534][ T2411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 885.785540][ T2411] R13: 00007f6a2696e038 R14: 00007f6a2696dfa0 R15: 00007fffe7ede148 [ 885.886957][ T2417] device macsec0 entered promiscuous mode [ 886.049987][ T2424] device syzkaller0 entered promiscuous mode [ 886.087698][ T2432] device syzkaller0 entered promiscuous mode [ 886.600863][ T2457] FAULT_INJECTION: forcing a failure. [ 886.600863][ T2457] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 886.696605][ T2457] CPU: 0 PID: 2457 Comm: syz.0.12669 Tainted: G W syzkaller #0 [ 886.705661][ T2457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 886.716068][ T2457] Call Trace: [ 886.719411][ T2457] __dump_stack+0x21/0x24 [ 886.723852][ T2457] dump_stack_lvl+0x1a7/0x208 [ 886.728688][ T2457] ? show_regs_print_info+0x18/0x18 [ 886.734025][ T2457] ? __irq_exit_rcu+0x40/0x150 [ 886.738902][ T2457] ? irq_exit_rcu+0x9/0x10 [ 886.743516][ T2457] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 886.749446][ T2457] dump_stack+0x15/0x1c [ 886.753810][ T2457] should_fail+0x3c1/0x510 [ 886.758242][ T2457] should_fail_usercopy+0x1a/0x20 [ 886.763295][ T2457] strncpy_from_user+0x24/0x2e0 [ 886.768283][ T2457] bpf_prog_load+0x18c/0x14a0 [ 886.773277][ T2457] ? avc_has_perm_noaudit+0x260/0x260 [ 886.779064][ T2457] ? map_freeze+0x320/0x320 [ 886.783610][ T2457] ? selinux_bpf+0xc7/0xf0 [ 886.788232][ T2457] ? security_bpf+0x82/0xa0 [ 886.792773][ T2457] __se_sys_bpf+0x49a/0x740 [ 886.797296][ T2457] ? __x64_sys_bpf+0x90/0x90 [ 886.802114][ T2457] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 886.808460][ T2457] ? debug_smp_processor_id+0x17/0x20 [ 886.813863][ T2457] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 886.819961][ T2457] __x64_sys_bpf+0x7b/0x90 [ 886.824594][ T2457] do_syscall_64+0x31/0x40 [ 886.829038][ T2457] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 886.835166][ T2457] RIP: 0033:0x7f46e4265799 [ 886.839692][ T2457] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 886.859735][ T2457] RSP: 002b:00007f46e2cc0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 886.868283][ T2457] RAX: ffffffffffffffda RBX: 00007f46e44defa0 RCX: 00007f46e4265799 [ 886.876724][ T2457] RDX: 0000000000000094 RSI: 0000200000000840 RDI: 0000000000000005 [ 886.884812][ T2457] RBP: 00007f46e2cc0090 R08: 0000000000000000 R09: 0000000000000000 [ 886.892909][ T2457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 886.900908][ T2457] R13: 00007f46e44df038 R14: 00007f46e44defa0 R15: 00007ffe0ec7a978 [ 888.005974][ T2510] FAULT_INJECTION: forcing a failure. [ 888.005974][ T2510] name failslab, interval 1, probability 0, space 0, times 0 [ 888.020155][ T2510] CPU: 0 PID: 2510 Comm: syz.1.12687 Tainted: G W syzkaller #0 [ 888.029161][ T2510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 888.039370][ T2510] Call Trace: [ 888.042692][ T2510] __dump_stack+0x21/0x24 [ 888.047133][ T2510] dump_stack_lvl+0x1a7/0x208 [ 888.051910][ T2510] ? show_regs_print_info+0x18/0x18 [ 888.057125][ T2510] ? printk+0x118/0x130 [ 888.061307][ T2510] dump_stack+0x15/0x1c [ 888.065501][ T2510] should_fail+0x3c1/0x510 [ 888.069946][ T2510] ? __get_vm_area_node+0x113/0x450 [ 888.075255][ T2510] __should_failslab+0xa4/0xe0 [ 888.080060][ T2510] should_failslab+0x9/0x20 [ 888.084588][ T2510] kmem_cache_alloc_trace+0x3a/0x2e0 [ 888.089904][ T2510] __get_vm_area_node+0x113/0x450 [ 888.094954][ T2510] __vmalloc_node_range+0xe0/0x790 [ 888.100173][ T2510] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 888.105746][ T2510] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 888.111313][ T2510] __vmalloc+0x79/0x90 [ 888.115404][ T2510] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 888.121102][ T2510] bpf_prog_alloc_no_stats+0x3b/0x250 [ 888.126587][ T2510] ? bpf_prog_alloc+0x17/0x1f0 [ 888.131375][ T2510] bpf_prog_alloc+0x21/0x1f0 [ 888.135999][ T2510] bpf_prog_load+0x7c4/0x14a0 [ 888.140783][ T2510] ? map_freeze+0x320/0x320 [ 888.145584][ T2510] ? irq_exit_rcu+0x9/0x10 [ 888.150197][ T2510] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 888.156029][ T2510] ? selinux_bpf+0xc7/0xf0 [ 888.160549][ T2510] ? security_bpf+0x82/0xa0 [ 888.165179][ T2510] __se_sys_bpf+0x49a/0x740 [ 888.169787][ T2510] ? __x64_sys_bpf+0x90/0x90 [ 888.174403][ T2510] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 888.180608][ T2510] __x64_sys_bpf+0x7b/0x90 [ 888.185165][ T2510] do_syscall_64+0x31/0x40 [ 888.189701][ T2510] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 888.195969][ T2510] RIP: 0033:0x7f6a266f4799 [ 888.200914][ T2510] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 888.221187][ T2510] RSP: 002b:00007f6a2514f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 888.229872][ T2510] RAX: ffffffffffffffda RBX: 00007f6a2696dfa0 RCX: 00007f6a266f4799 [ 888.237972][ T2510] RDX: 0000000000000094 RSI: 0000200000000840 RDI: 0000000000000005 [ 888.245967][ T2510] RBP: 00007f6a2514f090 R08: 0000000000000000 R09: 0000000000000000 [ 888.253969][ T2510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 888.261973][ T2510] R13: 00007f6a2696e038 R14: 00007f6a2696dfa0 R15: 00007fffe7ede148 [ 888.482793][ T2510] syz.1.12687: vmalloc: allocation failure: 4096 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 888.497727][ T2510] CPU: 0 PID: 2510 Comm: syz.1.12687 Tainted: G W syzkaller #0 [ 888.506942][ T2510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 888.517718][ T2510] Call Trace: [ 888.521055][ T2510] __dump_stack+0x21/0x24 [ 888.525520][ T2510] dump_stack_lvl+0x1a7/0x208 [ 888.530246][ T2510] ? show_regs_print_info+0x18/0x18 [ 888.535484][ T2510] dump_stack+0x15/0x1c [ 888.539842][ T2510] warn_alloc+0x1dc/0x200 [ 888.544384][ T2510] ? __get_vm_area_node+0x113/0x450 [ 888.549614][ T2510] ? zone_watermark_ok_safe+0x250/0x250 [ 888.555274][ T2510] ? __get_vm_area_node+0x345/0x450 [ 888.560488][ T2510] __vmalloc_node_range+0x27d/0x790 [ 888.565696][ T2510] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 888.571446][ T2510] __vmalloc+0x79/0x90 [ 888.575531][ T2510] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 888.581296][ T2510] bpf_prog_alloc_no_stats+0x3b/0x250 [ 888.586703][ T2510] ? bpf_prog_alloc+0x17/0x1f0 [ 888.591592][ T2510] bpf_prog_alloc+0x21/0x1f0 [ 888.596210][ T2510] bpf_prog_load+0x7c4/0x14a0 [ 888.600983][ T2510] ? map_freeze+0x320/0x320 [ 888.605539][ T2510] ? irq_exit_rcu+0x9/0x10 [ 888.610063][ T2510] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 888.615887][ T2510] ? selinux_bpf+0xc7/0xf0 [ 888.620309][ T2510] ? security_bpf+0x82/0xa0 [ 888.624988][ T2510] __se_sys_bpf+0x49a/0x740 [ 888.629592][ T2510] ? __x64_sys_bpf+0x90/0x90 [ 888.634349][ T2510] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 888.640631][ T2510] __x64_sys_bpf+0x7b/0x90 [ 888.645276][ T2510] do_syscall_64+0x31/0x40 [ 888.649725][ T2510] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 888.655631][ T2510] RIP: 0033:0x7f6a266f4799 [ 888.660061][ T2510] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 888.680227][ T2510] RSP: 002b:00007f6a2514f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 888.688808][ T2510] RAX: ffffffffffffffda RBX: 00007f6a2696dfa0 RCX: 00007f6a266f4799 [ 888.697062][ T2510] RDX: 0000000000000094 RSI: 0000200000000840 RDI: 0000000000000005 [ 888.705398][ T2510] RBP: 00007f6a2514f090 R08: 0000000000000000 R09: 0000000000000000 [ 888.713687][ T2510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 888.722314][ T2510] R13: 00007f6a2696e038 R14: 00007f6a2696dfa0 R15: 00007fffe7ede148 [ 888.799785][ T2526] device syzkaller0 entered promiscuous mode [ 888.856726][ T2510] Mem-Info: [ 888.860654][ T2510] active_anon:42 inactive_anon:31870 isolated_anon:0 [ 888.860654][ T2510] active_file:26502 inactive_file:2990 isolated_file:0 [ 888.860654][ T2510] unevictable:0 dirty:425 writeback:0 [ 888.860654][ T2510] slab_reclaimable:7591 slab_unreclaimable:77938 [ 888.860654][ T2510] mapped:38891 shmem:19937 pagetables:754 bounce:0 [ 888.860654][ T2510] free:1533497 free_pcp:1086 free_cma:0 [ 888.952668][ T2510] Node 0 active_anon:168kB inactive_anon:129680kB active_file:106008kB inactive_file:11960kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:155564kB dirty:1700kB writeback:0kB shmem:81748kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:6880kB all_unreclaimable? no [ 889.058515][ T2510] DMA32 free:2983636kB min:62644kB low:78304kB high:93964kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2986532kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:2896kB local_pcp:1464kB free_cma:0kB [ 889.147495][ T2510] lowmem_reserve[]: 0 3941 3941 [ 889.199916][ T2510] Normal free:3147916kB min:84808kB low:106008kB high:127208kB reserved_highatomic:0KB active_anon:168kB inactive_anon:134580kB active_file:106008kB inactive_file:11960kB unevictable:0kB writepending:1700kB present:5242880kB managed:4036112kB mlocked:0kB pagetables:3016kB bounce:0kB free_pcp:1952kB local_pcp:696kB free_cma:0kB [ 889.411056][ T2510] lowmem_reserve[]: 0 0 0 [ 889.440951][ T2510] DMA32: 7*4kB (UM) 5*8kB (M) 5*16kB (M) 8*32kB (UM) 9*64kB (UM) 6*128kB (UM) 6*256kB (UM) 5*512kB (M) 4*1024kB (UM) 4*2048kB (UM) 724*4096kB (M) = 2983636kB [ 889.585660][ T2510] Normal: 33*4kB (E) 787*8kB (UE) 460*16kB (UE) 490*32kB (UE) 629*64kB (UME) 292*128kB (UME) 90*256kB (UM) 67*512kB (UME) 25*1024kB (UME) 8*2048kB (UM) 715*4096kB (M) = 3135068kB [ 889.701234][ T2510] 54835 total pagecache pages [ 889.706165][ T2510] 0 pages in swap cache [ 889.710336][ T2510] Swap cache stats: add 0, delete 0, find 0/0 [ 889.745537][ T2510] Free swap = 124996kB [ 889.749857][ T2510] Total swap = 124996kB [ 889.764811][ T2510] 2097051 pages RAM [ 889.768667][ T2510] 0 pages HighMem/MovableOnly [ 889.787303][ T2510] 341390 pages reserved [ 889.796155][ T2510] 0 pages cma reserved [ 890.554059][ T2591] erspan0: refused to change device tx_queue_len [ 890.682689][ T2596] bridge0: port 2(bridge_slave_1) entered disabled state [ 890.690133][ T2596] bridge0: port 1(bridge_slave_0) entered disabled state [ 893.661242][ T2706] bridge0: port 3(veth0_to_bridge) entered blocking state [ 893.669816][ T2706] bridge0: port 3(veth0_to_bridge) entered disabled state [ 893.687762][ T2706] device veth0_to_bridge entered promiscuous mode [ 895.033646][ T2741] device syzkaller0 entered promiscuous mode [ 896.266323][ T2789] FAULT_INJECTION: forcing a failure. [ 896.266323][ T2789] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 896.291424][ T2789] CPU: 0 PID: 2789 Comm: syz.3.12785 Tainted: G W syzkaller #0 [ 896.300426][ T2789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 896.310828][ T2789] Call Trace: [ 896.314156][ T2789] __dump_stack+0x21/0x24 [ 896.318693][ T2789] dump_stack_lvl+0x1a7/0x208 [ 896.323764][ T2789] ? show_regs_print_info+0x18/0x18 [ 896.329098][ T2789] ? kasan_set_track+0x5b/0x70 [ 896.334340][ T2789] ? avc_ss_reset+0x280/0x280 [ 896.339988][ T2789] ? __kasan_slab_free+0x11/0x20 [ 896.345454][ T2789] dump_stack+0x15/0x1c [ 896.349642][ T2789] should_fail+0x3c1/0x510 [ 896.354334][ T2789] should_fail_usercopy+0x1a/0x20 [ 896.359574][ T2789] _copy_from_user+0x20/0xd0 [ 896.364288][ T2789] br_dev_ioctl+0x145/0x1550 [ 896.368910][ T2789] ? __kasan_check_write+0x14/0x20 [ 896.374057][ T2789] ? br_ioctl_deviceless_stub+0x660/0x660 [ 896.379910][ T2789] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 896.386805][ T2789] ? do_vfs_ioctl+0x1302/0x14c0 [ 896.391920][ T2789] ? full_name_hash+0xa0/0xf0 [ 896.397088][ T2789] dev_ifsioc+0x6b4/0xa90 [ 896.401904][ T2789] ? dev_ioctl+0xb80/0xb80 [ 896.406361][ T2789] dev_ioctl+0x5ea/0xb80 [ 896.410650][ T2789] sock_ioctl+0x6ce/0x760 [ 896.415014][ T2789] ? sock_poll+0x350/0x350 [ 896.419457][ T2789] ? __fget_files+0x2c4/0x320 [ 896.424163][ T2789] ? security_file_ioctl+0x84/0xa0 [ 896.429303][ T2789] ? sock_poll+0x350/0x350 [ 896.433759][ T2789] __se_sys_ioctl+0x121/0x1a0 [ 896.438463][ T2789] __x64_sys_ioctl+0x7b/0x90 [ 896.443502][ T2789] do_syscall_64+0x31/0x40 [ 896.447997][ T2789] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 896.454426][ T2789] RIP: 0033:0x7ff91c4b9799 [ 896.459137][ T2789] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 896.479154][ T2789] RSP: 002b:00007ff91af14028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 896.487913][ T2789] RAX: ffffffffffffffda RBX: 00007ff91c732fa0 RCX: 00007ff91c4b9799 [ 896.495916][ T2789] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000006 [ 896.504055][ T2789] RBP: 00007ff91af14090 R08: 0000000000000000 R09: 0000000000000000 [ 896.512049][ T2789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 896.520034][ T2789] R13: 00007ff91c733038 R14: 00007ff91c732fa0 R15: 00007ffeaa6edaa8 [ 897.241892][ T2821] FAULT_INJECTION: forcing a failure. [ 897.241892][ T2821] name failslab, interval 1, probability 0, space 0, times 0 [ 897.285447][ T2821] CPU: 1 PID: 2821 Comm: syz.1.12797 Tainted: G W syzkaller #0 [ 897.294712][ T2821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 897.305010][ T2821] Call Trace: [ 897.308346][ T2821] __dump_stack+0x21/0x24 [ 897.312900][ T2821] dump_stack_lvl+0x1a7/0x208 [ 897.317631][ T2821] ? thaw_kernel_threads+0x220/0x220 [ 897.322945][ T2821] ? show_regs_print_info+0x18/0x18 [ 897.328188][ T2821] dump_stack+0x15/0x1c [ 897.332375][ T2821] should_fail+0x3c1/0x510 [ 897.336823][ T2821] ? __request_module+0x2c3/0x910 [ 897.342098][ T2821] __should_failslab+0xa4/0xe0 [ 897.346975][ T2821] should_failslab+0x9/0x20 [ 897.351505][ T2821] __kmalloc_track_caller+0x5f/0x320 [ 897.356815][ T2821] kstrdup+0x36/0x70 [ 897.360754][ T2821] __request_module+0x2c3/0x910 [ 897.365633][ T2821] ? selinux_capable+0x2b6/0x3b0 [ 897.370600][ T2821] ? copy_regset_to_user+0x200/0x200 [ 897.375936][ T2821] ? do_vfs_ioctl+0x1302/0x14c0 [ 897.380826][ T2821] ? cap_capable+0x19c/0x220 [ 897.385457][ T2821] ? security_capable+0x87/0xb0 [ 897.390459][ T2821] dev_load+0x5b/0xb0 [ 897.394498][ T2821] dev_ioctl+0x5d7/0xb80 [ 897.398796][ T2821] sock_ioctl+0x6ce/0x760 [ 897.403172][ T2821] ? sock_poll+0x350/0x350 [ 897.407992][ T2821] ? __fget_files+0x2c4/0x320 [ 897.412899][ T2821] ? security_file_ioctl+0x84/0xa0 [ 897.418146][ T2821] ? sock_poll+0x350/0x350 [ 897.422602][ T2821] __se_sys_ioctl+0x121/0x1a0 [ 897.427508][ T2821] __x64_sys_ioctl+0x7b/0x90 [ 897.432404][ T2821] do_syscall_64+0x31/0x40 [ 897.436972][ T2821] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 897.443156][ T2821] RIP: 0033:0x7f6a266f4799 [ 897.447641][ T2821] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 897.467713][ T2821] RSP: 002b:00007f6a2514f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 897.476165][ T2821] RAX: ffffffffffffffda RBX: 00007f6a2696dfa0 RCX: 00007f6a266f4799 [ 897.484263][ T2821] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000006 [ 897.492596][ T2821] RBP: 00007f6a2514f090 R08: 0000000000000000 R09: 0000000000000000 [ 897.500597][ T2821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 897.508689][ T2821] R13: 00007f6a2696e038 R14: 00007f6a2696dfa0 R15: 00007fffe7ede148 [ 897.957356][ T2853] FAULT_INJECTION: forcing a failure. [ 897.957356][ T2853] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 898.051401][ T2853] CPU: 1 PID: 2853 Comm: syz.0.12809 Tainted: G W syzkaller #0 [ 898.060395][ T2853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 898.070662][ T2853] Call Trace: [ 898.073988][ T2853] __dump_stack+0x21/0x24 [ 898.078450][ T2853] dump_stack_lvl+0x1a7/0x208 [ 898.083184][ T2853] ? thaw_kernel_threads+0x220/0x220 [ 898.088530][ T2853] ? vsnprintf+0x189c/0x1990 [ 898.093868][ T2853] ? show_regs_print_info+0x18/0x18 [ 898.099092][ T2853] dump_stack+0x15/0x1c [ 898.103362][ T2853] should_fail+0x3c1/0x510 [ 898.107889][ T2853] should_fail_usercopy+0x1a/0x20 [ 898.112921][ T2853] _copy_to_user+0x20/0x90 [ 898.117346][ T2853] simple_read_from_buffer+0xe9/0x160 [ 898.122733][ T2853] proc_fail_nth_read+0x1a6/0x220 [ 898.127775][ T2853] ? proc_fault_inject_write+0x310/0x310 [ 898.133505][ T2853] ? rw_verify_area+0x1c0/0x360 [ 898.138397][ T2853] ? proc_fault_inject_write+0x310/0x310 [ 898.144227][ T2853] vfs_read+0x209/0xa60 [ 898.148395][ T2853] ? kernel_read+0x70/0x70 [ 898.153010][ T2853] ? __kasan_check_write+0x14/0x20 [ 898.158316][ T2853] ? mutex_lock+0x92/0xf0 [ 898.162734][ T2853] ? mutex_trylock+0xa0/0xa0 [ 898.167324][ T2853] ? __fget_files+0x2c4/0x320 [ 898.172111][ T2853] ? __fdget_pos+0x2d2/0x380 [ 898.176860][ T2853] ? ksys_read+0x71/0x250 [ 898.181373][ T2853] ksys_read+0x149/0x250 [ 898.185640][ T2853] ? vfs_write+0xdc0/0xdc0 [ 898.190165][ T2853] ? debug_smp_processor_id+0x17/0x20 [ 898.195925][ T2853] __x64_sys_read+0x7b/0x90 [ 898.200537][ T2853] do_syscall_64+0x31/0x40 [ 898.204978][ T2853] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 898.210891][ T2853] RIP: 0033:0x7f46e4225fce [ 898.215320][ T2853] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 898.235438][ T2853] RSP: 002b:00007f46e2cbffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 898.244066][ T2853] RAX: ffffffffffffffda RBX: 00007f46e2cc06c0 RCX: 00007f46e4225fce [ 898.252158][ T2853] RDX: 000000000000000f RSI: 00007f46e2cc00a0 RDI: 0000000000000007 [ 898.260488][ T2853] RBP: 00007f46e2cc0090 R08: 0000000000000000 R09: 0000000000000000 [ 898.268558][ T2853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 898.276774][ T2853] R13: 00007f46e44df038 R14: 00007f46e44defa0 R15: 00007ffe0ec7a978 [ 902.941695][ T2971] cgroup: fork rejected by pids controller in /syz0 [ 903.885991][ T3090] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.901146][ T3090] bridge0: port 1(bridge_slave_0) entered disabled state [ 903.908950][ T3090] device bridge_slave_0 entered promiscuous mode [ 903.929621][ T3090] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.938735][ T3090] bridge0: port 2(bridge_slave_1) entered disabled state [ 903.946656][ T3090] device bridge_slave_1 entered promiscuous mode [ 904.177405][ T3109] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 904.224262][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 904.243840][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 904.292181][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 904.313573][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 904.322286][ T389] bridge0: port 1(bridge_slave_0) entered blocking state [ 904.329438][ T389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 904.337984][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 904.346979][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 904.355543][ T389] bridge0: port 2(bridge_slave_1) entered blocking state [ 904.362647][ T389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 904.370451][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 904.379037][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 904.387352][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 904.396199][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 904.425510][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 904.461526][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 904.501603][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 904.513953][ T3090] device veth0_vlan entered promiscuous mode [ 904.538735][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 904.547713][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 904.560305][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 904.577600][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 904.609640][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 904.618550][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 904.630684][ T3090] device veth1_macvtap entered promiscuous mode [ 904.685936][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 904.695047][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 904.704105][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 