last executing test programs: 22.728949516s ago: executing program 3 (id=4128): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='f2fs_reserve_new_blocks\x00', 0xffffffffffffffff, 0x0, 0x1}, 0x18) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r1, r0, 0x0, r1}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x5, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x2}, 0x94) (async) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x41fe) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1100c80a00000000000000000029200020eedc0000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async, rerun: 64) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (rerun: 64) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) (async) socketpair(0x27, 0x800, 0x853d, &(0x7f0000000600)) (async, rerun: 64) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) (rerun: 64) close(r4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x2000000000000034, &(0x7f0000000680)=ANY=[@ANYBLOB="1802000004000000000000000000000085000000a0000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe22}, 0x94) (async, rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000001240)="b9ff03076804268c989e14f088a8", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000080)=r1, 0x4) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 20.225949448s ago: executing program 3 (id=4128): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='f2fs_reserve_new_blocks\x00', 0xffffffffffffffff, 0x0, 0x1}, 0x18) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r1, r0, 0x0, r1}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x5, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x2}, 0x94) (async) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x41fe) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1100c80a00000000000000000029200020eedc0000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async, rerun: 64) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (rerun: 64) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) (async) socketpair(0x27, 0x800, 0x853d, &(0x7f0000000600)) (async, rerun: 64) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) (rerun: 64) close(r4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x2000000000000034, &(0x7f0000000680)=ANY=[@ANYBLOB="1802000004000000000000000000000085000000a0000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe22}, 0x94) (async, rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000001240)="b9ff03076804268c989e14f088a8", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000080)=r1, 0x4) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 14.849775651s ago: executing program 3 (id=4128): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='f2fs_reserve_new_blocks\x00', 0xffffffffffffffff, 0x0, 0x1}, 0x18) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r1, r0, 0x0, r1}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x5, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x2}, 0x94) (async) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x41fe) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1100c80a00000000000000000029200020eedc0000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async, rerun: 64) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (rerun: 64) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) (async) socketpair(0x27, 0x800, 0x853d, &(0x7f0000000600)) (async, rerun: 64) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) (rerun: 64) close(r4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x2000000000000034, &(0x7f0000000680)=ANY=[@ANYBLOB="1802000004000000000000000000000085000000a0000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe22}, 0x94) (async, rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000001240)="b9ff03076804268c989e14f088a8", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000080)=r1, 0x4) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 9.469350753s ago: executing program 3 (id=4128): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='f2fs_reserve_new_blocks\x00', 0xffffffffffffffff, 0x0, 0x1}, 0x18) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r1, r0, 0x0, r1}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x5, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x2}, 0x94) (async) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x41fe) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1100c80a00000000000000000029200020eedc0000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async, rerun: 64) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (rerun: 64) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) (async) socketpair(0x27, 0x800, 0x853d, &(0x7f0000000600)) (async, rerun: 64) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) (rerun: 64) close(r4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x2000000000000034, &(0x7f0000000680)=ANY=[@ANYBLOB="1802000004000000000000000000000085000000a0000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe22}, 0x94) (async, rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000001240)="b9ff03076804268c989e14f088a8", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000080)=r1, 0x4) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 8.006615609s ago: executing program 2 (id=4313): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x8, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="190071000000000000000034feca96f473fcc500", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0, 0xfff, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) r3 = openat$cgroup_ro(r1, 0x0, 0x275a, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000580)=ANY=[@ANYRESDEC, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x32, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000d60000000900000005"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000001680), &(0x7f0000002300), 0x8001, r6}, 0x38) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)=ANY=[], 0x48) recvmsg$unix(0xffffffffffffffff, 0x0, 0xc0000140) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="000000000000000081000000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030abc53430000b74400000000000085000000820000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 6.516155126s ago: executing program 2 (id=4321): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x4000, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 6.313658835s ago: executing program 2 (id=4322): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000780), &(0x7f0000000580), 0x80000002, r0}, 0x38) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x85, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_bp={0x0, 0xc}, 0x10002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) 5.385524237s ago: executing program 2 (id=4326): bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'vlan0\x00'}) socketpair(0xa, 0x1, 0x7, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2000000000000007, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x7, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) (async) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/net\x00') r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) close(0x3) close(0x4) (async) close(0x4) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2}, &(0x7f0000000580), &(0x7f0000000440)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r4, 0x80047456, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{}, &(0x7f0000000200), &(0x7f0000000240)='%pI4 \x00'}, 0x20) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{}, &(0x7f0000000200), &(0x7f0000000240)='%pI4 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) 4.648960031s ago: executing program 1 (id=4331): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/44}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r1}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) 4.534845615s ago: executing program 1 (id=4333): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_clone(0x1000, &(0x7f0000000400)="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", 0x1000, &(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)="75c21b486838cc") r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001500)=@o_path={&(0x7f00000014c0)='./file0\x00', 0x0, 0x4008}, 0x18) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001540)=0xffffffffffffffff, 0x4) (async) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002600)={&(0x7f0000001580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0xf}, {0x0, 0x3}, {0x10, 0x4}, {0xd, 0x5}]}, @decl_tag={0x10, 0x0, 0x0, 0x11, 0x2, 0x1}, @fwd={0xe}, @restrict={0x4}, @ptr={0xa, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x61, 0x2e, 0x5f]}}, &(0x7f0000001600)=""/4096, 0x7d, 0x1000, 0x0, 0x7}, 0x28) r6 = getpid() (async) r7 = syz_clone(0x80000000, &(0x7f0000002640)="57f9d4fd007e5dc2c4c5b3a484e606056616c39a68e313d569e0c62c8bcd1951fbe3449908614997ffd34656ec8984438158973f9467a458a153e7f903e4a8a2ec725c202fd3d6eb2c90172332ec3ec5e238d2e962534b81c5bc9127089a7469eb0f32792089a019f4fe5f313aa6211b6bf14e332eef70ff83b5e5f553f8a66063", 0x81, &(0x7f0000002700), &(0x7f0000002740), &(0x7f0000002780)="45296bcb10fc860efad635b924bc2aac9786429320fc8a4ec7adbd172faa5ce3b65d1d7d39ac5807c7c97dcba702bcd168dbbb924673ccbcc28a3e895e96d1f4e34056283cdf9c7821e782f6f825b5d8c63cddea0ec6e6d1953216fd3481afa7ccfe3288a40f6523ff524e871ca84e98400254ced422ae1c1619c80730ee11965e3e1c5a6a02abd45dbf8518d70642643fdb996339a670d3aa8cf342c386ffe8a8699294ec2bcd955495074f49f47e3298cb139bbd49c77a105695062f55c87bb037") r8 = syz_clone(0xc0800400, &(0x7f0000002880)="9596be84371925cf77518730a775b05fb4248220685e8cb4dedbc98286305c6b41d10e380b60bf45aba9f4770f49724718fc614cae6c9dc710cadf84a444853d6143b16642f4e259ea4bd6b45aa534134d9e93da0fc0451982be4a2b5e8845ce2ec214531f8af7e3384000dfd73dfd1334d59b3665bd245db556712860226704e953e71b64de560c", 0x88, &(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)="76b5ba6c8a2f4881ba840bcd39b90ce6370ae259a4d32a355c9630838c95dc94d1bad629db2d94cdc76617cf2861919127aee2492c02a7ad60e35ae2d965e5954cad155743ebf99a4f529bbfe5ce54c911132d8f6c19cf0f3fb5e692b8a90311b1a220953e13ddad512a2a42fda569cdc6d79f37a88a946222d78ac1457fbb8d56f22071b286f2755deb10053277cb5a95213808bf485f886bd90df2e3d03536720817eed4b40c95b8083cf00961321e0615a7e3205e73a914857e9aaa63aa489cc9e7f88f07031ed5") (async) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002ac0)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async) r10 = perf_event_open(&(0x7f0000002b40)={0x4, 0x80, 0x80, 0x1, 0x59, 0x1b, 0x0, 0x82, 0x4b0b1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2cd6, 0x2, @perf_bp={&(0x7f0000002b00), 0xc}, 0x110039, 0x5, 0x4, 0x8, 0x1, 0x3, 0x7, 0x0, 0x400, 0x0, 0x5}, 0x0, 0x7, 0xffffffffffffffff, 0xbd4d121df6c54004) (async) r11 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000002bc0), 0x2, 0x0) (async) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002c00)={0x0, 0x10000, 0x8}, 0xc) (async) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002c40)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x50) (async) r14 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000002cc0), 0x2, 0x0) (async) r15 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002f00)={0x6, 0x5, &(0x7f0000002d00)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffe}, @generic={0x9, 0xa, 0x7, 0x0, 0x8}, @ldst={0x1, 0x1, 0x1, 0xa, 0x8, 0xffffffffffffffff, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000002d40)='GPL\x00', 0xd7, 0x49, &(0x7f0000002d80)=""/73, 0x40f00, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002e00)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000002e40)={0x0, 0x7, 0x3e7, 0xf6}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x1, 0x2, 0xa, 0x3d920f9c7264a85d}, {0x1, 0x1, 0x0, 0xa}], 0x10, 0x4}, 0x94) r16 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002fc0), 0x2, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000003080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000003000), &(0x7f0000003040)}, 0x20) sendmsg$unix(r1, &(0x7f00000031c0)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000003c0)=[{&(0x7f00000000c0)="f2f4a54280ded3409d00489142f6c967ed13e95ab07bb311544e0cd0b359534df467801f35f62609728bd10bda1d82c2dcbbcf79fd6fbc3fe223dd2124fb3c9809869289b1e2899578", 0x49}, {&(0x7f0000000140)="061ed2c1d2b5eb1bb712d36f0ff0676c4de59f1acc514b1e27fb7d1af603da6675f341f0cfdbcfd5809d411a9e8dd42882cdfd4ebffceb73e22b48c248f94958dc81cda189e036ce154106abc5af0a3c4737f9ea8756fb664733e4487f51b38c276f8574b01e06611922f7fd3552e924ebfb909745c3318265eabb450929d647d764aa51aab8d6eef045a4cb241e1e00d793ec91cf8c795e9b298e8617703908a2", 