904.737807][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 904.746665][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 904.944199][ T3143] device syzkaller0 entered promiscuous mode [ 904.961011][ T8354] device veth0_to_bridge left promiscuous mode [ 904.968719][ T8354] bridge0: port 3(veth0_to_bridge) entered disabled state [ 904.978031][ T8354] device bridge_slave_1 left promiscuous mode [ 904.986600][ T8354] bridge0: port 2(bridge_slave_1) entered disabled state [ 904.995595][ T8354] device bridge_slave_0 left promiscuous mode [ 905.004283][ T8354] bridge0: port 1(bridge_slave_0) entered disabled state [ 905.015553][ T8354] device veth0_vlan left promiscuous mode [ 906.002809][ T3189] device syzkaller0 entered promiscuous mode [ 906.861540][ T3221] FAULT_INJECTION: forcing a failure. [ 906.861540][ T3221] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 906.890237][ T3221] CPU: 1 PID: 3221 Comm: syz.3.12905 Tainted: G W syzkaller #0 [ 906.899144][ T3221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 906.909231][ T3221] Call Trace: [ 906.912648][ T3221] __dump_stack+0x21/0x24 [ 906.917090][ T3221] dump_stack_lvl+0x1a7/0x208 [ 906.921893][ T3221] ? show_regs_print_info+0x18/0x18 [ 906.927114][ T3221] ? format_decode+0x1bb/0x1520 [ 906.931983][ T3221] dump_stack+0x15/0x1c [ 906.936163][ T3221] should_fail+0x3c1/0x510 [ 906.940694][ T3221] should_fail_usercopy+0x1a/0x20 [ 906.945758][ T3221] _copy_from_user+0x20/0xd0 [ 906.950464][ T3221] kstrtouint_from_user+0xd3/0x220 [ 906.955868][ T3221] ? kstrtol_from_user+0x2a0/0x2a0 [ 906.961003][ T3221] ? memset+0x35/0x40 [ 906.965008][ T3221] ? avc_policy_seqno+0x1b/0x70 [ 906.969886][ T3221] ? selinux_file_permission+0x2a5/0x510 [ 906.975666][ T3221] proc_fail_nth_write+0x8b/0x200 [ 906.980709][ T3221] ? proc_fail_nth_read+0x220/0x220 [ 906.985931][ T3221] ? rw_verify_area+0x1c0/0x360 [ 906.990811][ T3221] ? proc_fail_nth_read+0x220/0x220 [ 906.996042][ T3221] vfs_write+0x338/0xdc0 [ 907.000307][ T3221] ? kernel_write+0x3c0/0x3c0 [ 907.005001][ T3221] ? __kasan_check_write+0x14/0x20 [ 907.010286][ T3221] ? mutex_lock+0x92/0xf0 [ 907.015047][ T3221] ? mutex_trylock+0xa0/0xa0 [ 907.019730][ T3221] ? __fget_files+0x2c4/0x320 [ 907.024488][ T3221] ? __fdget_pos+0x2d2/0x380 [ 907.029109][ T3221] ? ksys_write+0x71/0x250 [ 907.033639][ T3221] ksys_write+0x149/0x250 [ 907.037991][ T3221] ? __ia32_sys_read+0x90/0x90 [ 907.042801][ T3221] ? debug_smp_processor_id+0x17/0x20 [ 907.048292][ T3221] __x64_sys_write+0x7b/0x90 [ 907.052989][ T3221] do_syscall_64+0x31/0x40 [ 907.057509][ T3221] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 907.063416][ T3221] RIP: 0033:0x7ff91c479fce [ 907.067845][ T3221] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 907.087921][ T3221] RSP: 002b:00007ff91af13fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 907.096601][ T3221] RAX: ffffffffffffffda RBX: 00007ff91af146c0 RCX: 00007ff91c479fce [ 907.104717][ T3221] RDX: 0000000000000001 RSI: 00007ff91af140a0 RDI: 000000000000000a [ 907.112712][ T3221] RBP: 00007ff91af14090 R08: 0000000000000000 R09: 0000000000000000 [ 907.120984][ T3221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 907.128964][ T3221] R13: 00007ff91c733038 R14: 00007ff91c732fa0 R15: 00007ffeaa6edaa8 [ 907.420670][ T3243] device wg2 entered promiscuous mode [ 909.346962][ T3298] device syzkaller0 entered promiscuous mode [ 909.403817][ T3302] FAULT_INJECTION: forcing a failure. [ 909.403817][ T3302] name failslab, interval 1, probability 0, space 0, times 0 [ 909.491569][ T3302] CPU: 0 PID: 3302 Comm: syz.4.12929 Tainted: G W syzkaller #0 [ 909.500490][ T3302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 909.510595][ T3302] Call Trace: [ 909.513942][ T3302] __dump_stack+0x21/0x24 [ 909.518304][ T3302] dump_stack_lvl+0x1a7/0x208 [ 909.523109][ T3302] ? thaw_kernel_threads+0x220/0x220 [ 909.528680][ T3302] ? show_regs_print_info+0x18/0x18 [ 909.533930][ T3302] ? kstrtouint_from_user+0x1c4/0x220 [ 909.539347][ T3302] dump_stack+0x15/0x1c [ 909.543728][ T3302] should_fail+0x3c1/0x510 [ 909.548182][ T3302] ? kernfs_fop_write_iter+0x156/0x400 [ 909.553782][ T3302] __should_failslab+0xa4/0xe0 [ 909.558576][ T3302] should_failslab+0x9/0x20 [ 909.563125][ T3302] __kmalloc+0x60/0x330 [ 909.567324][ T3302] ? fsnotify_perm+0x66/0x4b0 [ 909.572076][ T3302] kernfs_fop_write_iter+0x156/0x400 [ 909.577508][ T3302] ? iov_iter_init+0x3f/0x120 [ 909.582372][ T3302] vfs_write+0x758/0xdc0 [ 909.586789][ T3302] ? kernel_write+0x3c0/0x3c0 [ 909.591591][ T3302] ? mutex_trylock+0xa0/0xa0 [ 909.596209][ T3302] ? __fget_files+0x2c4/0x320 [ 909.600915][ T3302] ? __fdget_pos+0x2d2/0x380 [ 909.605531][ T3302] ? ksys_write+0x71/0x250 [ 909.609983][ T3302] ksys_write+0x149/0x250 [ 909.614454][ T3302] ? __ia32_sys_read+0x90/0x90 [ 909.619247][ T3302] ? debug_smp_processor_id+0x17/0x20 [ 909.624968][ T3302] __x64_sys_write+0x7b/0x90 [ 909.629845][ T3302] do_syscall_64+0x31/0x40 [ 909.634383][ T3302] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 909.640296][ T3302] RIP: 0033:0x7f1361ddb799 [ 909.644756][ T3302] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 909.664576][ T3302] RSP: 002b:00007f1360836028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 909.673052][ T3302] RAX: ffffffffffffffda RBX: 00007f1362054fa0 RCX: 00007f1361ddb799 [ 909.681281][ T3302] RDX: 0000000000000012 RSI: 0000200000000380 RDI: 0000000000000006 [ 909.689565][ T3302] RBP: 00007f1360836090 R08: 0000000000000000 R09: 0000000000000000 [ 909.697563][ T3302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 909.705767][ T3302] R13: 00007f1362055038 R14: 00007f1362054fa0 R15: 00007ffe60e6daa8 [ 910.632987][ T3329] device macsec0 entered promiscuous mode [ 910.947392][ T3346] FAULT_INJECTION: forcing a failure. [ 910.947392][ T3346] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 910.975430][ T3346] CPU: 1 PID: 3346 Comm: syz.0.12947 Tainted: G W syzkaller #0 [ 910.984510][ T3346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 910.994793][ T3346] Call Trace: [ 910.998212][ T3346] __dump_stack+0x21/0x24 [ 911.002712][ T3346] dump_stack_lvl+0x1a7/0x208 [ 911.007411][ T3346] ? thaw_kernel_threads+0x220/0x220 [ 911.012798][ T3346] ? show_regs_print_info+0x18/0x18 [ 911.018130][ T3346] dump_stack+0x15/0x1c [ 911.022447][ T3346] should_fail+0x3c1/0x510 [ 911.026898][ T3346] should_fail_usercopy+0x1a/0x20 [ 911.032104][ T3346] _copy_from_iter+0x1d1/0x9f0 [ 911.037072][ T3346] ? __check_object_size+0x2f4/0x3c0 [ 911.042385][ T3346] kernfs_fop_write_iter+0x1a1/0x400 [ 911.047714][ T3346] ? iov_iter_init+0x3f/0x120 [ 911.052405][ T3346] vfs_write+0x758/0xdc0 [ 911.056703][ T3346] ? kernel_write+0x3c0/0x3c0 [ 911.061541][ T3346] ? mutex_trylock+0xa0/0xa0 [ 911.066150][ T3346] ? __fget_files+0x2c4/0x320 [ 911.070891][ T3346] ? __fdget_pos+0x2d2/0x380 [ 911.075494][ T3346] ? ksys_write+0x71/0x250 [ 911.079920][ T3346] ksys_write+0x149/0x250 [ 911.084264][ T3346] ? __ia32_sys_read+0x90/0x90 [ 911.089073][ T3346] ? debug_smp_processor_id+0x17/0x20 [ 911.095178][ T3346] __x64_sys_write+0x7b/0x90 [ 911.099810][ T3346] do_syscall_64+0x31/0x40 [ 911.104262][ T3346] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 911.110346][ T3346] RIP: 0033:0x7f7fdfc58799 [ 911.114784][ T3346] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 911.134540][ T3346] RSP: 002b:00007f7fde6b3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 911.143042][ T3346] RAX: ffffffffffffffda RBX: 00007f7fdfed1fa0 RCX: 00007f7fdfc58799 [ 911.151057][ T3346] RDX: 0000000000000012 RSI: 0000200000000380 RDI: 0000000000000006 [ 911.159306][ T3346] RBP: 00007f7fde6b3090 R08: 0000000000000000 R09: 0000000000000000 [ 911.167592][ T3346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 911.175707][ T3346] R13: 00007f7fdfed2038 R14: 00007f7fdfed1fa0 R15: 00007ffcddcfcfd8 [ 911.299721][ T3356] device syzkaller0 entered promiscuous mode [ 911.941707][ T3393] FAULT_INJECTION: forcing a failure. [ 911.941707][ T3393] name failslab, interval 1, probability 0, space 0, times 0 [ 911.987904][ T3393] CPU: 1 PID: 3393 Comm: syz.3.12962 Tainted: G W syzkaller #0 [ 911.996807][ T3393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 912.007631][ T3393] Call Trace: [ 912.010954][ T3393] __dump_stack+0x21/0x24 [ 912.015439][ T3393] dump_stack_lvl+0x1a7/0x208 [ 912.020136][ T3393] ? show_regs_print_info+0x18/0x18 [ 912.025359][ T3393] dump_stack+0x15/0x1c [ 912.029640][ T3393] should_fail+0x3c1/0x510 [ 912.034082][ T3393] ? find_css_set+0x966/0x1620 [ 912.038864][ T3393] __should_failslab+0xa4/0xe0 [ 912.043654][ T3393] should_failslab+0x9/0x20 [ 912.048266][ T3393] kmem_cache_alloc_trace+0x3a/0x2e0 [ 912.053692][ T3393] find_css_set+0x966/0x1620 [ 912.058307][ T3393] ? __kasan_check_write+0x14/0x20 [ 912.063528][ T3393] ? cgroup_migrate_prepare_dst+0x8c0/0x8c0 [ 912.069540][ T3393] cgroup_migrate_prepare_dst+0xcc/0x8c0 [ 912.075389][ T3393] cgroup_attach_task+0x298/0x520 [ 912.080430][ T3393] ? cgroup_migrate_execute+0x1020/0x1020 [ 912.086298][ T3393] ? cgroup_attach_task+0x520/0x520 [ 912.091517][ T3393] __cgroup1_procs_write+0x324/0x530 [ 912.097013][ T3393] ? cgroup_pidlist_destroy_work_fn+0x210/0x210 [ 912.103478][ T3393] cgroup1_procs_write+0x2a/0x40 [ 912.108446][ T3393] ? cgroup_pidlist_stop+0x100/0x100 [ 912.113763][ T3393] cgroup_file_write+0x2a5/0x570 [ 912.118855][ T3393] ? cgroup_seqfile_stop+0xc0/0xc0 [ 912.124092][ T3393] ? mutex_lock+0x92/0xf0 [ 912.128564][ T3393] ? mutex_trylock+0xa0/0xa0 [ 912.133198][ T3393] ? __kasan_check_write+0x14/0x20 [ 912.138345][ T3393] kernfs_fop_write_iter+0x2c5/0x400 [ 912.143847][ T3393] ? cgroup_seqfile_stop+0xc0/0xc0 [ 912.149356][ T3393] vfs_write+0x758/0xdc0 [ 912.153740][ T3393] ? perf_trace_kmem_free+0x3f/0x110 [ 912.159161][ T3393] ? kernel_write+0x3c0/0x3c0 [ 912.163889][ T3393] ? mutex_trylock+0xa0/0xa0 [ 912.168514][ T3393] ? __fget_files+0x2c4/0x320 [ 912.173261][ T3393] ? __fdget_pos+0x2d2/0x380 [ 912.177964][ T3393] ? ksys_write+0x71/0x250 [ 912.182411][ T3393] ksys_write+0x149/0x250 [ 912.186902][ T3393] ? __ia32_sys_read+0x90/0x90 [ 912.191689][ T3393] ? debug_smp_processor_id+0x17/0x20 [ 912.197095][ T3393] __x64_sys_write+0x7b/0x90 [ 912.202086][ T3393] do_syscall_64+0x31/0x40 [ 912.206675][ T3393] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 912.212618][ T3393] RIP: 0033:0x7ff91c4b9799 [ 912.217068][ T3393] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 912.236802][ T3393] RSP: 002b:00007ff91af14028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 912.245258][ T3393] RAX: ffffffffffffffda RBX: 00007ff91c732fa0 RCX: 00007ff91c4b9799 [ 912.253502][ T3393] RDX: 0000000000000012 RSI: 0000200000000380 RDI: 0000000000000006 [ 912.261511][ T3393] RBP: 00007ff91af14090 R08: 0000000000000000 R09: 0000000000000000 [ 912.269780][ T3393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 912.277779][ T3393] R13: 00007ff91c733038 R14: 00007ff91c732fa0 R15: 00007ffeaa6edaa8 [ 912.438309][ T3396] device syzkaller0 entered promiscuous mode [ 914.510729][ T3493] device syzkaller0 entered promiscuous mode [ 917.128817][ T3594] FAULT_INJECTION: forcing a failure. [ 917.128817][ T3594] name failslab, interval 1, probability 0, space 0, times 0 [ 917.397384][ T3594] CPU: 0 PID: 3594 Comm: syz.4.13033 Tainted: G W syzkaller #0 [ 917.406440][ T3594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 917.416748][ T3594] Call Trace: [ 917.420081][ T3594] __dump_stack+0x21/0x24 [ 917.424557][ T3594] dump_stack_lvl+0x1a7/0x208 [ 917.429250][ T3594] ? thaw_kernel_threads+0x220/0x220 [ 917.434552][ T3594] ? show_regs_print_info+0x18/0x18 [ 917.440029][ T3594] dump_stack+0x15/0x1c [ 917.444409][ T3594] should_fail+0x3c1/0x510 [ 917.449101][ T3594] ? selinux_sk_alloc_security+0x63/0x140 [ 917.455122][ T3594] __should_failslab+0xa4/0xe0 [ 917.460008][ T3594] should_failslab+0x9/0x20 [ 917.464542][ T3594] kmem_cache_alloc_trace+0x3a/0x2e0 [ 917.469862][ T3594] selinux_sk_alloc_security+0x63/0x140 [ 917.475446][ T3594] security_sk_alloc+0x72/0xa0 [ 917.480251][ T3594] sk_prot_alloc+0x138/0x340 [ 917.484889][ T3594] sk_alloc+0x38/0x4e0 [ 917.488978][ T3594] ? bpf_ctx_init+0x173/0x1b0 [ 917.493766][ T3594] ? _copy_from_user+0x95/0xd0 [ 917.498559][ T3594] bpf_prog_test_run_skb+0x2fd/0x10b0 [ 917.503963][ T3594] ? __kasan_check_write+0x14/0x20 [ 917.509289][ T3594] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 917.515247][ T3594] bpf_prog_test_run+0x350/0x3c0 [ 917.520261][ T3594] __se_sys_bpf+0x501/0x740 [ 917.524906][ T3594] ? __x64_sys_bpf+0x90/0x90 [ 917.529520][ T3594] ? __fdget+0x1b3/0x230 [ 917.533961][ T3594] ? debug_smp_processor_id+0x17/0x20 [ 917.539401][ T3594] __x64_sys_bpf+0x7b/0x90 [ 917.543876][ T3594] do_syscall_64+0x31/0x40 [ 917.548324][ T3594] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 917.554521][ T3594] RIP: 0033:0x7f1361ddb799 [ 917.559077][ T3594] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 917.579288][ T3594] RSP: 002b:00007f1360836028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 917.588114][ T3594] RAX: ffffffffffffffda RBX: 00007f1362054fa0 RCX: 00007f1361ddb799 [ 917.596634][ T3594] RDX: 0000000000000019 RSI: 0000200000000080 RDI: 000000000000000a [ 917.604631][ T3594] RBP: 00007f1360836090 R08: 0000000000000000 