0xa1}, {&(0x7f0000000200)="e8d5ffd85c350309a1277779302501cfa9c8a390048ad2686fd66b91b42d982134fff62800284323cf5338c7dedd02f64ea2b5901106252f85b70deed79aadd7f996ad8ac8f4db81c646a90dfaf0a23c1488fffd2cd5be534b9032d8639a6c41105b03e330c5bc82c1f66072f0d9cdd722c86ceffa1a7a387e316e6080f4f752dba3b5ee91a978909d645573ac627b0e16c74feaaae4e449658eff8b2aa6982c7e599c4b5c8cf8996d71209cba0b18dbdd6d1eac4c8faab7e2a42658b7e8d434f3561c3ad16f584f7c004fde14aea103", 0xd0}, {&(0x7f0000000300)="aa9fd5cdf34478d29ec7af61e6bf98a310a5f64acf2017770d46110b030af3bf89ace7f4f613f5fbeeea237be6f19f0b2c695037f86dbc87354836df0d12ec6334c366555c0296e8a9a18e84cb51b989317c5941f70894696f56e2fd72313bb5c0e4818b09152a816256339f2246d348fd6ee31fc31a9380e5f20829e54575fe7a02b1bdcb87886aecd082c33e34e29b13eca520bf0f4a3bfac6d7e35f35b59e83c203055a830a87a268ba40baeb0c231c6bad2ccf868a0121b9d342ebba5bc3", 0xc0}], 0x4, &(0x7f00000030c0)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0x0, 0xee01}}}, @rights={{0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, 0xffffffffffffffff, r14, r15, r16, r17]}}], 0xd8, 0x20004000}, 0x4000) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000003340)={r17, &(0x7f0000003200)="dc1e959492eb2b4d56bbe1b8b3137f65254950d2a3b9d032a5", &(0x7f0000003240)=""/202, 0x4}, 0x20) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000003380)=r15, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000034c0)={@cgroup=r9, 0xe, 0x1, 0x9, &(0x7f00000033c0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000003400)=[0x0], &(0x7f0000003440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000003480)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000035c0)={r3, 0x58, &(0x7f0000003540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r20 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000003600)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000003500)={@ifindex=r19, r15, 0x19, 0x2018, 0x0, @value=r20, @void, @void, @void, r18}, 0x20) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000003640), 0x24400, 0x0) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000036c0)=@o_path={&(0x7f0000003680)='./file0\x00', r12, 0x4000, r1}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003700), 0x4) syz_open_procfs$namespace(r7, &(0x7f0000003740)='ns/pid\x00') (async) perf_event_open(&(0x7f0000003780)={0x3, 0x80, 0xa8, 0x4, 0x1, 0xb, 0x0, 0x7, 0x8001, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0xffffffffffffffff, 0xffffffffffff887c}, 0x10000, 0x4, 0x7, 0x5, 0x7, 0x6, 0xe786, 0x0, 0xfffffff9, 0x0, 0x5}, r7, 0x10, r10, 0xb) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000003800)='./cgroup/syz1\x00', 0x200002, 0x0) 4.088846265s ago: executing program 3 (id=4128): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='f2fs_reserve_new_blocks\x00', 0xffffffffffffffff, 0x0, 0x1}, 0x18) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r1, r0, 0x0, r1}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x5, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x2}, 0x94) (async) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x41fe) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1100c80a00000000000000000029200020eedc0000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async, rerun: 64) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (rerun: 64) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) (async) socketpair(0x27, 0x800, 0x853d, &(0x7f0000000600)) (async, rerun: 64) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) (rerun: 64) close(r4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x2000000000000034, &(0x7f0000000680)=ANY=[@ANYBLOB="1802000004000000000000000000000085000000a0000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe22}, 0x94) (async, rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000001240)="b9ff03076804268c989e14f088a8", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000080)=r1, 0x4) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 3.029875063s ago: executing program 1 (id=4337): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x25, &(0x7f0000000080)=@raw=[@printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @ldst={0x1, 0x1, 0x6, 0x7, 0xb, 0x80, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xfffffff9}], &(0x7f0000000380)='GPL\x00', 0x9, 0x6c, &(0x7f0000000440)=""/108, 0x40f00, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xc, 0x80000000, 0x8}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000540)=[r2, r1, 0xffffffffffffffff, r1, r0, r3, r1], &(0x7f0000000580)=[{0x4, 0x5, 0xe, 0xc}, {0x3, 0x5, 0x2, 0xc}, {0x5, 0x5, 0x2, 0x3}, {0x3, 0x5, 0xe, 0x8}], 0x10, 0x7fffffff}, 0x94) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2a979d) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r4}, &(0x7f0000000280), &(0x7f00000002c0)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0xe42b9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a0bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000880), 0x12) 1.566197219s ago: executing program 4 (id=4350): r0 = gettid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/44}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r2}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000880)=r0, 0x12) 1.453593654s ago: executing program 4 (id=4351): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)=ANY=[], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000711211000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000002c0)='sched_kthread_work_queue_work\x00'}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x6}, 0x66) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff9b, 0x8}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0c000000040000000400000009"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000024c0), &(0x7f0000001280), 0xffffffff, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) 1.306399951s ago: executing program 4 (id=4352): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="05000000020000000800000005"], 0x50) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62b0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x2}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\n\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0a000000040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000025000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x4004) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r3, 0x40047451, &(0x7f0000000180)) 1.235752194s ago: executing program 2 (id=4353): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x20) 1.219804335s ago: executing program 2 (id=4354): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0xd7, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="180200000000e1ff0000000000000000850000005300000085000000070000009500000000000000a94be0c51261be6a99e5e06bb0a232d5e1f5bc0b6e76f82e9a7cde9e8f1b547edf612a03f1737d951d7a617558b674e1c4fdfd771ebe7c33af3e4917be59ac67f0bbabcb8f41c23ba8d91633a8b9c70e804744dc081ac69cfea08e4e5a06003771bc3f325a6386a9d49e3c13b32461acf0be4b31638c29187d748841f4395494cdac15e52a4b6a2981eb4afadbbdf9157fa588f475c4cd2e44e2129dc6b93993909613e8d95f5610c067d9b97c524c210af077707d71e8512e00"/240], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000140)=""/192}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9092dc1b6dbe9ab5becdcc777", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d0000008500000007000000"], &(0x7f00000005c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, 0x2}, 0x94) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r2}, 0x10) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000900000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000000000000060000008500000061000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r5, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000680)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x58, &(0x7f00000006c0), 0x0, 0x10, &(0x7f0000000780), &(0x7f00000006c0), 0x8, 0x80, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0x1a, 0x1, 0x2, 0x8001, 0x620, r1, 0x3, '\x00', r8, r7, 0x2, 0x3, 0x3}, 0x50) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 1.003660245s ago: executing program 4 (id=4357): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r1, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xff, 0x1}, 0x0, 0x0, 0x0, 0x5, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="61106800000000006113740000000000bfa00000000000000700000008ffffffd503010017740040950000000000000069163a0000000000bf67000000000000350607000fff07201706000020190000160300000ee60060bf050000000000007b650000000000006507f9ff01000000070700004d83dde4c375000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f17540faf80250aa20c669a5e12814cb1cea5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369226066812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000400c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20ceddf4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10fd7ed6735154beb4000000000000000000000000004000bc00f6746a9709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c1d926a0f6a5480a55c22fe3a5ac00000000000000000000000500002000000000fb79ea00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e14d90deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b06ff7f0000000000007f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a1f37302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089e0b1c23c0f3cdad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a1a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631d22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0af1cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4c6ea9604faf0453bedf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c29984864961a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a09d8be0fc5beecf153236c19740be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000000000000000000000000000000000001386866b311bd144bc32e059658c9f8342c90c1ade31b78072841b8b5a943d62a44cea6b050c42e3c205fad6a23fb43c93da0f49d911877265e6ee443e37397ecf89021e7f579e8d3a74c12b52938d91e9de07fc8eeeb9505f4a9c26266bf5449484ccc1317c7476"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000e8ff00000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffb, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x11, 0xa, 0x300, &(0x7f0000000000)) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xd, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0x8, 0xfff8, 0x50}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x7, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r2}, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x2f00020b, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0xae5b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) 706.184748ms ago: executing program 0 (id=4358): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x10) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x40000000) close(r1) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000300)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) 373.121733ms ago: executing program 0 (id=4359): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) 303.595036ms ago: executing program 1 (id=4360): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r2, 0x18000000000002a0, 0x28, 0x0, &(0x7f0000000440)="b9ff03076003008cb89e08f586dd619da99fd8ea7d3d2c7598ebd9c807fe2f780fbb556615337cb9", 0x0, 0x402f, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 246.407148ms ago: executing program 0 (id=4361): r0 = gettid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/44}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r2}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000880)=r0, 0x12) 121.805655ms ago: executing program 0 (id=4362): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)=ANY=[], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000711211000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000002c0)='sched_kthread_work_queue_work\x00'}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x6}, 0x66) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff9b, 0x8}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0c000000040000000400000009"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000024c0), &(0x7f0000001280), 0xffffffff, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) 121.168205ms ago: executing program 1 (id=4363): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x8, 0xdd, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x4cfb}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x29) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000005000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000040000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 71.911456ms ago: executing program 4 (id=4364): bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xb, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="85000000d2000000690a04ff000000000f00000000000000950000000000000018100000", @ANYRES32, @ANYBLOB="000000000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) 