R09: 0000000000000000 [ 917.612661][ T3594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 917.620672][ T3594] R13: 00007f1362055038 R14: 00007f1362054fa0 R15: 00007ffe60e6daa8 [ 918.163975][ T3744] device syzkaller0 entered promiscuous mode [ 918.568923][ T3757] bridge0: port 1(bridge_slave_0) entered blocking state [ 918.603094][ T3757] bridge0: port 1(bridge_slave_0) entered disabled state [ 918.614135][ T3757] device bridge_slave_0 entered promiscuous mode [ 918.622140][ T3757] bridge0: port 2(bridge_slave_1) entered blocking state [ 918.629634][ T3757] bridge0: port 2(bridge_slave_1) entered disabled state [ 918.668707][ T3757] device bridge_slave_1 entered promiscuous mode [ 918.959381][ T3768] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 919.012149][ T3768] device syzkaller0 entered promiscuous mode [ 919.339167][ T3776] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 919.386278][ T3776] device syzkaller0 entered promiscuous mode [ 919.434944][ T3789] device syzkaller0 entered promiscuous mode [ 919.520186][ T3137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 919.529523][ T3137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 919.539305][ T3137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 919.548965][ T3137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 919.558650][ T3137] bridge0: port 1(bridge_slave_0) entered blocking state [ 919.566064][ T3137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 919.576684][ T3137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 919.611086][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 919.620358][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 919.629155][ T389] bridge0: port 2(bridge_slave_1) entered blocking state [ 919.636485][ T389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 919.644773][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 919.655263][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 919.684635][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 919.697338][ T3757] device veth0_vlan entered promiscuous mode [ 919.705133][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 919.714369][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 919.722627][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 919.742450][ T300] device veth1_macvtap left promiscuous mode [ 919.749655][ T300] device veth0_vlan left promiscuous mode [ 919.844397][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 919.857662][ T3757] device veth1_macvtap entered promiscuous mode [ 920.014274][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 920.036373][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 920.263633][ T3814] device syzkaller0 entered promiscuous mode [ 920.885132][ T3860] FAULT_INJECTION: forcing a failure. [ 920.885132][ T3860] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 921.001424][ T3860] CPU: 0 PID: 3860 Comm: syz.1.13089 Tainted: G W syzkaller #0 [ 921.010328][ T3860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 921.020624][ T3860] Call Trace: [ 921.024547][ T3860] __dump_stack+0x21/0x24 [ 921.029356][ T3860] dump_stack_lvl+0x1a7/0x208 [ 921.034074][ T3860] ? show_regs_print_info+0x18/0x18 [ 921.039312][ T3860] dump_stack+0x15/0x1c [ 921.043491][ T3860] should_fail+0x3c1/0x510 [ 921.048032][ T3860] should_fail_usercopy+0x1a/0x20 [ 921.053098][ T3860] _copy_to_user+0x20/0x90 [ 921.057546][ T3860] bpf_test_finish+0x165/0x3c0 [ 921.062327][ T3860] ? convert_skb_to___skb+0x360/0x360 [ 921.067740][ T3860] ? convert_skb_to___skb+0x203/0x360 [ 921.073403][ T3860] bpf_prog_test_run_skb+0xba4/0x10b0 [ 921.078805][ T3860] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 921.084724][ T3860] bpf_prog_test_run+0x350/0x3c0 [ 921.089778][ T3860] __se_sys_bpf+0x501/0x740 [ 921.094475][ T3860] ? __x64_sys_bpf+0x90/0x90 [ 921.099087][ T3860] ? __fdget+0x1b3/0x230 [ 921.103447][ T3860] ? debug_smp_processor_id+0x17/0x20 [ 921.108973][ T3860] __x64_sys_bpf+0x7b/0x90 [ 921.113423][ T3860] do_syscall_64+0x31/0x40 [ 921.117868][ T3860] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 921.123811][ T3860] RIP: 0033:0x7f6a266f4799 [ 921.128568][ T3860] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 921.148300][ T3860] RSP: 002b:00007f6a2514f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 921.156869][ T3860] RAX: ffffffffffffffda RBX: 00007f6a2696dfa0 RCX: 00007f6a266f4799 [ 921.164876][ T3860] RDX: 0000000000000019 RSI: 0000200000000080 RDI: 000000000000000a [ 921.172982][ T3860] RBP: 00007f6a2514f090 R08: 0000000000000000 R09: 0000000000000000 [ 921.181154][ T3860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 921.189152][ T3860] R13: 00007f6a2696e038 R14: 00007f6a2696dfa0 R15: 00007fffe7ede148 [ 921.847441][ T3876] device syzkaller0 entered promiscuous mode [ 926.977661][ T3995] bridge0: port 2(bridge_slave_1) entered disabled state [ 926.985225][ T3995] bridge0: port 1(bridge_slave_0) entered disabled state [ 930.004377][ T4102] device aaaaaaaaaaaaaaa entered promiscuous mode [ 933.114518][ T4177] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 933.157054][ T4177] syzkaller0: linktype set to 0 [ 934.261144][ T4204] device team_slave_1 entered promiscuous mode [ 934.301936][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 934.318954][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 934.383409][ T4217] device syzkaller0 entered promiscuous mode [ 934.799820][ T4263] device syzkaller0 entered promiscuous mode [ 935.143644][ T4299] : renamed from bond_slave_0 [ 935.630102][ T4350] device syzkaller0 entered promiscuous mode [ 936.121546][ T4399] device syzkaller0 entered promiscuous mode [ 936.735122][ T4460] device syzkaller0 entered promiscuous mode [ 937.151179][ T24] audit: type=1400 audit(1774024164.760:175): avc: denied { create } for pid=4469 comm="syz.2.13302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 937.566009][ T4519] device wg2 entered promiscuous mode [ 937.882307][ T4553] bridge0: port 2(bridge_slave_1) entered disabled state [ 937.889611][ T4553] bridge0: port 1(bridge_slave_0) entered disabled state [ 937.958128][ T4559] bridge0: port 2(bridge_slave_1) entered blocking state [ 937.965571][ T4559] bridge0: port 2(bridge_slave_1) entered listening state [ 937.972845][ T4559] bridge0: port 1(bridge_slave_0) entered blocking state [ 937.980182][ T4559] bridge0: port 1(bridge_slave_0) entered listening state [ 938.096116][ T4559] device bridge0 entered promiscuous mode [ 939.296342][ T4617] device syzkaller0 entered promiscuous mode [ 939.651372][ T4635] device veth0_vlan left promiscuous mode [ 939.680731][ T4635] device veth0_vlan entered promiscuous mode [ 939.778816][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 939.799559][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 939.894000][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 940.078711][ T4640] device syzkaller0 entered promiscuous mode [ 940.318413][ T4667] device syzkaller0 entered promiscuous mode [ 941.969606][ T4739] device syzkaller0 entered promiscuous mode [ 942.207372][ T4754] batadv0: tun_chr_ioctl cmd 2147767521 [ 942.973379][ T4773] device syzkaller0 entered promiscuous mode [ 943.301074][ T4785] device syzkaller0 entered promiscuous mode [ 943.604358][ T4799] device aaaaaaaaaaaaaaa entered promiscuous mode [ 944.145891][ T4842] device syzkaller0 entered promiscuous mode [ 944.542637][ T24] audit: type=1400 audit(1774024172.180:176): avc: denied { create } for pid=4858 comm="syz.0.13435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 944.892528][ T4876] IPv6: pim6reg1: Disabled Multicast RS [ 946.426038][ T4953] device syzkaller0 entered promiscuous mode [ 946.617255][ T4964] device syzkaller0 entered promiscuous mode [ 946.664526][ T4969] device syzkaller0 entered promiscuous mode [ 946.833383][ T4976] device syzkaller0 entered promiscuous mode [ 947.098951][ T4986] IPv6: pim6reg1: Disabled Multicast RS [ 948.261630][ T5022] device syzkaller0 entered promiscuous mode [ 948.556224][ T5030] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 948.593742][ T5030] team_slave_0: mtu less than device minimum [ 949.930174][ T5086] device syzkaller0 entered promiscuous mode [ 951.718894][ T5139] device syzkaller0 entered promiscuous mode [ 952.801925][ T5180] device syzkaller0 entered promiscuous mode [ 953.226110][ T5220] device syzkaller0 entered promiscuous mode [ 953.411666][ C1] bridge0: port 1(bridge_slave_0) entered learning state [ 953.420034][ C1] bridge0: port 2(bridge_slave_1) entered learning state [ 953.589420][ T5244] device syzkaller0 entered promiscuous mode [ 954.664709][ T5302] device syzkaller0 entered promiscuous mode [ 955.727964][ T5349] device syzkaller0 entered promiscuous mode [ 956.302942][ T5368] device syzkaller0 entered promiscuous mode [ 956.636397][ T5390] device syzkaller0 entered promiscuous mode [ 958.159524][ T5465] device syzkaller0 entered promiscuous mode [ 958.433614][ T5472] device veth0_vlan left promiscuous mode [ 958.473923][ T5472] device veth0_vlan entered promiscuous mode [ 960.260781][ T5567] device sit0 left promiscuous mode [ 960.652950][ T5590] device syzkaller0 entered promiscuous mode [ 966.474406][ T5740] device syzkaller0 entered promiscuous mode [ 967.067364][ T5755] device syzkaller0 entered promiscuous mode [ 967.584009][ T5782] device wg2 entered promiscuous mode [ 967.848188][ T5803] device syzkaller0 entered promiscuous mode [ 967.897647][ T5800] device syzkaller0 entered promiscuous mode [ 968.771115][ C1] bridge0: port 2(bridge_slave_1) entered forwarding state [ 968.778409][ C1] bridge0: topology change detected, propagating [ 968.784872][ C1] bridge0: port 1(bridge_slave_0) entered forwarding state [ 968.792106][ C1] bridge0: topology change detected, propagating [ 968.799508][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 969.913572][ T5899] device syzkaller0 entered promiscuous mode [ 970.191925][ T5910] device veth0_vlan left promiscuous mode [ 970.219363][ T5910] device veth0_vlan entered promiscuous mode [ 970.322000][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 970.340473][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 970.404845][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 970.794740][ T5931] device syzkaller0 entered promiscuous mode [ 970.962856][ T5942] device syzkaller0 entered promiscuous mode [ 972.346769][ T5989] device syzkaller0 entered promiscuous mode [ 972.371266][ T5987] device pim6reg1 entered promiscuous mode [ 973.020029][ T6024] device syzkaller0 entered promiscuous mode [ 973.255145][ T6048] device syzkaller0 entered promiscuous mode [ 974.109140][ T6039] device syzkaller0 entered promiscuous mode [ 980.061178][ T6281] device syzkaller0 entered promiscuous mode [ 980.316638][ T6284] device syzkaller0 entered promiscuous mode [ 980.803399][ T6323] device pim6reg1 entered promiscuous mode [ 981.979594][ T6372] ªªªªªª™™: renamed from vlan0 [ 982.977424][ T6404] tun0: tun_chr_ioctl cmd 1074025678 [ 983.001684][ T6404] tun0: group set to 1 [ 983.067374][ T6404] bridge0: port 2(bridge_slave_1) entered disabled state [ 983.076326][ T6404] bridge0: port 1(bridge_slave_0) entered disabled state [ 983.114196][ T6404] device bridge0 left promiscuous mode [ 983.195788][ T6411] device bridge_slave_1 left promiscuous mode [ 983.211718][ T6411] bridge0: port 2(bridge_slave_1) entered disabled state [ 983.234077][ T6411] device bridge_slave_0 left promiscuous mode [ 983.245872][ T6411] bridge0: port 1(bridge_slave_0) entered disabled state [ 983.427237][ T6422] device syzkaller0 entered promiscuous mode [ 983.663619][ T6426] device syzkaller0 entered promiscuous mode [ 985.346139][ T6506] device syzkaller0 entered promiscuous mode [ 986.551472][ T6567] device syzkaller0 entered promiscuous mode [ 987.089365][ T6589] tun0: tun_chr_ioctl cmd 1074025678 [ 987.098207][ T6589] tun0: group set to 1 [ 987.352479][ T6598] device syzkaller0 entered promiscuous mode [ 988.561362][ T6647] device syzkaller0 entered promiscuous mode [ 990.441496][ T6737] pim6reg0: tun_chr_ioctl cmd 1074025673 [ 990.577726][ T6749] device syzkaller0 entered promiscuous mode [ 990.598112][ T6746] device wg2 entered promiscuous mode [ 992.025779][ T6845] FAULT_INJECTION: forcing a failure. [ 992.025779][ T6845] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 992.061178][ T6845] CPU: 1 PID: 6845 Comm: syz.1.14093 Tainted: G W syzkaller #0 [ 992.070921][ T6845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 992.081252][ T6845] Call Trace: [ 992.084608][ T6845] __dump_stack+0x21/0x24 [ 992.089069][ T6845] dump_stack_lvl+0x1a7/0x208 [ 992.093811][ T6845] ? show_regs_print_info+0x18/0x18 [ 992.099382][ T6845] ? path_openat+0x2970/0x31c0 [ 992.104181][ T6845] dump_stack+0x15/0x1c [ 992.108361][ T6845] should_fail+0x3c1/0x510 [ 992.112964][ T6845] should_fail_usercopy+0x1a/0x20 [ 992.118120][ T6845] _copy_from_user+0x20/0xd0 [ 992.122750][ T6845] __copy_msghdr_from_user+0xc9/0x630 [ 992.128181][ T6845] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 992.133499][ T6845] ? __fsnotify_parent+0x6d2/0x7c0 [ 992.138910][ T6845] ___sys_sendmsg+0x19a/0x2e0 [ 992.143788][ T6845] ? __sys_sendmsg+0x280/0x280 [ 992.148844][ T6845] ? rw_verify_area+0x1c0/0x360 [ 992.153918][ T6845] ? __fdget+0x1a1/0x230 [ 992.158396][ T6845] __x64_sys_sendmsg+0x1f9/0x2c0 [ 992.163344][ T6845] ? fput+0x1a/0x20 [ 992.167358][ T6845] ? ___sys_sendmsg+0x2e0/0x2e0 [ 992.172220][ T6845] ? debug_smp_processor_id+0x17/0x20 [ 992.177605][ T6845] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 992.184047][ T6845] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 992.189716][ T6845] do_syscall_64+0x31/0x40 [ 992.194448][ T6845] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 992.200483][ T6845] RIP: 0033:0x7f6a266f4799 [ 992.205003][ T6845] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 992.225109][ T6845] RSP: 002b:00007f6a2512e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 992.233746][ T6845] RAX: ffffffffffffffda RBX: 00007f6a2696e090 RCX: 00007f6a266f4799 [ 992.241733][ T6845] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000006 [ 992.249712][ T6845] RBP: 00007f6a2512e090 R08: 0000000000000000 R09: 0000000000000000 [ 992.257713][ T6845] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 992.265804][ T6845] R13: 00007f6a2696e128 R14: 00007f6a2696e090 R15: 00007fffe7ede148 [ 992.908339][ T6866] device syzkaller0 entered promiscuous mode [ 995.338619][ T6970] device syzkaller0 entered promiscuous mode [ 995.656153][ T6980] device syzkaller0 entered promiscuous mode [ 995.973433][ T6996] pim6reg0: tun_chr_ioctl cmd 1074025673 [ 996.733688][ T7035] tap0: tun_chr_ioctl cmd 1074025677 [ 996.739249][ T7035] tap0: linktype set to 823 [ 996.793990][ T7052] pim6reg0: tun_chr_ioctl cmd 1074025673 [ 996.940647][ T7064] tun0: tun_chr_ioctl cmd 1074025678 [ 996.951510][ T7064] tun0: group set to 1 [ 997.703495][ T7100] pim6reg0: tun_chr_ioctl cmd 1074025673 [ 998.209796][ T7122] device syzkaller0 entered promiscuous mode [ 998.441253][ C0] syzkaller0 selects TX queue 2, but real number of TX queues is 2 [ 999.006801][ T7163] device syzkaller0 entered promiscuous mode [ 999.507860][ T24] audit: type=1400 audit(1774024227.150:177): avc: denied { create } for pid=7193 comm="syz.3.14216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1001.927182][ T7266] device syzkaller0 entered promiscuous mode [ 1004.039952][ T7350] pim6reg0: tun_chr_ioctl cmd 1074025673 [ 1004.218578][ T7362] Ÿë: port 1(veth0_to_team) entered blocking state [ 1004.231247][ T7362] Ÿë: port 1(veth0_to_team) entered disabled state [ 1004.238717][ T7362] device veth0_to_team entered promiscuous mode [ 1004.259382][ T24] audit: type=1400 audit(1774024231.900:178): avc: denied { read } for pid=7369 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1004.323800][ T7377] device wg2 left promiscuous mode [ 1004.522970][ T7388] device syzkaller0 entered promiscuous mode Stopping sshd: stopped /usr/sbin/sshd (pid 186) OK Stopping crond: stopped /usr/sbin/crond (pid 179) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 133) [ 1004.843706][ T24] audit: type=1400 audit(1774024232.490:179): avc: denied { search } for pid=7411 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 1005.004994][ T24] audit: type=1400 audit(1774024232.650:180): avc: denied { write } for pid=134 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=411 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1005.071059][ T24] audit: type=1400 audit(1774024232.650:181): avc: denied { remove_name } for pid=134 comm="dhcpcd" name="sock" dev="tmpfs" ino=413 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 1005.141560][ T24] audit: type=1400 audit(1774024232.650:182): avc: denied { unlink } for pid=134 comm="dhcpcd" name="sock" dev="tmpfs" ino=413 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 Stopping iptables: OK Stopping system message bus: [ 1005.226486][ T24] audit: type=1400 audit(1774024232.680:183): avc: denied { unlink } for pid=134 comm="dhcpcd" name="pid" dev="tmpfs" ino=412 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1005.309632][ T24] audit: type=1400 audit(1774024232.830:184): avc: denied { search } for pid=7437 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1005.371157][ T24] audit: type=1400 audit(1774024232.830:185): avc: denied { write } for pid=7437 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1005.400342][ T7453] device syzkaller0 entered promiscuous mode done [ 1005.455007][ T24] audit: type=1400 audit(1774024232.830:186): avc: denied { add_name } for pid=7437 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1005.517265][ T24] audit: type=1400 audit(1774024232.830:187): avc: denied { create } for pid=7437 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1005.564810][ T24] audit: type=1400 audit(1774024232.830:188): avc: denied { read open } for pid=7437 comm="iptables" path="/run/xtables.lock" dev="tmpfs" ino=50565 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1005.615404][ T7469] device syzkaller0 entered promiscuous mode [ 1005.634774][ T7455] pim6reg0: tun_chr_ioctl cmd 1074025673 Stopping klogd: OK Stopping acpid: OK Stopping syslogd: stopped /sbin/syslogd (pid 76) OK umount: can't remount debugfs read-only umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only [ 1007.479133][ T7581] device syzkaller0 entered promiscuous mode The system is going down NOW! Connection to 10.128.1.190 closed by remote host. Sent SIGTERM toSent SIGKILL to all processes Requesting system poweroff [ 1009.092716][ T112] device bridge_slave_1 left promiscuous mode [ 1009.098918][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 1009.106555][ T112] device bridge_slave_0 left promiscuous mode [ 1009.112797][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 1009.120772][ T112] device bridge_slave_1 left promiscuous mode [ 1009.126992][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 1009.134554][ T112] device bridge_slave_0 left promiscuous mode [ 1009.140663][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 1009.148794][ T112] device veth0_to_team left promiscuous mode [ 1009.155397][ T112] Ÿë: port 1(veth0_to_team) entered disabled state [ 1009.163849][ T112] device veth1_macvtap left promiscuous mode [ 1009.169945][ T112] device veth0_vlan left promiscuous mode [ 1009.176167][ T112] device veth1_macvtap left promiscuous mode [ 1009.182666][ T112] device veth0_vlan left promiscuous mode [ 1009.188859][ T112] device veth1_macvtap left promiscuous mode [ 1009.195982][ T112] device veth1_macvtap left promiscuous mode [ 1009.611994][ T7591] kvm: exiting hardware virtualization [ 1009.619117][ T7591] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 1009.626180][ T7591] ACPI: Preparing to enter system sleep state S5 [ 1009.633133][ T7591] reboot: Power down serialport: VM disconnected.