56.111197ms ago: executing program 4 (id=4365): r0 = perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20002}, 0x0, 0x5a, 0x8, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="120000000800000004000000b47c000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRESDEC=r0, @ANYRES32, @ANYBLOB="000000000200000000f7ff00"/28], 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000580)={&(0x7f0000000040)="c395e6fc6ce4d2bc54b6fba359b14a1243298a4a9112522d9e1de170ced74c54232a4a4b38f62d9bfbb589398e90fe22", &(0x7f0000000180)=""/110, &(0x7f0000000380)="088dd5491ae7adc5d7721cc57056ff8a87c5a0291043c5404c965e0f46ed9d31c96d8a2564ef350ad2bec1fd89361af6a0fcd98326539529a79210e0c6e46fb17e5a1ad032576be6eaf473db7cccb1ae59c2a502987d43a29bd1f980a9d301a0bd47800e730698971eea509b935e07c74cf7cb212baf0e208a26612fb552592a571977d43996502cd74247cb7d02f33700cf8a5dfa", &(0x7f0000000680)="08b2c65dca31314d030ac412b37f2c2da9674899f86bc5f04640f3e0b82b9b950247448d652c1177f0fc83a760f029295ca2a7b0c42bb659383a87353f058648b0298ca06b5cb707517a524008aedd98eab0ec53ae47b7a240f48e5da937381a1e43c4ce670efd21d4943b64377bb03ff6b4acf1d27622a015fa58474189b3427e6439ed6869d8f9f5ef3d459cf3b4d8b8bfae9c072c45322802be496e2a4e8fd729addf5897d2941627c5500168bd86fa3e9945c1c822f9043d049aa2d7c0782d6455aa9c852cd191780f61dc16425332864d655ea9a08e38", 0x1, r1, 0x4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x4156, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x18404, 0x0, 0xfffffffe, 0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYRES32=r4], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x4, 0x5, &(0x7f00000015c0)=ANY=[@ANYBLOB="180200000100000000000000000000008500000087000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000bc0)=ANY=[@ANYRESOCT=r5, @ANYRES16=r3, @ANYBLOB="03d60431e89371566a8172cb89260d05147084f0f288e20020e59a10a8e91b255b424353c420ea38f201ce30ab8a8f78ca7fed45126148697a41157bca39f57dd0eaf951b215747443089e88ed3a2ceb272bee78a37091382707b2fdf432651f323a0079cc0a17f7c322aa6ac91595a27835db17f341128d43b29d6ab7e1c423f8cd9f7e499f42db1e82e76500e2657ca1dc9f24088aaee8c58f", @ANYRESOCT=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="190000000400000008000000020000000000000079be5d2f96d527dc61b9f6ddea6ede5edeb9fbd90996ab996db36d49ba39d8295ecb278da72384882f7666bdeb1a709ab29c1a8941c70f3000f741746743c16903d6973a373b7342f920ead44eaab549a639e8f6a4ffeafce938e7993f9860c71fa0b93d029be3fa53f82a918dff2f11dd4e8a8ff9bba9a9480879665d2a87da861e81509c98eb4a29c6009b10b49731a2", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xcd62b1ab) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000", @ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4) 55.450537ms ago: executing program 0 (id=4366): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x12, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000001000000001b00000000000071181a000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 53.142677ms ago: executing program 1 (id=4367): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) (fail_nth: 57) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22.188719ms ago: executing program 0 (id=4368): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r1, 0x8982, 0x20000500) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x43, 0x3, 0x4}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000340)="29615c8421311e63439b341c30126d6be3976c5f06543f98d1321ec8fd2139ccb96f24233e959d8e962d769799e153ebbac8568256f1beb117402a0e1e55d0576b9340d5ad04cfecc9af6de33fe131df0aa46101c9a2a78d00c09554", 0x5c}, {&(0x7f00000003c0)="e6a36c7d20011902196900fe90fff3e4fe5b93157e5f4be97b5265d1abe5d1ed70e0550b4f3925fd2023bcbe30966bfe8b93dd959fd7ba7bf1728e6daccc47119d3113af6be48ba46244092a15ba2960e1f64800f7b258eb187d7719435016a652b709fc8251944b696eba6a118cc69d9ecefd90c633a9d37f7ef514a9fcf356", 0x80}, {&(0x7f00000001c0)="607ca407d82164a62e9f2c2162", 0xd}], 0x3, &(0x7f00000004c0)="f0b230bf389bf1813e3f2178bf1e869f4a2a39", 0x13, 0x55}, 0x811) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) 0s ago: executing program 3 (id=4128): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='f2fs_reserve_new_blocks\x00', 0xffffffffffffffff, 0x0, 0x1}, 0x18) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r1, r0, 0x0, r1}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x5, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x2}, 0x94) (async) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x41fe) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1100c80a00000000000000000029200020eedc0000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async, rerun: 64) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (rerun: 64) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) (async) socketpair(0x27, 0x800, 0x853d, &(0x7f0000000600)) (async, rerun: 64) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) (rerun: 64) close(r4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x2000000000000034, &(0x7f0000000680)=ANY=[@ANYBLOB="1802000004000000000000000000000085000000a0000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe22}, 0x94) (async, rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000001240)="b9ff03076804268c989e14f088a8", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000080)=r1, 0x4) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) kernel console output (not intermixed with test programs): ys_call+0x27b/0x9a0 [ 320.254589][ T5687] do_syscall_64+0x4c/0xa0 [ 320.258999][ T5687] ? clear_bhb_loop+0x30/0x80 [ 320.263672][ T5687] ? clear_bhb_loop+0x30/0x80 [ 320.268365][ T5687] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 320.274265][ T5687] RIP: 0033:0x7fd94458f749 [ 320.278672][ T5687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 320.298279][ T5687] RSP: 002b:00007fd94535c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 320.306694][ T5687] RAX: ffffffffffffffda RBX: 00007fd9447e5fa0 RCX: 00007fd94458f749 [ 320.314664][ T5687] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000007 [ 320.322641][ T5687] RBP: 00007fd94535c090 R08: 0000000000000000 R09: 0000000000000000 [ 320.330607][ T5687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 320.338573][ T5687] R13: 00007fd9447e6038 R14: 00007fd9447e5fa0 R15: 00007ffc4763e9e8 [ 320.346590][ T5687] [ 321.003128][ T5708] device sit0 left promiscuous mode [ 321.070732][ T5706] device sit0 entered promiscuous mode [ 323.278889][ T5732] GPL: port 1(erspan0) entered blocking state [ 323.285253][ T5732] GPL: port 1(erspan0) entered disabled state [ 323.306960][ T5732] device erspan0 entered promiscuous mode [ 323.323173][ T5732] GPL: port 1(erspan0) entered blocking state [ 323.329893][ T5732] GPL: port 1(erspan0) entered forwarding state [ 324.008615][ T5758] device veth0_vlan left promiscuous mode [ 324.026359][ T5758] device veth0_vlan entered promiscuous mode [ 324.100507][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 324.116793][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 324.132943][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 324.154330][ T5761] device sit0 left promiscuous mode [ 329.786924][ T5906] device sit0 left promiscuous mode [ 331.338627][ T5938] device veth0_vlan left promiscuous mode [ 331.344691][ T5938] device veth0_vlan entered promiscuous mode [ 331.444215][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.474023][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 331.485524][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 331.517313][ T5944] device sit0 left promiscuous mode [ 331.796007][ T5953] device sit0 entered promiscuous mode [ 333.278830][ T5975] FAULT_INJECTION: forcing a failure. [ 333.278830][ T5975] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 333.397885][ T5975] CPU: 0 PID: 5975 Comm: syz.1.1737 Not tainted syzkaller #0 [ 333.405305][ T5975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 333.415376][ T5975] Call Trace: [ 333.418743][ T5975] [ 333.421671][ T5975] __dump_stack+0x21/0x24 [ 333.426003][ T5975] dump_stack_lvl+0xee/0x150 [ 333.430604][ T5975] ? __cfi_dump_stack_lvl+0x8/0x8 [ 333.435629][ T5975] dump_stack+0x15/0x24 [ 333.439782][ T5975] should_fail_ex+0x3d4/0x520 [ 333.444465][ T5975] should_fail_alloc_page+0x61/0x90 [ 333.449676][ T5975] prepare_alloc_pages+0x148/0x5f0 [ 333.454794][ T5975] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 333.460010][ T5975] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 333.465820][ T5975] __alloc_pages+0x124/0x450 [ 333.470419][ T5975] ? __cfi___alloc_pages+0x10/0x10 [ 333.475530][ T5975] ? __schedule+0xb8f/0x14e0 [ 333.480123][ T5975] ? __kasan_check_write+0x14/0x20 [ 333.485235][ T5975] ? _raw_spin_lock+0x8e/0xe0 [ 333.489907][ T5975] ? __cfi__raw_spin_lock+0x10/0x10 [ 333.495103][ T5975] ? irqentry_exit+0x37/0x40 [ 333.499691][ T5975] __get_free_pages+0xe/0x30 [ 333.504288][ T5975] kasan_populate_vmalloc_pte+0x29/0x120 [ 333.509924][ T5975] __apply_to_page_range+0x8de/0xc80 [ 333.515216][ T5975] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 333.521451][ T5975] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 333.527683][ T5975] apply_to_page_range+0x3b/0x50 [ 333.532621][ T5975] kasan_populate_vmalloc+0x60/0x70 [ 333.537813][ T5975] alloc_vmap_area+0x173e/0x1870 [ 333.542753][ T5975] ? vm_map_ram+0x930/0x930 [ 333.547253][ T5975] ? __kasan_kmalloc+0x95/0xb0 [ 333.552022][ T5975] ? kmalloc_node_trace+0x3d/0xb0 [ 333.557040][ T5975] __get_vm_area_node+0x160/0x360 [ 333.562061][ T5975] __vmalloc_node_range+0x326/0x13d0 [ 333.567345][ T5975] ? prealloc_elems_and_freelist+0x8a/0x1e0 [ 333.573242][ T5975] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 333.578966][ T5975] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 333.585128][ T5975] ? __cfi___vmalloc_node_range+0x10/0x10 [ 333.590848][ T5975] ? __kasan_check_write+0x14/0x20 [ 333.595955][ T5975] ? mutex_unlock+0x89/0x220 [ 333.600547][ T5975] ? __cfi_mutex_unlock+0x10/0x10 [ 333.605577][ T5975] bpf_map_area_alloc+0xd7/0xe0 [ 333.610437][ T5975] ? prealloc_elems_and_freelist+0x8a/0x1e0 [ 333.616330][ T5975] prealloc_elems_and_freelist+0x8a/0x1e0 [ 333.622055][ T5975] stack_map_alloc+0x3a7/0x530 [ 333.626823][ T5975] map_create+0x49c/0xd80 [ 333.631153][ T5975] __sys_bpf+0x30b/0x780 [ 333.635403][ T5975] ? bpf_link_show_fdinfo+0x320/0x320 [ 333.640776][ T5975] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 333.646587][ T5975] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 333.652743][ T5975] __x64_sys_bpf+0x7c/0x90 [ 333.657164][ T5975] x64_sys_call+0x488/0x9a0 [ 333.661661][ T5975] do_syscall_64+0x4c/0xa0 [ 333.666071][ T5975] ? clear_bhb_loop+0x30/0x80 [ 333.670746][ T5975] ? clear_bhb_loop+0x30/0x80 [ 333.675423][ T5975] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 333.681316][ T5975] RIP: 0033:0x7f81d158f749 [ 333.685730][ T5975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 333.705332][ T5975] RSP: 002b:00007f81d237d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 333.713750][ T5975] RAX: ffffffffffffffda RBX: 00007f81d17e5fa0 RCX: 00007f81d158f749 [ 333.721724][ T5975] RDX: 0000000000000048 RSI: 0000200000000900 RDI: 0000000000000000 [ 333.729690][ T5975] RBP: 00007f81d237d090 R08: 0000000000000000 R09: 0000000000000000 [ 333.737658][ T5975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 333.745623][ T5975] R13: 00007f81d17e6038 R14: 00007f81d17e5fa0 R15: 00007ffe6a5b1c78 [ 333.753600][ T5975] [ 334.108546][ T5986] device sit0 left promiscuous mode [ 334.224201][ T5989] device sit0 entered promiscuous mode [ 335.082863][ T6002] device syzkaller0 entered promiscuous mode [ 338.733697][ T6053] device sit0 left promiscuous mode [ 339.670602][ T6077] bridge0: port 3(veth1_macvtap) entered blocking state [ 339.677665][ T6077] bridge0: port 3(veth1_macvtap) entered disabled state [ 341.622824][ T6090] FAULT_INJECTION: forcing a failure. [ 341.622824][ T6090] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 341.772156][ T6090] CPU: 1 PID: 6090 Comm: syz.2.1774 Not tainted syzkaller #0 [ 341.779616][ T6090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 341.789667][ T6090] Call Trace: [ 341.792948][ T6090] [ 341.795873][ T6090] __dump_stack+0x21/0x24 [ 341.800201][ T6090] dump_stack_lvl+0xee/0x150 [ 341.804785][ T6090] ? __cfi_dump_stack_lvl+0x8/0x8 [ 341.809803][ T6090] ? migrate_enable+0x19c/0x280 [ 341.814654][ T6090] dump_stack+0x15/0x24 [ 341.818808][ T6090] should_fail_ex+0x3d4/0x520 [ 341.823486][ T6090] should_fail+0xb/0x10 [ 341.827639][ T6090] should_fail_usercopy+0x1a/0x20 [ 341.832661][ T6090] _copy_from_user+0x1e/0xc0 [ 341.837256][ T6090] generic_map_update_batch+0x458/0x780 [ 341.842805][ T6090] ? __cfi_generic_map_update_batch+0x10/0x10 [ 341.848872][ T6090] ? __fdget+0x19c/0x220 [ 341.853115][ T6090] ? __cfi_generic_map_update_batch+0x10/0x10 [ 341.859183][ T6090] bpf_map_do_batch+0x48c/0x620 [ 341.864031][ T6090] __sys_bpf+0x624/0x780 [ 341.868268][ T6090] ? bpf_link_show_fdinfo+0x320/0x320 [ 341.873641][ T6090] ? __cfi_sched_clock_cpu+0x10/0x10 [ 341.878930][ T6090] __x64_sys_bpf+0x7c/0x90 [ 341.883348][ T6090] x64_sys_call+0x488/0x9a0 [ 341.887848][ T6090] do_syscall_64+0x4c/0xa0 [ 341.892261][ T6090] ? clear_bhb_loop+0x30/0x80 [ 341.896934][ T6090] ? clear_bhb_loop+0x30/0x80 [ 341.901608][ T6090] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 341.907498][ T6090] RIP: 0033:0x7f96c0b8f749 [ 341.911903][ T6090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 341.931503][ T6090] RSP: 002b:00007f96c1b0f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 341.939916][ T6090] RAX: ffffffffffffffda RBX: 00007f96c0de5fa0 RCX: 00007f96c0b8f749 [ 341.947882][ T6090] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 341.955844][ T6090] RBP: 00007f96c1b0f090 R08: 0000000000000000 R09: 0000000000000000 [ 341.963808][ T6090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 341.971769][ T6090] R13: 00007f96c0de6038 R14: 00007f96c0de5fa0 R15: 00007ffc1389f628 [ 341.979741][ T6090] [ 344.750006][ T6135] device veth0_vlan left promiscuous mode [ 344.789699][ T6135] device veth0_vlan entered promiscuous mode [ 344.876354][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 344.892499][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 344.951896][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 346.446674][ T6188] FAULT_INJECTION: forcing a failure. [ 346.446674][ T6188] name failslab, interval 1, probability 0, space 0, times 0 [ 346.489193][ T6188] CPU: 1 PID: 6188 Comm: syz.2.1803 Not tainted syzkaller #0 [ 346.496603][ T6188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 346.506659][ T6188] Call Trace: [ 346.509930][ T6188] [ 346.512854][ T6188] __dump_stack+0x21/0x24 [ 346.517185][ T6188] dump_stack_lvl+0xee/0x150 [ 346.521770][ T6188] ? __cfi_dump_stack_lvl+0x8/0x8 [ 346.526791][ T6188] dump_stack+0x15/0x24 [ 346.530947][ T6188] should_fail_ex+0x3d4/0x520 [ 346.535636][ T6188] ? vm_area_dup+0x65/0x280 [ 346.540252][ T6188] __should_failslab+0xac/0xf0 [ 346.545026][ T6188] should_failslab+0x9/0x20 [ 346.549536][ T6188] kmem_cache_alloc+0x3b/0x330 [ 346.554306][ T6188] vm_area_dup+0x65/0x280 [ 346.558638][ T6188] copy_mm+0xb45/0x1a10 [ 346.562791][ T6188] ? copy_signal+0x630/0x630 [ 346.567374][ T6188] ? _raw_spin_lock+0x8e/0xe0 [ 346.572053][ T6188] ? __cfi__raw_spin_lock+0x10/0x10 [ 346.577257][ T6188] ? __init_rwsem+0x12c/0x240 [ 346.581935][ T6188] ? copy_signal+0x4ea/0x630 [ 346.586522][ T6188] copy_process+0x12b4/0x3480 [ 346.591208][ T6188] ? idle_dummy+0x10/0x10 [ 346.595551][ T6188] kernel_clone+0x23a/0x810 [ 346.600074][ T6188] ? __cfi_kernel_clone+0x10/0x10 [ 346.605114][ T6188] ? __kasan_check_write+0x14/0x20 [ 346.610229][ T6188] ? mutex_unlock+0x89/0x220 [ 346.614819][ T6188] __x64_sys_clone+0x168/0x1b0 [ 346.619588][ T6188] ? __cfi___x64_sys_clone+0x10/0x10 [ 346.624882][ T6188] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 346.630950][ T6188] x64_sys_call+0x990/0x9a0 [ 346.635451][ T6188] do_syscall_64+0x4c/0xa0 [ 346.639860][ T6188] ? clear_bhb_loop+0x30/0x80 [ 346.644537][ T6188] ? clear_bhb_loop+0x30/0x80 [ 346.649223][ T6188] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 346.655121][ T6188] RIP: 0033:0x7f96c0b8f749 [ 346.659535][ T6188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 346.679146][ T6188] RSP: 002b:00007f96c1b0efe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 346.687565][ T6188] RAX: ffffffffffffffda RBX: 00007f96c0de5fa0 RCX: 00007f96c0b8f749 [ 346.695536][ T6188] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 346.703496][ T6188] RBP: 00007f96c1b0f090 R08: 0000000000000000 R09: 0000000000000000 [ 346.711450][ T6188] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 346.719399][ T6188] R13: 00007f96c0de6038 R14: 00007f96c0de5fa0 R15: 00007ffc1389f628 [ 346.727359][ T6188] [ 347.513793][ T6212] device sit0 entered promiscuous mode [ 350.573838][ T6259] device sit0 entered promiscuous mode [ 352.096583][ T6276] device sit0 left promiscuous mode [ 352.166046][ T6276] device sit0 entered promiscuous mode [ 352.349377][ T6280] device sit0 left promiscuous mode [ 352.396693][ T6282] device sit0 entered promiscuous mode [ 355.238649][ T6338] device sit0 left promiscuous mode [ 355.311312][ T6339] device sit0 entered promiscuous mode [ 356.007690][ T6360] device sit0 left promiscuous mode [ 356.187014][ T6364] device pim6reg1 entered promiscuous mode [ 359.274254][ T6402] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 359.360499][ T6407] FAULT_INJECTION: forcing a failure. [ 359.360499][ T6407] name failslab, interval 1, probability 0, space 0, times 0 [ 359.373246][ T6407] CPU: 0 PID: 6407 Comm: syz.0.1875 Not tainted syzkaller #0 [ 359.380617][ T6407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 359.390666][ T6407] Call Trace: [ 359.393944][ T6407] [ 359.396880][ T6407] __dump_stack+0x21/0x24 [ 359.401217][ T6407] dump_stack_lvl+0xee/0x150 [ 359.405818][ T6407] ? __cfi_dump_stack_lvl+0x8/0x8 [ 359.410840][ T6407] ? kasan_set_track+0x60/0x70 [ 359.415600][ T6407] ? kasan_save_alloc_info+0x25/0x30 [ 359.420925][ T6407] ? __kasan_slab_alloc+0x72/0x80 [ 359.425974][ T6407] ? slab_post_alloc_hook+0x4f/0x2d0 [ 359.431257][ T6407] ? kmem_cache_alloc+0x16e/0x330 [ 359.436283][ T6407] dump_stack+0x15/0x24 [ 359.440435][ T6407] should_fail_ex+0x3d4/0x520 [ 359.445113][ T6407] __should_failslab+0xac/0xf0 [ 359.449871][ T6407] ? ref_tracker_alloc+0x139/0x430 [ 359.455015][ T6407] should_failslab+0x9/0x20 [ 359.459514][ T6407] __kmem_cache_alloc_node+0x3d/0x2c0 [ 359.464888][ T6407] ? ref_tracker_alloc+0x139/0x430 [ 359.469991][ T6407] kmalloc_trace+0x29/0xb0 [ 359.474401][ T6407] ref_tracker_alloc+0x139/0x430 [ 359.479333][ T6407] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 359.484790][ T6407] ? slab_post_alloc_hook+0x6d/0x2d0 [ 359.490080][ T6407] ? dst_alloc+0x16a/0x1e0 [ 359.494495][ T6407] dst_init+0xc4/0x3d0 [ 359.498559][ T6407] ? __cfi_ip6_dst_gc+0x10/0x10 [ 359.503406][ T6407] dst_alloc+0x191/0x1e0 [ 359.507644][ T6407] ip6_pol_route+0x9ae/0x1110 [ 359.512318][ T6407] ? ip6_pol_route+0x477/0x1110 [ 359.517182][ T6407] ? __cfi_ip6_pol_route+0x10/0x10 [ 359.522289][ T6407] ? prep_new_page+0x3b/0x110 [ 359.526961][ T6407] ? get_page_from_freelist+0x2c7b/0x2cf0 [ 359.532677][ T6407] ip6_pol_route_input+0x56/0x80 [ 359.537614][ T6407] fib6_rule_lookup+0x1d7/0x580 [ 359.542469][ T6407] ? __cfi_ip6_pol_route_input+0x10/0x10 [ 359.548190][ T6407] ? __cfi_fib6_rule_lookup+0x10/0x10 [ 359.553558][ T6407] ? ip6t_do_table+0x1328/0x14e0 [ 359.558669][ T6407] ip6_route_input+0x58c/0x8c0 [ 359.563429][ T6407] ? __cfi_ip6_route_input+0x10/0x10 [ 359.568716][ T6407] ? __cfi_ip6t_do_table+0x10/0x10 [ 359.573835][ T6407] ? __cfi_ip6table_mangle_hook+0x10/0x10 [ 359.579571][ T6407] ip6_rcv_finish+0x156/0x370 [ 359.584267][ T6407] ipv6_rcv+0xe9/0x210 [ 359.588354][ T6407] ? __cfi_ipv6_rcv+0x10/0x10 [ 359.593034][ T6407] ? __cfi_ip6_rcv_finish+0x10/0x10 [ 359.598239][ T6407] ? _copy_from_iter+0x141/0xfd0 [ 359.603174][ T6407] ? __cfi_ipv6_rcv+0x10/0x10 [ 359.607851][ T6407] __netif_receive_skb+0xd7/0x2a0 [ 359.612880][ T6407] ? tun_rx_batched+0x158/0x770 [ 359.617727][ T6407] netif_receive_skb+0x98/0x3d0 [ 359.622575][ T6407] ? __cfi_netif_receive_skb+0x10/0x10 [ 359.628024][ T6407] ? __cfi__copy_from_iter+0x10/0x10 [ 359.633305][ T6407] ? tun_rx_batched+0x158/0x770 [ 359.638149][ T6407] tun_rx_batched+0x1b6/0x770 [ 359.642821][ T6407] ? pskb_may_pull+0x100/0x100 [ 359.647580][ T6407] ? stack_trace_save+0x98/0xe0 [ 359.652431][ T6407] ? tun_get_user+0x1f21/0x3320 [ 359.657276][ T6407] tun_get_user+0x2494/0x3320 [ 359.661946][ T6407] ? kstrtoull+0x137/0x1d0 [ 359.666377][ T6407] ? tun_do_read+0x1c20/0x1c20 [ 359.671135][ T6407] ? __kasan_check_write+0x14/0x20 [ 359.676237][ T6407] ? ref_tracker_alloc+0x30f/0x430 [ 359.681337][ T6407] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 359.686801][ T6407] ? avc_policy_seqno+0x1b/0x70 [ 359.691669][ T6407] ? selinux_file_permission+0x2a5/0x510 [ 359.697318][ T6407] tun_chr_write_iter+0x1fb/0x300 [ 359.702349][ T6407] vfs_write+0x5db/0xca0 [ 359.706599][ T6407] ? slab_free_freelist_hook+0xc2/0x190 [ 359.712148][ T6407] ? __cfi_vfs_write+0x10/0x10 [ 359.716915][ T6407] ? __fget_files+0x2d5/0x330 [ 359.721586][ T6407] ? __fdget_pos+0x1f2/0x380 [ 359.726170][ T6407] ? ksys_write+0x71/0x240 [ 359.730585][ T6407] ksys_write+0x140/0x240 [ 359.734906][ T6407] ? __cfi_ksys_write+0x10/0x10 [ 359.739750][ T6407] ? debug_smp_processor_id+0x17/0x20 [ 359.745123][ T6407] __x64_sys_write+0x7b/0x90 [ 359.749708][ T6407] x64_sys_call+0x27b/0x9a0 [ 359.754193][ T6407] do_syscall_64+0x4c/0xa0 [ 359.758586][ T6407] ? clear_bhb_loop+0x30/0x80 [ 359.763244][ T6407] ? clear_bhb_loop+0x30/0x80 [ 359.767902][ T6407] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 359.773775][ T6407] RIP: 0033:0x7ff95bb8f749 [ 359.778170][ T6407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 359.797753][ T6407] RSP: 002b:00007ff95ca61038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 359.806149][ T6407] RAX: ffffffffffffffda RBX: 00007ff95bde5fa0 RCX: 00007ff95bb8f749 [ 359.814103][ T6407] RDX: 000000000000cfa4 RSI: 00002000000006c0 RDI: 00000000000000c8 [ 359.822056][ T6407] RBP: 00007ff95ca61090 R08: 0000000000000000 R09: 0000000000000000 [ 359.830008][ T6407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 359.837959][ T6407] R13: 00007ff95bde6038 R14: 00007ff95bde5fa0 R15: 00007ffeceeca798 [ 359.845910][ T6407] [ 359.873220][ T6410] FAULT_INJECTION: forcing a failure. [ 359.873220][ T6410] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 359.888918][ T6410] CPU: 1 PID: 6410 Comm: syz.0.1876 Not tainted syzkaller #0 [ 359.896301][ T6410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 359.906366][ T6410] Call Trace: [ 359.909640][ T6410] [ 359.912569][ T6410] __dump_stack+0x21/0x24 [ 359.916899][ T6410] dump_stack_lvl+0xee/0x150 [ 359.921486][ T6410] ? __cfi_dump_stack_lvl+0x8/0x8 [ 359.926506][ T6410] ? has_cap_mac_admin+0x330/0x330 [ 359.931617][ T6410] dump_stack+0x15/0x24 [ 359.935770][ T6410] should_fail_ex+0x3d4/0x520 [ 359.940446][ T6410] should_fail+0xb/0x10 [ 359.944600][ T6410] should_fail_usercopy+0x1a/0x20 [ 359.949619][ T6410] _copy_from_user+0x1e/0xc0 [ 359.954202][ T6410] get_user_ifreq+0x6c/0x180 [ 359.958789][ T6410] sock_ioctl+0x630/0x6e0 [ 359.963115][ T6410] ? __cfi_sock_ioctl+0x10/0x10 [ 359.967967][ T6410] ? security_file_ioctl+0x95/0xc0 [ 359.973077][ T6410] ? __cfi_sock_ioctl+0x10/0x10 [ 359.977930][ T6410] __se_sys_ioctl+0x12f/0x1b0 [ 359.982608][ T6410] __x64_sys_ioctl+0x7b/0x90 [ 359.987200][ T6410] x64_sys_call+0x58b/0x9a0 [ 359.991711][ T6410] do_syscall_64+0x4c/0xa0 [ 359.996129][ T6410] ? clear_bhb_loop+0x30/0x80 [ 360.000808][ T6410] ? clear_bhb_loop+0x30/0x80 [ 360.005484][ T6410] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 360.011376][ T6410] RIP: 0033:0x7ff95bb8f749 [ 360.015786][ T6410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 360.035391][ T6410] RSP: 002b:00007ff95ca61038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 360.043804][ T6410] RAX: ffffffffffffffda RBX: 00007ff95bde5fa0 RCX: 00007ff95bb8f749 [ 360.051808][ T6410] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 000000000000000c [ 360.059775][ T6410] RBP: 00007ff95ca61090 R08: 0000000000000000 R09: 0000000000000000 [ 360.067741][ T6410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 360.075711][ T6410] R13: 00007ff95bde6038 R14: 00007ff95bde5fa0 R15: 00007ffeceeca798 [ 360.083689][ T6410] [ 360.259853][ T286] syz-executor (286) used greatest stack depth: 22016 bytes left [ 361.182605][ T385] device bridge_slave_1 left promiscuous mode [ 361.199327][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.271472][ T385] device bridge_slave_0 left promiscuous mode [ 361.277644][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.368818][ T385] device veth1_macvtap left promiscuous mode [ 361.374910][ T385] device veth0_vlan left promiscuous mode [ 362.328883][ T6426] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.335942][ T6426] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.343397][ T6426] device bridge_slave_0 entered promiscuous mode [ 362.461965][ T6426] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.469263][ T6426] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.476707][ T6426] device bridge_slave_1 entered promiscuous mode [ 363.139156][ T28] audit: type=1400 audit(1763624130.891:140): avc: denied { create } for pid=6426 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 363.393434][ T28] audit: type=1400 audit(1763624131.021:141): avc: denied { write } for pid=6426 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 363.672194][ T28] audit: type=1400 audit(1763624131.021:142): avc: denied { read } for pid=6426 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 363.740002][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 363.798424][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 363.887772][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 363.897283][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 363.998495][ T385] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.005583][ T385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.032629][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 364.130827][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 364.161934][ T385] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.169025][ T385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.176439][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 364.184617][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 364.217575][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 364.226190][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 364.260144][ T6474] bridge0: port 3(veth1_macvtap) entered blocking state [ 364.278690][ T6474] bridge0: port 3(veth1_macvtap) entered disabled state [ 364.325873][ T6479] device sit0 entered promiscuous mode [ 364.542298][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 364.558798][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 364.750446][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 364.876483][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 365.014085][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 365.136180][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 365.227392][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 365.328537][ T6426] device veth0_vlan entered promiscuous mode [ 365.345129][ T6426] device veth1_macvtap entered promiscuous mode [ 365.395444][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 365.404227][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 365.412479][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 365.478568][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 365.528688][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 365.589954][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 365.603887][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 366.601081][ T6516] FAULT_INJECTION: forcing a failure. [ 366.601081][ T6516] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 366.919200][ T6516] CPU: 1 PID: 6516 Comm: syz.0.1906 Not tainted syzkaller #0 [ 366.926618][ T6516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 366.936674][ T6516] Call Trace: [ 366.939952][ T6516] [ 366.942872][ T6516] __dump_stack+0x21/0x24 [ 366.947198][ T6516] dump_stack_lvl+0xee/0x150 [ 366.951780][ T6516] ? __cfi_dump_stack_lvl+0x8/0x8 [ 366.956795][ T6516] ? kasan_save_alloc_info+0x25/0x30 [ 366.962077][ T6516] ? slab_post_alloc_hook+0x4f/0x2d0 [ 366.967358][ T6516] dump_stack+0x15/0x24 [ 366.971511][ T6516] should_fail_ex+0x3d4/0x520 [ 366.976189][ T6516] should_fail_alloc_page+0x61/0x90 [ 366.981390][ T6516] prepare_alloc_pages+0x148/0x5f0 [ 366.986509][ T6516] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 366.991711][ T6516] __alloc_pages+0x124/0x450 [ 366.996302][ T6516] ? __cfi___alloc_pages+0x10/0x10 [ 367.001417][ T6516] ? percpu_counter_add_batch+0x13c/0x160 [ 367.007145][ T6516] __folio_alloc+0x12/0x40 [ 367.011562][ T6516] shmem_alloc_and_acct_folio+0x650/0x870 [ 367.017285][ T6516] ? shmem_replace_folio+0x590/0x590 [ 367.022572][ T6516] ? xas_load+0x39e/0x3b0 [ 367.026904][ T6516] ? __filemap_get_folio+0x93e/0x980 [ 367.032196][ T6516] ? __cfi___filemap_get_folio+0x10/0x10 [ 367.037826][ T6516] ? do_user_addr_fault+0x9ac/0x1050 [ 367.043112][ T6516] shmem_get_folio_gfp+0x119f/0x2230 [ 367.048410][ T6516] shmem_write_begin+0xea/0x2c0 [ 367.053260][ T6516] generic_perform_write+0x2f6/0x6d0 [ 367.058545][ T6516] ? __cfi_generic_perform_write+0x10/0x10 [ 367.064346][ T6516] ? __cfi_file_update_time+0x10/0x10 [ 367.069718][ T6516] __generic_file_write_iter+0x227/0x580 [ 367.075351][ T6516] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 367.081072][ T6516] ? __cfi___generic_file_write_iter+0x10/0x10 [ 367.087221][ T6516] ? rwsem_write_trylock+0x130/0x300 [ 367.092511][ T6516] ? generic_write_checks_count+0x3c6/0x4a0 [ 367.098403][ T6516] ? generic_write_checks+0xca/0x100 [ 367.103686][ T6516] generic_file_write_iter+0xae/0x310 [ 367.109056][ T6516] vfs_write+0x5db/0xca0 [ 367.113300][ T6516] ? slab_free_freelist_hook+0xc2/0x190 [ 367.118848][ T6516] ? __cfi_vfs_write+0x10/0x10 [ 367.123612][ T6516] ? __cfi_mutex_lock+0x10/0x10 [ 367.128465][ T6516] ? __fdget_pos+0x2cd/0x380 [ 367.133051][ T6516] ? ksys_write+0x71/0x240 [ 367.137460][ T6516] ksys_write+0x140/0x240 [ 367.141788][ T6516] ? __cfi_ksys_write+0x10/0x10 [ 367.146640][ T6516] ? debug_smp_processor_id+0x17/0x20 [ 367.152010][ T6516] __x64_sys_write+0x7b/0x90 [ 367.156606][ T6516] x64_sys_call+0x27b/0x9a0 [ 367.161105][ T6516] do_syscall_64+0x4c/0xa0 [ 367.165528][ T6516] ? clear_bhb_loop+0x30/0x80 [ 367.170206][ T6516] ? clear_bhb_loop+0x30/0x80 [ 367.174890][ T6516] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 367.180781][ T6516] RIP: 0033:0x7ff95bb8f749 [ 367.185194][ T6516] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 367.204802][ T6516] RSP: 002b:00007ff95ca61038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 367.213268][ T6516] RAX: ffffffffffffffda RBX: 00007ff95bde5fa0 RCX: 00007ff95bb8f749 [ 367.221238][ T6516] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000006 [ 367.229206][ T6516] RBP: 00007ff95ca61090 R08: 0000000000000000 R09: 0000000000000000 [ 367.237177][ T6516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 367.245146][ T6516] R13: 00007ff95bde6038 R14: 00007ff95bde5fa0 R15: 00007ffeceeca798 [ 367.253121][ T6516] [ 372.262245][ T6586] Ÿë: port 1(syz_tun) entered blocking state [ 372.271362][ T6586] Ÿë: port 1(syz_tun) entered disabled state [ 372.279885][ T6586] device syz_tun entered promiscuous mode [ 372.286251][ T6587] Ÿë: port 1(syz_tun) entered blocking state [ 372.292349][ T6587] Ÿë: port 1(syz_tun) entered forwarding state [ 374.972203][ T6608] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.980616][ T6608] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.502428][ T6636] Ÿë: port 1(syz_tun) entered blocking state [ 376.530597][ T6636] Ÿë: port 1(syz_tun) entered disabled state [ 376.579505][ T6636] device syz_tun entered promiscuous mode [ 376.659971][ T6637] Ÿë: port 1(syz_tun) entered blocking state [ 376.666094][ T6637] Ÿë: port 1(syz_tun) entered forwarding state [ 377.649540][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): Ÿë: link becomes ready [ 378.555024][ T6677] device sit0 left promiscuous mode [ 378.808501][ T6686] device sit0 left promiscuous mode [ 378.916330][ T6686] device sit0 entered promiscuous mode [ 381.159239][ T6732] FAULT_INJECTION: forcing a failure. [ 381.159239][ T6732] name failslab, interval 1, probability 0, space 0, times 0 [ 381.171915][ T6732] CPU: 0 PID: 6732 Comm: syz.4.1968 Not tainted syzkaller #0 [ 381.179299][ T6732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 381.189426][ T6732] Call Trace: [ 381.192721][ T6732] [ 381.195677][ T6732] __dump_stack+0x21/0x24 [ 381.200024][ T6732] dump_stack_lvl+0xee/0x150 [ 381.204709][ T6732] ? __cfi_dump_stack_lvl+0x8/0x8 [ 381.209742][ T6732] dump_stack+0x15/0x24 [ 381.213908][ T6732] should_fail_ex+0x3d4/0x520 [ 381.218596][ T6732] ? dst_alloc+0x16a/0x1e0 [ 381.223019][ T6732] __should_failslab+0xac/0xf0 [ 381.227832][ T6732] should_failslab+0x9/0x20 [ 381.232348][ T6732] kmem_cache_alloc+0x3b/0x330 [ 381.237137][ T6732] dst_alloc+0x16a/0x1e0 [ 381.241484][ T6732] ip_route_output_key_hash_rcu+0x1300/0x2030 [ 381.247582][ T6732] ip_route_output_flow+0x12e/0x2e0 [ 381.252793][ T6732] ? arch_stack_walk+0xfc/0x150 [ 381.257660][ T6732] ? __cfi_ip_route_output_flow+0x10/0x10 [ 381.263387][ T6732] ip_tunnel_xmit+0xa4b/0x2700 [ 381.268162][ T6732] ? __cfi_ip_tunnel_xmit+0x10/0x10 [ 381.273365][ T6732] ? unwind_get_return_address+0x4d/0x90 [ 381.279007][ T6732] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 381.285175][ T6732] ? gre_build_header+0x25d/0x9b0 [ 381.290210][ T6732] ipgre_xmit+0x80b/0xb90 [ 381.294555][ T6732] dev_hard_start_xmit+0x20b/0x750 [ 381.299678][ T6732] __dev_queue_xmit+0x18d9/0x3420 [ 381.304712][ T6732] ? __dev_queue_xmit+0x250/0x3420 [ 381.310193][ T6732] ? __cfi___dev_queue_xmit+0x10/0x10 [ 381.315576][ T6732] ? __kasan_check_write+0x14/0x20 [ 381.320693][ T6732] ? skb_release_data+0x1d2/0x890 [ 381.325713][ T6732] ? skb_ensure_writable+0x2f8/0x470 [ 381.330994][ T6732] ? __kasan_check_write+0x14/0x20 [ 381.336095][ T6732] ? pskb_expand_head+0xc4a/0x1210 [ 381.341297][ T6732] __bpf_redirect+0x8db/0x1130 [ 381.346152][ T6732] bpf_clone_redirect+0x26a/0x3c0 [ 381.351189][ T6732] bpf_prog_208b094576c80b22+0x56/0x5b [ 381.356660][ T6732] ? kasan_set_track+0x60/0x70 [ 381.361419][ T6732] ? kasan_set_track+0x4b/0x70 [ 381.366178][ T6732] ? kasan_save_alloc_info+0x25/0x30 [ 381.371466][ T6732] ? __kasan_slab_alloc+0x72/0x80 [ 381.376491][ T6732] ? slab_post_alloc_hook+0x4f/0x2d0 [ 381.381788][ T6732] ? kmem_cache_alloc+0x16e/0x330 [ 381.386816][ T6732] ? build_skb+0x2a/0x220 [ 381.391242][ T6732] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 381.396792][ T6732] ? bpf_prog_test_run+0x3e3/0x630 [ 381.401909][ T6732] ? __sys_bpf+0x56d/0x780 [ 381.406326][ T6732] ? __x64_sys_bpf+0x7c/0x90 [ 381.410936][ T6732] ? x64_sys_call+0x488/0x9a0 [ 381.415626][ T6732] ? do_syscall_64+0x4c/0xa0 [ 381.420221][ T6732] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 381.426307][ T6732] ? ktime_get+0x141/0x170 [ 381.430732][ T6732] bpf_test_run+0x349/0x8d0 [ 381.435243][ T6732] ? convert___skb_to_skb+0x5b0/0x5b0 [ 381.440625][ T6732] ? __cfi_eth_type_trans+0x10/0x10 [ 381.445824][ T6732] ? convert___skb_to_skb+0x40/0x5b0 [ 381.451114][ T6732] bpf_prog_test_run_skb+0xaec/0x1290 [ 381.456497][ T6732] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 381.462322][ T6732] bpf_prog_test_run+0x3e3/0x630 [ 381.467288][ T6732] ? slab_free_freelist_hook+0xc2/0x190 [ 381.472856][ T6732] ? bpf_prog_query+0x270/0x270 [ 381.477720][ T6732] ? selinux_bpf+0xce/0xf0 [ 381.482596][ T6732] ? security_bpf+0x93/0xb0 [ 381.487127][ T6732] __sys_bpf+0x56d/0x780 [ 381.491384][ T6732] ? bpf_link_show_fdinfo+0x320/0x320 [ 381.496771][ T6732] ? __cfi_ksys_write+0x10/0x10 [ 381.501622][ T6732] ? debug_smp_processor_id+0x17/0x20 [ 381.507076][ T6732] __x64_sys_bpf+0x7c/0x90 [ 381.511494][ T6732] x64_sys_call+0x488/0x9a0 [ 381.515993][ T6732] do_syscall_64+0x4c/0xa0 [ 381.520406][ T6732] ? clear_bhb_loop+0x30/0x80 [ 381.525082][ T6732] ? clear_bhb_loop+0x30/0x80 [ 381.529763][ T6732] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 381.535743][ T6732] RIP: 0033:0x7fd94458f749 [ 381.540160][ T6732] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 381.559808][ T6732] RSP: 002b:00007fd94535c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 381.568231][ T6732] RAX: ffffffffffffffda RBX: 00007fd9447e5fa0 RCX: 00007fd94458f749 [ 381.576211][ T6732] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 381.584179][ T6732] RBP: 00007fd94535c090 R08: 0000000000000000 R09: 0000000000000000 [ 381.592155][ T6732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 381.600145][ T6732] R13: 00007fd9447e6038 R14: 00007fd9447e5fa0 R15: 00007ffc4763e9e8 [ 381.608222][ T6732] [ 384.461202][ T6779] device sit0 left promiscuous mode [ 384.766537][ T6786] device sit0 entered promiscuous mode [ 386.382957][ T6818] device sit0 left promiscuous mode [ 388.452867][ T6863] device sit0 entered promiscuous mode [ 390.210201][ T6880] device sit0 left promiscuous mode [ 390.952665][ T6880] device sit0 entered promiscuous mode [ 392.590015][ T6918] FAULT_INJECTION: forcing a failure. [ 392.590015][ T6918] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 392.730080][ T6918] CPU: 1 PID: 6918 Comm: syz.3.2024 Not tainted syzkaller #0 [ 392.738301][ T6918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 392.748454][ T6918] Call Trace: [ 392.751747][ T6918] [ 392.754675][ T6918] __dump_stack+0x21/0x24 [ 392.759096][ T6918] dump_stack_lvl+0xee/0x150 [ 392.763700][ T6918] ? __cfi_dump_stack_lvl+0x8/0x8 [ 392.768726][ T6918] ? migrate_enable+0x19c/0x280 [ 392.773936][ T6918] dump_stack+0x15/0x24 [ 392.778122][ T6918] should_fail_ex+0x3d4/0x520 [ 392.782900][ T6918] should_fail+0xb/0x10 [ 392.787095][ T6918] should_fail_usercopy+0x1a/0x20 [ 392.792150][ T6918] _copy_from_user+0x1e/0xc0 [ 392.797196][ T6918] generic_map_update_batch+0x458/0x780 [ 392.802754][ T6918] ? __cfi_generic_map_update_batch+0x10/0x10 [ 392.809438][ T6918] ? __fdget+0x19c/0x220 [ 392.813680][ T6918] ? __cfi_generic_map_update_batch+0x10/0x10 [ 392.819745][ T6918] bpf_map_do_batch+0x48c/0x620 [ 392.825497][ T6918] __sys_bpf+0x624/0x780 [ 392.830297][ T6918] ? bpf_link_show_fdinfo+0x320/0x320 [ 392.836000][ T6918] ? __cfi_ksys_write+0x10/0x10 [ 392.841409][ T6918] ? debug_smp_processor_id+0x17/0x20 [ 392.846784][ T6918] __x64_sys_bpf+0x7c/0x90 [ 392.851214][ T6918] x64_sys_call+0x488/0x9a0 [ 392.855772][ T6918] do_syscall_64+0x4c/0xa0 [ 392.860221][ T6918] ? clear_bhb_loop+0x30/0x80 [ 392.864900][ T6918] ? clear_bhb_loop+0x30/0x80 [ 392.869671][ T6918] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 392.875569][ T6918] RIP: 0033:0x7fafebd8f749 [ 392.879990][ T6918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 392.900037][ T6918] RSP: 002b:00007fafeccf7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 392.908550][ T6918] RAX: ffffffffffffffda RBX: 00007fafebfe5fa0 RCX: 00007fafebd8f749 [ 392.916692][ T6918] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 392.924843][ T6918] RBP: 00007fafeccf7090 R08: 0000000000000000 R09: 0000000000000000 [ 392.932927][ T6918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 392.941305][ T6918] R13: 00007fafebfe6038 R14: 00007fafebfe5fa0 R15: 00007fffaacb1768 [ 392.949402][ T6918] [ 393.232799][ T6935] FAULT_INJECTION: forcing a failure. [ 393.232799][ T6935] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 393.378677][ T6935] CPU: 0 PID: 6935 Comm: syz.3.2028 Not tainted syzkaller #0 [ 393.386097][ T6935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 393.396166][ T6935] Call Trace: [ 393.399461][ T6935] [ 393.402413][ T6935] __dump_stack+0x21/0x24 [ 393.406765][ T6935] dump_stack_lvl+0xee/0x150 [ 393.411358][ T6935] ? __cfi_dump_stack_lvl+0x8/0x8 [ 393.416393][ T6935] dump_stack+0x15/0x24 [ 393.420908][ T6935] should_fail_ex+0x3d4/0x520 [ 393.426228][ T6935] should_fail_alloc_page+0x61/0x90 [ 393.431441][ T6935] prepare_alloc_pages+0x148/0x5f0 [ 393.436572][ T6935] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 393.441973][ T6935] __alloc_pages+0x124/0x450 [ 393.446579][ T6935] ? irqentry_exit+0x37/0x40 [ 393.451193][ T6935] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 393.457027][ T6935] ? __cfi___alloc_pages+0x10/0x10 [ 393.462161][ T6935] ? __kasan_check_write+0x14/0x20 [ 393.467315][ T6935] ? _raw_spin_lock+0x8e/0xe0 [ 393.472198][ T6935] ? __cfi__raw_spin_lock+0x10/0x10 [ 393.477405][ T6935] ? kasan_check_range+0x16a/0x290 [ 393.482711][ T6935] __get_free_pages+0xe/0x30 [ 393.487340][ T6935] kasan_populate_vmalloc_pte+0x29/0x120 [ 393.493653][ T6935] __apply_to_page_range+0x8de/0xc80 [ 393.499057][ T6935] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 393.505324][ T6935] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 393.511753][ T6935] apply_to_page_range+0x3b/0x50 [ 393.516790][ T6935] kasan_populate_vmalloc+0x60/0x70 [ 393.522292][ T6935] alloc_vmap_area+0x173e/0x1870 [ 393.527348][ T6935] ? vm_map_ram+0x930/0x930 [ 393.531857][ T6935] ? __kasan_kmalloc+0x95/0xb0 [ 393.536716][ T6935] ? kmalloc_node_trace+0x3d/0xb0 [ 393.541738][ T6935] __get_vm_area_node+0x160/0x360 [ 393.546762][ T6935] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 393.552846][ T6935] __vmalloc_node_range+0x326/0x13d0 [ 393.558149][ T6935] ? htab_map_alloc+0x399/0xfd0 [ 393.563014][ T6935] ? __cfi___vmalloc_node_range+0x10/0x10 [ 393.568743][ T6935] ? kasan_save_alloc_info+0x25/0x30 [ 393.574054][ T6935] ? __kasan_kmalloc+0x95/0xb0 [ 393.579537][ T6935] ? bpf_map_area_alloc+0x4b/0xe0 [ 393.584611][ T6935] ? __kmalloc_node+0xb2/0x1e0 [ 393.589382][ T6935] bpf_map_area_alloc+0xd7/0xe0 [ 393.594236][ T6935] ? htab_map_alloc+0x399/0xfd0 [ 393.599095][ T6935] htab_map_alloc+0x399/0xfd0 [ 393.603801][ T6935] ? htab_map_alloc_check+0x3e1/0x4c0 [ 393.609251][ T6935] map_create+0x49c/0xd80 [ 393.613621][ T6935] __sys_bpf+0x30b/0x780 [ 393.617891][ T6935] ? bpf_link_show_fdinfo+0x320/0x320 [ 393.623274][ T6935] __x64_sys_bpf+0x7c/0x90 [ 393.627698][ T6935] x64_sys_call+0x488/0x9a0 [ 393.632201][ T6935] do_syscall_64+0x4c/0xa0 [ 393.636630][ T6935] ? clear_bhb_loop+0x30/0x80 [ 393.641326][ T6935] ? clear_bhb_loop+0x30/0x80 [ 393.646032][ T6935] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 393.651936][ T6935] RIP: 0033:0x7fafebd8f749 [ 393.656356][ T6935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 393.675978][ T6935] RSP: 002b:00007fafeccf7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 393.684411][ T6935] RAX: ffffffffffffffda RBX: 00007fafebfe5fa0 RCX: 00007fafebd8f749 [ 393.692398][ T6935] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 393.700392][ T6935] RBP: 00007fafeccf7090 R08: 0000000000000000 R09: 0000000000000000 [ 393.708428][ T6935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 393.716423][ T6935] R13: 00007fafebfe6038 R14: 00007fafebfe5fa0 R15: 00007fffaacb1768 [ 393.724465][ T6935] [ 398.091478][ T7027] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 398.097689][ T7027] syzkaller0: linktype set to 804 [ 400.362166][ T7083] device sit0 left promiscuous mode [ 400.466598][ T7085] device veth0_vlan left promiscuous mode [ 400.574103][ T7085] device veth0_vlan entered promiscuous mode [ 400.733565][ T692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 400.753864][ T692] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 400.761930][ T692] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 402.934095][ T7158] device sit0 entered promiscuous mode [ 406.269207][ T7217] device sit0 left promiscuous mode [ 406.392077][ T7227] device pim6reg1 entered promiscuous mode [ 407.944827][ T28] audit: type=1400 audit(1763624175.691:143): avc: denied { create } for pid=7258 comm="syz.1.2131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 408.270409][ T7272] device sit0 entered promiscuous mode [ 409.671774][ T7294] device sit0 left promiscuous mode [ 410.966692][ T7320] FAULT_INJECTION: forcing a failure. [ 410.966692][ T7320] name failslab, interval 1, probability 0, space 0, times 0 [ 410.979489][ T7320] CPU: 0 PID: 7320 Comm: syz.0.2150 Not tainted syzkaller #0 [ 410.986861][ T7320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 410.996915][ T7320] Call Trace: [ 411.000188][ T7320] [ 411.003108][ T7320] __dump_stack+0x21/0x24 [ 411.007449][ T7320] dump_stack_lvl+0xee/0x150 [ 411.012035][ T7320] ? __cfi_dump_stack_lvl+0x8/0x8 [ 411.017069][ T7320] ? selinux_kernfs_init_security+0x12b/0x400 [ 411.023139][ T7320] dump_stack+0x15/0x24 [ 411.027288][ T7320] should_fail_ex+0x3d4/0x520 [ 411.031963][ T7320] ? __kernfs_new_node+0xdb/0x680 [ 411.036988][ T7320] __should_failslab+0xac/0xf0 [ 411.041749][ T7320] should_failslab+0x9/0x20 [ 411.046246][ T7320] kmem_cache_alloc+0x3b/0x330 [ 411.051010][ T7320] __kernfs_new_node+0xdb/0x680 [ 411.055865][ T7320] ? clear_nonspinnable+0x60/0x60 [ 411.060886][ T7320] ? rwsem_write_trylock+0x130/0x300 [ 411.066176][ T7320] ? kernfs_new_node+0x260/0x260 [ 411.071113][ T7320] ? up_write+0x7b/0x290 [ 411.075358][ T7320] kernfs_new_node+0x150/0x260 [ 411.080120][ T7320] __kernfs_create_file+0x4e/0x270 [ 411.085230][ T7320] sysfs_add_file_mode_ns+0x1ce/0x270 [ 411.090605][ T7320] internal_create_group+0x495/0xd00 [ 411.095889][ T7320] ? sysfs_create_group+0x30/0x30 [ 411.100909][ T7320] ? up_write+0x7b/0x290 [ 411.105150][ T7320] ? kernfs_activate+0x1ea/0x200 [ 411.110089][ T7320] sysfs_create_groups+0x58/0x120 [ 411.115119][ T7320] device_add_attrs+0xdb/0x810 [ 411.119873][ T7320] ? get_device_parent+0x410/0x410 [ 411.124974][ T7320] ? sysfs_do_create_link_sd+0xe9/0x110 [ 411.130514][ T7320] device_add+0x5f1/0xef0 [ 411.134847][ T7320] netdev_register_kobject+0x179/0x320 [ 411.140302][ T7320] ? raw_notifier_call_chain+0xfa/0x110 [ 411.145848][ T7320] register_netdevice+0xe3d/0x14a0 [ 411.150962][ T7320] ? __cfi_register_netdevice+0x10/0x10 [ 411.156505][ T7320] ? memcpy+0x56/0x70 [ 411.160483][ T7320] ip6gre_tunnel_locate+0x30e/0x850 [ 411.165682][ T7320] ? cap_capable+0x1aa/0x230 [ 411.170278][ T7320] ? ip6gre_tnl_change+0xaa0/0xaa0 [ 411.175402][ T7320] ? ip6gre_tnl_parm_from_user+0x321/0x540 [ 411.181213][ T7320] ip6gre_tunnel_siocdevprivate+0x59d/0x710 [ 411.187109][ T7320] ? __cfi_ip6gre_tunnel_siocdevprivate+0x10/0x10 [ 411.193522][ T7320] ? __mutex_lock+0x2bf/0x16d0 [ 411.198298][ T7320] ? full_name_hash+0x9d/0xf0 [ 411.202970][ T7320] dev_ifsioc+0xbc4/0xed0 [ 411.207308][ T7320] ? ioctl_has_perm+0x391/0x4c0 [ 411.212155][ T7320] ? dev_ioctl+0xd10/0xd10 [ 411.216567][ T7320] ? __mutex_lock_slowpath+0xe/0x10 [ 411.221768][ T7320] ? mutex_lock+0xf8/0x1a0 [ 411.226181][ T7320] ? __cfi_mutex_lock+0x10/0x10 [ 411.231026][ T7320] ? dev_get_by_name_rcu+0xe5/0x130 [ 411.236220][ T7320] dev_ioctl+0x5f3/0xd10 [ 411.240464][ T7320] sock_ioctl+0x675/0x6e0 [ 411.244791][ T7320] ? __cfi_sock_ioctl+0x10/0x10 [ 411.249638][ T7320] ? security_file_ioctl+0x95/0xc0 [ 411.254754][ T7320] ? __cfi_sock_ioctl+0x10/0x10 [ 411.259613][ T7320] __se_sys_ioctl+0x12f/0x1b0 [ 411.264292][ T7320] __x64_sys_ioctl+0x7b/0x90 [ 411.268876][ T7320] x64_sys_call+0x58b/0x9a0 [ 411.273374][ T7320] do_syscall_64+0x4c/0xa0 [ 411.277782][ T7320] ? clear_bhb_loop+0x30/0x80 [ 411.282453][ T7320] ? clear_bhb_loop+0x30/0x80 [ 411.287126][ T7320] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 411.293019][ T7320] RIP: 0033:0x7ff95bb8f749 [ 411.297426][ T7320] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 411.317028][ T7320] RSP: 002b:00007ff95ca61038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 411.325445][ T7320] RAX: ffffffffffffffda RBX: 00007ff95bde5fa0 RCX: 00007ff95bb8f749 [ 411.333412][ T7320] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000006 [ 411.341380][ T7320] RBP: 00007ff95ca61090 R08: 0000000000000000 R09: 0000000000000000 [ 411.349343][ T7320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 411.357302][ T7320] R13: 00007ff95bde6038 R14: 00007ff95bde5fa0 R15: 00007ffeceeca798 [ 411.365262][ T7320] [ 411.851339][ T28] audit: type=1400 audit(1763624179.601:144): avc: denied { create } for pid=7335 comm="syz.1.2154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 417.573145][ T7348] syz.1.2157 (7348) used greatest stack depth: 21472 bytes left [ 421.454127][ T7467] device sit0 entered promiscuous mode [ 422.159647][ T7472] device veth0_vlan left promiscuous mode [ 422.171193][ T7472] device veth0_vlan entered promiscuous mode [ 422.247868][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 422.293778][ T7476] device syzkaller0 entered promiscuous mode [ 422.410126][ T7485] device sit0 left promiscuous mode [ 422.455187][ T7485] FAULT_INJECTION: forcing a failure. [ 422.455187][ T7485] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 422.520899][ T7485] CPU: 0 PID: 7485 Comm: syz.0.2197 Not tainted syzkaller #0 [ 422.528311][ T7485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 422.538368][ T7485] Call Trace: [ 422.541643][ T7485] [ 422.544571][ T7485] __dump_stack+0x21/0x24 [ 422.548909][ T7485] dump_stack_lvl+0xee/0x150 [ 422.553507][ T7485] ? __cfi_dump_stack_lvl+0x8/0x8 [ 422.558541][ T7485] ? ioctl_has_perm+0x8d/0x4c0 [ 422.563312][ T7485] dump_stack+0x15/0x24 [ 422.567471][ T7485] should_fail_ex+0x3d4/0x520 [ 422.572153][ T7485] should_fail+0xb/0x10 [ 422.576307][ T7485] should_fail_usercopy+0x1a/0x20 [ 422.581327][ T7485] _copy_from_user+0x1e/0xc0 [ 422.586011][ T7485] sock_do_ioctl+0x186/0x310 [ 422.590615][ T7485] ? sock_show_fdinfo+0xb0/0xb0 [ 422.595465][ T7485] ? selinux_file_ioctl+0x377/0x480 [ 422.600660][ T7485] sock_ioctl+0x4d8/0x6e0 [ 422.604987][ T7485] ? __cfi_sock_ioctl+0x10/0x10 [ 422.609836][ T7485] ? __fget_files+0x2d5/0x330 [ 422.614508][ T7485] ? security_file_ioctl+0x95/0xc0 [ 422.619617][ T7485] ? __cfi_sock_ioctl+0x10/0x10 [ 422.624555][ T7485] __se_sys_ioctl+0x12f/0x1b0 [ 422.629228][ T7485] __x64_sys_ioctl+0x7b/0x90 [ 422.633823][ T7485] x64_sys_call+0x58b/0x9a0 [ 422.638325][ T7485] do_syscall_64+0x4c/0xa0 [ 422.642734][ T7485] ? clear_bhb_loop+0x30/0x80 [ 422.647414][ T7485] ? clear_bhb_loop+0x30/0x80 [ 422.652102][ T7485] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 422.658001][ T7485] RIP: 0033:0x7ff95bb8f749 [ 422.662421][ T7485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 422.682028][ T7485] RSP: 002b:00007ff95ca61038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 422.690449][ T7485] RAX: ffffffffffffffda RBX: 00007ff95bde5fa0 RCX: 00007ff95bb8f749 [ 422.698432][ T7485] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 0000000000000006 [ 422.706409][ T7485] RBP: 00007ff95ca61090 R08: 0000000000000000 R09: 0000000000000000 [ 422.714379][ T7485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 422.722348][ T7485] R13: 00007ff95bde6038 R14: 00007ff95bde5fa0 R15: 00007ffeceeca798 [ 422.730325][ T7485] [ 436.104075][ T7637] device syzkaller0 entered promiscuous mode [ 442.803735][ T7767] device veth0_vlan left promiscuous mode [ 442.810644][ T7767] device veth0_vlan entered promiscuous mode [ 442.817524][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 442.831056][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 442.845359][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 443.032182][ T7783] pim6reg1: tun_chr_ioctl cmd 1074025676 [ 443.037905][ T7783] pim6reg1: owner set to 0 [ 443.045951][ T7783] syz.0.2289[7783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.595623][ T7821] FAULT_INJECTION: forcing a failure. [ 445.595623][ T7821] name failslab, interval 1, probability 0, space 0, times 0 [ 445.619871][ T7821] CPU: 0 PID: 7821 Comm: syz.2.2300 Not tainted syzkaller #0 [ 445.627256][ T7821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 445.637308][ T7821] Call Trace: [ 445.640577][ T7821] [ 445.643499][ T7821] __dump_stack+0x21/0x24 [ 445.647824][ T7821] dump_stack_lvl+0xee/0x150 [ 445.652407][ T7821] ? __cfi_dump_stack_lvl+0x8/0x8 [ 445.657424][ T7821] dump_stack+0x15/0x24 [ 445.661575][ T7821] should_fail_ex+0x3d4/0x520 [ 445.666251][ T7821] __should_failslab+0xac/0xf0 [ 445.671012][ T7821] ? page_pool_create+0x70/0x620 [ 445.675951][ T7821] should_failslab+0x9/0x20 [ 445.680446][ T7821] __kmem_cache_alloc_node+0x3d/0x2c0 [ 445.685815][ T7821] ? kvmalloc_node+0x2bf/0x480 [ 445.690567][ T7821] ? page_pool_create+0x70/0x620 [ 445.695500][ T7821] kmalloc_node_trace+0x26/0xb0 [ 445.700341][ T7821] page_pool_create+0x70/0x620 [ 445.705102][ T7821] bpf_test_run_xdp_live+0x1c3/0x19e0 [ 445.710477][ T7821] ? kasan_set_track+0x60/0x70 [ 445.715233][ T7821] ? kasan_set_track+0x4b/0x70 [ 445.719991][ T7821] ? kasan_save_alloc_info+0x25/0x30 [ 445.725282][ T7821] ? __kasan_kmalloc+0x95/0xb0 [ 445.730044][ T7821] ? __kmalloc+0xb1/0x1e0 [ 445.734370][ T7821] ? bpf_test_init+0xce/0x160 [ 445.739049][ T7821] ? bpf_prog_test_run+0x3e3/0x630 [ 445.744149][ T7821] ? __sys_bpf+0x56d/0x780 [ 445.748554][ T7821] ? __x64_sys_bpf+0x7c/0x90 [ 445.753145][ T7821] ? do_syscall_64+0x4c/0xa0 [ 445.757734][ T7821] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 445.763802][ T7821] ? xdp_convert_md_to_buff+0x370/0x370 [ 445.769365][ T7821] ? __cfi_xdp_test_run_init_page+0x10/0x10 [ 445.775257][ T7821] ? __kasan_check_write+0x14/0x20 [ 445.780361][ T7821] ? _copy_from_user+0x8f/0xc0 [ 445.785123][ T7821] ? bpf_test_init+0x141/0x160 [ 445.789887][ T7821] ? xdp_convert_md_to_buff+0x60/0x370 [ 445.795345][ T7821] bpf_prog_test_run_xdp+0x6f1/0xe50 [ 445.800897][ T7821] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 445.806705][ T7821] ? __kasan_check_write+0x14/0x20 [ 445.811813][ T7821] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 445.817617][ T7821] bpf_prog_test_run+0x3e3/0x630 [ 445.822550][ T7821] ? slab_free_freelist_hook+0xc2/0x190 [ 445.828094][ T7821] ? bpf_prog_query+0x270/0x270 [ 445.832942][ T7821] ? selinux_bpf+0xce/0xf0 [ 445.837359][ T7821] ? security_bpf+0x93/0xb0 [ 445.841860][ T7821] __sys_bpf+0x56d/0x780 [ 445.846111][ T7821] ? bpf_link_show_fdinfo+0x320/0x320 [ 445.851480][ T7821] ? __cfi_ksys_write+0x10/0x10 [ 445.856331][ T7821] ? debug_smp_processor_id+0x17/0x20 [ 445.861701][ T7821] __x64_sys_bpf+0x7c/0x90 [ 445.866138][ T7821] x64_sys_call+0x488/0x9a0 [ 445.870638][ T7821] do_syscall_64+0x4c/0xa0 [ 445.875050][ T7821] ? clear_bhb_loop+0x30/0x80 [ 445.879726][ T7821] ? clear_bhb_loop+0x30/0x80 [ 445.884399][ T7821] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 445.890292][ T7821] RIP: 0033:0x7fd204f8f749 [ 445.894703][ T7821] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 445.914305][ T7821] RSP: 002b:00007fd205db1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 445.922723][ T7821] RAX: ffffffffffffffda RBX: 00007fd2051e5fa0 RCX: 00007fd204f8f749 [ 445.930691][ T7821] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 445.938657][ T7821] RBP: 00007fd205db1090 R08: 0000000000000000 R09: 0000000000000000 [ 445.946623][ T7821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 445.954585][ T7821] R13: 00007fd2051e6038 R14: 00007fd2051e5fa0 R15: 00007ffd9d642a28 [ 445.962561][ T7821] [ 448.695186][ T7872] FAULT_INJECTION: forcing a failure. [ 448.695186][ T7872] name failslab, interval 1, probability 0, space 0, times 0 [ 448.723354][ T7872] CPU: 1 PID: 7872 Comm: syz.3.2319 Not tainted syzkaller #0 [ 448.730766][ T7872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 448.740819][ T7872] Call Trace: [ 448.744092][ T7872] [ 448.747016][ T7872] __dump_stack+0x21/0x24 [ 448.751344][ T7872] dump_stack_lvl+0xee/0x150 [ 448.755928][ T7872] ? __cfi_dump_stack_lvl+0x8/0x8 [ 448.760951][ T7872] dump_stack+0x15/0x24 [ 448.765105][ T7872] should_fail_ex+0x3d4/0x520 [ 448.769789][ T7872] ? vm_area_dup+0x65/0x280 [ 448.774302][ T7872] __should_failslab+0xac/0xf0 [ 448.779073][ T7872] should_failslab+0x9/0x20 [ 448.783575][ T7872] kmem_cache_alloc+0x3b/0x330 [ 448.788344][ T7872] vm_area_dup+0x65/0x280 [ 448.792675][ T7872] copy_mm+0xb45/0x1a10 [ 448.796830][ T7872] ? copy_signal+0x630/0x630 [ 448.801416][ T7872] ? _raw_spin_lock+0x8e/0xe0 [ 448.806092][ T7872] ? __cfi__raw_spin_lock+0x10/0x10 [ 448.811285][ T7872] ? __init_rwsem+0x12c/0x240 [ 448.815961][ T7872] ? copy_signal+0x4ea/0x630 [ 448.820543][ T7872] copy_process+0x12b4/0x3480 [ 448.825231][ T7872] ? tracing_record_taskinfo_sched_switch+0x80/0x3a0 [ 448.831914][ T7872] ? idle_dummy+0x10/0x10 [ 448.836241][ T7872] ? ttwu_do_wakeup+0x1b4/0x490 [ 448.841088][ T7872] kernel_clone+0x23a/0x810 [ 448.845589][ T7872] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 448.851401][ T7872] ? __cfi_kernel_clone+0x10/0x10 [ 448.856427][ T7872] __x64_sys_clone+0x168/0x1b0 [ 448.861194][ T7872] ? __cfi___x64_sys_clone+0x10/0x10 [ 448.866475][ T7872] ? sched_clock_cpu+0x6e/0x250 [ 448.871328][ T7872] ? debug_smp_processor_id+0x17/0x20 [ 448.876698][ T7872] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 448.882769][ T7872] x64_sys_call+0x990/0x9a0 [ 448.887268][ T7872] do_syscall_64+0x4c/0xa0 [ 448.891677][ T7872] ? clear_bhb_loop+0x30/0x80 [ 448.896355][ T7872] ? clear_bhb_loop+0x30/0x80 [ 448.901035][ T7872] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 448.906927][ T7872] RIP: 0033:0x7fafebd8f749 [ 448.911340][ T7872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 448.930944][ T7872] RSP: 002b:00007fafeccf6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 448.939357][ T7872] RAX: ffffffffffffffda RBX: 00007fafebfe5fa0 RCX: 00007fafebd8f749 [ 448.947315][ T7872] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 448.955271][ T7872] RBP: 00007fafeccf7090 R08: 0000000000000000 R09: 0000000000000000 [ 448.963222][ T7872] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 448.971172][ T7872] R13: 00007fafebfe6038 R14: 00007fafebfe5fa0 R15: 00007fffaacb1768 [ 448.979129][ T7872] [ 449.219377][ T7881] ªªªªªª: renamed from vlan0 [ 451.121578][ T7947] ref_ctr_offset mismatch. inode: 0x92a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 451.286064][ T7957] device pim6reg1 entered promiscuous mode [ 453.117449][ T7990] device syzkaller0 entered promiscuous mode [ 454.434616][ T8040] device sit0 left promiscuous mode [ 454.759803][ T8044] device sit0 entered promiscuous mode [ 457.826400][ T8092] device syzkaller0 entered promiscuous mode [ 459.531943][ T8138] device sit0 entered promiscuous mode [ 460.320331][ T8141] device sit0 entered promiscuous mode [ 461.387992][ T8165] FAULT_INJECTION: forcing a failure. [ 461.387992][ T8165] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 461.487800][ T8165] CPU: 1 PID: 8165 Comm: syz.0.2410 Not tainted syzkaller #0 [ 461.495226][ T8165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 461.505287][ T8165] Call Trace: [ 461.508561][ T8165] [ 461.511482][ T8165] __dump_stack+0x21/0x24 [ 461.515814][ T8165] dump_stack_lvl+0xee/0x150 [ 461.520401][ T8165] ? __cfi_dump_stack_lvl+0x8/0x8 [ 461.525425][ T8165] dump_stack+0x15/0x24 [ 461.529575][ T8165] should_fail_ex+0x3d4/0x520 [ 461.534254][ T8165] should_fail+0xb/0x10 [ 461.538405][ T8165] should_fail_usercopy+0x1a/0x20 [ 461.543425][ T8165] _copy_from_user+0x1e/0xc0 [ 461.548013][ T8165] sock_do_ioctl+0x186/0x310 [ 461.552604][ T8165] ? sock_show_fdinfo+0xb0/0xb0 [ 461.557456][ T8165] ? selinux_file_ioctl+0x377/0x480 [ 461.562650][ T8165] sock_ioctl+0x4d8/0x6e0 [ 461.566977][ T8165] ? __cfi_sock_ioctl+0x10/0x10 [ 461.571825][ T8165] ? __fget_files+0x2d5/0x330 [ 461.576505][ T8165] ? security_file_ioctl+0x95/0xc0 [ 461.581643][ T8165] ? __cfi_sock_ioctl+0x10/0x10 [ 461.586512][ T8165] __se_sys_ioctl+0x12f/0x1b0 [ 461.591186][ T8165] __x64_sys_ioctl+0x7b/0x90 [ 461.595775][ T8165] x64_sys_call+0x58b/0x9a0 [ 461.600290][ T8165] do_syscall_64+0x4c/0xa0 [ 461.604702][ T8165] ? clear_bhb_loop+0x30/0x80 [ 461.609377][ T8165] ? clear_bhb_loop+0x30/0x80 [ 461.614053][ T8165] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 461.619942][ T8165] RIP: 0033:0x7ff95bb8f749 [ 461.624350][ T8165] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 461.643955][ T8165] RSP: 002b:00007ff95ca61038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 461.652368][ T8165] RAX: ffffffffffffffda RBX: 00007ff95bde5fa0 RCX: 00007ff95bb8f749 [ 461.660333][ T8165] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 0000000000000004 [ 461.668296][ T8165] RBP: 00007ff95ca61090 R08: 0000000000000000 R09: 0000000000000000 [ 461.676259][ T8165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 461.684220][ T8165] R13: 00007ff95bde6038 R14: 00007ff95bde5fa0 R15: 00007ffeceeca798 [ 461.692190][ T8165] [ 463.845514][ T8178] device sit0 entered promiscuous mode [ 465.342766][ T8225] syz.2.2429[8225] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.342882][ T8225] syz.2.2429[8225] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.219171][ T8258] device sit0 left promiscuous mode [ 467.540940][ T8260] device sit0 entered promiscuous mode [ 467.546939][ T8260] FAULT_INJECTION: forcing a failure. [ 467.546939][ T8260] name failslab, interval 1, probability 0, space 0, times 0 [ 467.704587][ T8260] CPU: 1 PID: 8260 Comm: syz.2.2441 Not tainted syzkaller #0 [ 467.711996][ T8260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 467.722051][ T8260] Call Trace: [ 467.725341][ T8260] [ 467.728271][ T8260] __dump_stack+0x21/0x24 [ 467.732602][ T8260] dump_stack_lvl+0xee/0x150 [ 467.737192][ T8260] ? __cfi_dump_stack_lvl+0x8/0x8 [ 467.742220][ T8260] dump_stack+0x15/0x24 [ 467.746379][ T8260] should_fail_ex+0x3d4/0x520 [ 467.751062][ T8260] __should_failslab+0xac/0xf0 [ 467.755832][ T8260] should_failslab+0x9/0x20 [ 467.760329][ T8260] kmem_cache_alloc_node+0x42/0x340 [ 467.765533][ T8260] ? __alloc_skb+0xea/0x4b0 [ 467.770029][ T8260] __alloc_skb+0xea/0x4b0 [ 467.774356][ T8260] rtmsg_ifinfo_build_skb+0x7c/0x190 [ 467.779643][ T8260] rtmsg_ifinfo+0x7a/0x130 [ 467.784072][ T8260] __dev_notify_flags+0xdb/0x500 [ 467.789018][ T8260] ? __cfi___dev_notify_flags+0x10/0x10 [ 467.794571][ T8260] ? __dev_change_flags+0x4cc/0x6b0 [ 467.799775][ T8260] ? __cfi___dev_change_flags+0x10/0x10 [ 467.805326][ T8260] dev_change_flags+0xe8/0x1a0 [ 467.810092][ T8260] dev_ifsioc+0x159/0xed0 [ 467.814429][ T8260] ? dev_ioctl+0xd10/0xd10 [ 467.818848][ T8260] ? __mutex_lock_slowpath+0xe/0x10 [ 467.824053][ T8260] ? mutex_lock+0xf8/0x1a0 [ 467.828488][ T8260] ? __cfi_mutex_lock+0x10/0x10 [ 467.833345][ T8260] ? dev_get_by_name_rcu+0xe5/0x130 [ 467.838545][ T8260] dev_ioctl+0x556/0xd10 [ 467.842795][ T8260] sock_do_ioctl+0x23f/0x310 [ 467.847397][ T8260] ? sock_show_fdinfo+0xb0/0xb0 [ 467.852253][ T8260] ? sock_ioctl+0x1ab/0x6e0 [ 467.856760][ T8260] sock_ioctl+0x4d8/0x6e0 [ 467.861097][ T8260] ? __cfi_sock_ioctl+0x10/0x10 [ 467.865963][ T8260] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 467.872129][ T8260] ? __se_sys_ioctl+0x62/0x1b0 [ 467.876907][ T8260] ? __cfi_sock_ioctl+0x10/0x10 [ 467.881773][ T8260] __se_sys_ioctl+0x12f/0x1b0 [ 467.886454][ T8260] __x64_sys_ioctl+0x7b/0x90 [ 467.891043][ T8260] x64_sys_call+0x58b/0x9a0 [ 467.895529][ T8260] do_syscall_64+0x4c/0xa0 [ 467.899923][ T8260] ? clear_bhb_loop+0x30/0x80 [ 467.904588][ T8260] ? clear_bhb_loop+0x30/0x80 [ 467.909245][ T8260] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 467.915116][ T8260] RIP: 0033:0x7fd204f8f749 [ 467.919509][ T8260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 467.939101][ T8260] RSP: 002b:00007fd205d90038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 467.947517][ T8260] RAX: ffffffffffffffda RBX: 00007fd2051e6090 RCX: 00007fd204f8f749 [ 467.955491][ T8260] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 0000000000000006 [ 467.963461][ T8260] RBP: 00007fd205d90090 R08: 0000000000000000 R09: 0000000000000000 [ 467.971434][ T8260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 467.979405][ T8260] R13: 00007fd2051e6128 R14: 00007fd2051e6090 R15: 00007ffd9d642a28 [ 467.987378][ T8260] [ 469.709427][ T8288] device macsec0 entered promiscuous mode [ 470.889722][ T8311] FAULT_INJECTION: forcing a failure. [ 470.889722][ T8311] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 470.902837][ T8311] CPU: 0 PID: 8311 Comm: syz.3.2457 Not tainted syzkaller #0 [ 470.910205][ T8311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 470.920255][ T8311] Call Trace: [ 470.923524][ T8311] [ 470.926451][ T8311] __dump_stack+0x21/0x24 [ 470.930782][ T8311] dump_stack_lvl+0xee/0x150 [ 470.935368][ T8311] ? __cfi_dump_stack_lvl+0x8/0x8 [ 470.940388][ T8311] ? __kasan_check_write+0x14/0x20 [ 470.945493][ T8311] ? _raw_spin_lock_irq+0x8f/0xe0 [ 470.950512][ T8311] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 470.956049][ T8311] dump_stack+0x15/0x24 [ 470.960205][ T8311] should_fail_ex+0x3d4/0x520 [ 470.964885][ T8311] should_fail+0xb/0x10 [ 470.969041][ T8311] should_fail_usercopy+0x1a/0x20 [ 470.974073][ T8311] copy_page_from_iter_atomic+0x35c/0x1210 [ 470.979888][ T8311] ? __cfi_copy_page_from_iter_atomic+0x10/0x10 [ 470.986135][ T8311] ? __kasan_check_read+0x11/0x20 [ 470.991157][ T8311] ? shmem_write_begin+0x151/0x2c0 [ 470.996263][ T8311] generic_perform_write+0x348/0x6d0 [ 471.001550][ T8311] ? __cfi_generic_perform_write+0x10/0x10 [ 471.007346][ T8311] ? __cfi_file_update_time+0x10/0x10 [ 471.012705][ T8311] __generic_file_write_iter+0x227/0x580 [ 471.018321][ T8311] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 471.024027][ T8311] ? __cfi___generic_file_write_iter+0x10/0x10 [ 471.030161][ T8311] ? rwsem_write_trylock+0x130/0x300 [ 471.035436][ T8311] ? generic_write_checks_count+0x3c6/0x4a0 [ 471.041310][ T8311] ? generic_write_checks+0xca/0x100 [ 471.046576][ T8311] generic_file_write_iter+0xae/0x310 [ 471.051930][ T8311] vfs_write+0x5db/0xca0 [ 471.056159][ T8311] ? slab_free_freelist_hook+0xc2/0x190 [ 471.061705][ T8311] ? __cfi_vfs_write+0x10/0x10 [ 471.066455][ T8311] ? __cfi_mutex_lock+0x10/0x10 [ 471.071289][ T8311] ? __fdget_pos+0x2cd/0x380 [ 471.075859][ T8311] ? ksys_write+0x71/0x240 [ 471.080258][ T8311] ksys_write+0x140/0x240 [ 471.084566][ T8311] ? __cfi_ksys_write+0x10/0x10 [ 471.089395][ T8311] ? debug_smp_processor_id+0x17/0x20 [ 471.094747][ T8311] __x64_sys_write+0x7b/0x90 [ 471.099315][ T8311] x64_sys_call+0x27b/0x9a0 [ 471.103802][ T8311] do_syscall_64+0x4c/0xa0 [ 471.108196][ T8311] ? clear_bhb_loop+0x30/0x80 [ 471.112863][ T8311] ? clear_bhb_loop+0x30/0x80 [ 471.117523][ T8311] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 471.123463][ T8311] RIP: 0033:0x7fafebd8f749 [ 471.127865][ T8311] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 471.147450][ T8311] RSP: 002b:00007fafeccd6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 471.155844][ T8311] RAX: ffffffffffffffda RBX: 00007fafebfe6090 RCX: 00007fafebd8f749 [ 471.163795][ T8311] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000009 [ 471.171748][ T8311] RBP: 00007fafeccd6090 R08: 0000000000000000 R09: 0000000000000000 [ 471.179699][ T8311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 471.187651][ T8311] R13: 00007fafebfe6128 R14: 00007fafebfe6090 R15: 00007fffaacb1768 [ 471.195613][ T8311] [ 473.023626][ T8364] FAULT_INJECTION: forcing a failure. [ 473.023626][ T8364] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 473.061037][ T8364] CPU: 1 PID: 8364 Comm: syz.1.2476 Not tainted syzkaller #0 [ 473.068448][ T8364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 473.078503][ T8364] Call Trace: [ 473.081782][ T8364] [ 473.084706][ T8364] __dump_stack+0x21/0x24 [ 473.089035][ T8364] dump_stack_lvl+0xee/0x150 [ 473.093623][ T8364] ? __cfi_dump_stack_lvl+0x8/0x8 [ 473.098648][ T8364] dump_stack+0x15/0x24 [ 473.102793][ T8364] should_fail_ex+0x3d4/0x520 [ 473.107472][ T8364] should_fail+0xb/0x10 [ 473.111622][ T8364] should_fail_usercopy+0x1a/0x20 [ 473.116649][ T8364] _copy_to_user+0x1e/0x90 [ 473.121061][ T8364] bpf_prog_test_run_raw_tp+0x4e0/0x670 [ 473.126611][ T8364] ? __cfi_bpf_prog_test_run_raw_tp+0x10/0x10 [ 473.132681][ T8364] ? __kasan_check_write+0x14/0x20 [ 473.137794][ T8364] ? __cfi_bpf_prog_test_run_raw_tp+0x10/0x10 [ 473.143858][ T8364] bpf_prog_test_run+0x3e3/0x630 [ 473.148802][ T8364] ? slab_free_freelist_hook+0xc2/0x190 [ 473.154352][ T8364] ? bpf_prog_query+0x270/0x270 [ 473.159207][ T8364] ? selinux_bpf+0xce/0xf0 [ 473.163617][ T8364] ? security_bpf+0x93/0xb0 [ 473.168119][ T8364] __sys_bpf+0x56d/0x780 [ 473.172360][ T8364] ? bpf_link_show_fdinfo+0x320/0x320 [ 473.177733][ T8364] ? __cfi_ksys_write+0x10/0x10 [ 473.182578][ T8364] ? debug_smp_processor_id+0x17/0x20 [ 473.187944][ T8364] __x64_sys_bpf+0x7c/0x90 [ 473.192361][ T8364] x64_sys_call+0x488/0x9a0 [ 473.196868][ T8364] do_syscall_64+0x4c/0xa0 [ 473.201278][ T8364] ? clear_bhb_loop+0x30/0x80 [ 473.205951][ T8364] ? clear_bhb_loop+0x30/0x80 [ 473.210631][ T8364] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 473.216524][ T8364] RIP: 0033:0x7f81d158f749 [ 473.220935][ T8364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 473.240538][ T8364] RSP: 002b:00007f81d237d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 473.248954][ T8364] RAX: ffffffffffffffda RBX: 00007f81d17e5fa0 RCX: 00007f81d158f749 [ 473.256921][ T8364] RDX: 000000000000000c RSI: 0000200000000500 RDI: 000000000000000a [ 473.264892][ T8364] RBP: 00007f81d237d090 R08: 0000000000000000 R09: 0000000000000000 [ 473.272859][ T8364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 473.280823][ T8364] R13: 00007f81d17e6038 R14: 00007f81d17e5fa0 R15: 00007ffe6a5b1c78 [ 473.288794][ T8364] [ 477.065237][ T8473] device pim6reg1 entered promiscuous mode [ 477.592093][ T8488] FAULT_INJECTION: forcing a failure. [ 477.592093][ T8488] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 477.605206][ T8488] CPU: 1 PID: 8488 Comm: syz.2.2518 Not tainted syzkaller #0 [ 477.612585][ T8488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 477.622641][ T8488] Call Trace: [ 477.625917][ T8488] [ 477.628843][ T8488] __dump_stack+0x21/0x24 [ 477.633173][ T8488] dump_stack_lvl+0xee/0x150 [ 477.637767][ T8488] ? __cfi_dump_stack_lvl+0x8/0x8 [ 477.642791][ T8488] dump_stack+0x15/0x24 [ 477.646947][ T8488] should_fail_ex+0x3d4/0x520 [ 477.651629][ T8488] should_fail+0xb/0x10 [ 477.655786][ T8488] should_fail_usercopy+0x1a/0x20 [ 477.660817][ T8488] strncpy_from_user+0x24/0x2d0 [ 477.665663][ T8488] ? unwind_get_return_address+0x4d/0x90 [ 477.671294][ T8488] strncpy_from_user_nofault+0x73/0x150 [ 477.676843][ T8488] bpf_probe_read_compat_str+0xe6/0x180 [ 477.682389][ T8488] bpf_prog_9bca56546c9b26d5+0x3d/0x3f [ 477.687847][ T8488] bpf_trace_run4+0x11b/0x270 [ 477.692532][ T8488] ? __cfi_bpf_trace_run4+0x10/0x10 [ 477.697734][ T8488] ? unwind_next_frame+0x3d5/0x700 [ 477.702854][ T8488] ? x64_sys_call+0x488/0x9a0 [ 477.707530][ T8488] __bpf_trace_fib_table_lookup+0x35/0x40 [ 477.713254][ T8488] fib_table_lookup+0x1a0b/0x1a60 [ 477.718288][ T8488] ? __kasan_check_write+0x14/0x20 [ 477.723395][ T8488] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 477.728941][ T8488] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 477.734839][ T8488] ? __stack_depot_save+0x36/0x480 [ 477.739947][ T8488] fib_compute_spec_dst+0x539/0x870 [ 477.745147][ T8488] ? __cfi_fib_compute_spec_dst+0x10/0x10 [ 477.750862][ T8488] ? __bpf_redirect+0x8db/0x1130 [ 477.755800][ T8488] ? __kasan_check_write+0x14/0x20 [ 477.760914][ T8488] ? dst_init+0x2cd/0x3d0 [ 477.765246][ T8488] ? __local_bh_enable_ip+0x58/0x80 [ 477.770452][ T8488] ? _raw_spin_unlock_bh+0x50/0x60 [ 477.775565][ T8488] __ip_options_compile+0xc0b/0x19a0 [ 477.780855][ T8488] ipv4_link_failure+0x427/0x790 [ 477.785801][ T8488] ? __cfi_ipv4_link_failure+0x10/0x10 [ 477.791267][ T8488] ? xfrm_lookup_route+0x12c/0x180 [ 477.796379][ T8488] ? __cfi_ipv4_link_failure+0x10/0x10 [ 477.801840][ T8488] vti6_tnl_xmit+0xffc/0x1980 [ 477.806518][ T8488] ? __cfi_vti6_tnl_xmit+0x10/0x10 [ 477.811636][ T8488] dev_hard_start_xmit+0x20b/0x750 [ 477.816754][ T8488] __dev_queue_xmit+0x18d9/0x3420 [ 477.821788][ T8488] ? __dev_queue_xmit+0x250/0x3420 [ 477.826906][ T8488] ? __cfi___dev_queue_xmit+0x10/0x10 [ 477.832280][ T8488] ? __kasan_check_write+0x14/0x20 [ 477.837385][ T8488] ? skb_release_data+0x1d2/0x890 [ 477.842405][ T8488] ? skb_ensure_writable+0x2f8/0x470 [ 477.847686][ T8488] ? __kasan_check_write+0x14/0x20 [ 477.852796][ T8488] ? pskb_expand_head+0xc4a/0x1210 [ 477.857915][ T8488] __bpf_redirect+0x8db/0x1130 [ 477.862691][ T8488] bpf_clone_redirect+0x26a/0x3c0 [ 477.867728][ T8488] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 477.873184][ T8488] ? kasan_set_track+0x60/0x70 [ 477.877943][ T8488] ? kasan_set_track+0x4b/0x70 [ 477.882706][ T8488] ? kasan_save_alloc_info+0x25/0x30 [ 477.887996][ T8488] ? __kasan_slab_alloc+0x72/0x80 [ 477.893019][ T8488] ? slab_post_alloc_hook+0x4f/0x2d0 [ 477.898308][ T8488] ? kmem_cache_alloc+0x16e/0x330 [ 477.903338][ T8488] ? build_skb+0x2a/0x220 [ 477.907666][ T8488] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 477.913215][ T8488] ? bpf_prog_test_run+0x3e3/0x630 [ 477.918335][ T8488] ? __sys_bpf+0x56d/0x780 [ 477.922754][ T8488] ? __x64_sys_bpf+0x7c/0x90 [ 477.927347][ T8488] ? x64_sys_call+0x488/0x9a0 [ 477.932049][ T8488] ? do_syscall_64+0x4c/0xa0 [ 477.936635][ T8488] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 477.942713][ T8488] ? __kasan_check_read+0x11/0x20 [ 477.947731][ T8488] ? bpf_test_timer_continue+0x147/0x4a0 [ 477.953368][ T8488] bpf_test_run+0x349/0x8d0 [ 477.957874][ T8488] ? __kasan_slab_alloc+0x72/0x80 [ 477.962898][ T8488] ? convert___skb_to_skb+0x5b0/0x5b0 [ 477.968274][ T8488] ? __cfi_eth_type_trans+0x10/0x10 [ 477.973475][ T8488] ? convert___skb_to_skb+0x40/0x5b0 [ 477.978769][ T8488] bpf_prog_test_run_skb+0xaec/0x1290 [ 477.984148][ T8488] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 477.989963][ T8488] bpf_prog_test_run+0x3e3/0x630 [ 477.994897][ T8488] ? slab_free_freelist_hook+0xc2/0x190 [ 478.000448][ T8488] ? bpf_prog_query+0x270/0x270 [ 478.005293][ T8488] ? selinux_bpf+0xce/0xf0 [ 478.009707][ T8488] ? security_bpf+0x93/0xb0 [ 478.014311][ T8488] __sys_bpf+0x56d/0x780 [ 478.018552][ T8488] ? bpf_link_show_fdinfo+0x320/0x320 [ 478.024010][ T8488] ? __cfi_ksys_write+0x10/0x10 [ 478.028857][ T8488] ? debug_smp_processor_id+0x17/0x20 [ 478.034661][ T8488] __x64_sys_bpf+0x7c/0x90 [ 478.039086][ T8488] x64_sys_call+0x488/0x9a0 [ 478.043594][ T8488] do_syscall_64+0x4c/0xa0 [ 478.048007][ T8488] ? clear_bhb_loop+0x30/0x80 [ 478.052684][ T8488] ? clear_bhb_loop+0x30/0x80 [ 478.057365][ T8488] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 478.063259][ T8488] RIP: 0033:0x7fd204f8f749 [ 478.067676][ T8488] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 478.087282][ T8488] RSP: 002b:00007fd205db1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 478.095693][ T8488] RAX: ffffffffffffffda RBX: 00007fd2051e5fa0 RCX: 00007fd204f8f749 [ 478.103661][ T8488] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 478.111833][ T8488] RBP: 00007fd205db1090 R08: 0000000000000000 R09: 0000000000000000 [ 478.119802][ T8488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 478.127764][ T8488] R13: 00007fd2051e6038 R14: 00007fd2051e5fa0 R15: 00007ffd9d642a28 [ 478.135747][ T8488] [ 478.611050][ T8486] device veth1_macvtap left promiscuous mode [ 480.170114][ T8534] device sit0 left promiscuous mode [ 480.231267][ T8535] device sit0 entered promiscuous mode [ 480.646160][ T8546] FAULT_INJECTION: forcing a failure. [ 480.646160][ T8546] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 480.808653][ T8546] CPU: 1 PID: 8546 Comm: syz.2.2536 Not tainted syzkaller #0 [ 480.816076][ T8546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 480.826125][ T8546] Call Trace: [ 480.829394][ T8546] [ 480.832314][ T8546] __dump_stack+0x21/0x24 [ 480.836640][ T8546] dump_stack_lvl+0xee/0x150 [ 480.841222][ T8546] ? __cfi_dump_stack_lvl+0x8/0x8 [ 480.846241][ T8546] ? kasan_check_range+0x1af/0x290 [ 480.851348][ T8546] dump_stack+0x15/0x24 [ 480.855493][ T8546] should_fail_ex+0x3d4/0x520 [ 480.860165][ T8546] should_fail_alloc_page+0x61/0x90 [ 480.865358][ T8546] prepare_alloc_pages+0x148/0x5f0 [ 480.870464][ T8546] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 480.875661][ T8546] ? slab_post_alloc_hook+0x4f/0x2d0 [ 480.880951][ T8546] ? alloc_vmap_area+0x65a/0x1870 [ 480.885965][ T8546] ? __get_vm_area_node+0x160/0x360 [ 480.891152][ T8546] ? __vmalloc_node_range+0x326/0x13d0 [ 480.896605][ T8546] __alloc_pages+0x124/0x450 [ 480.901190][ T8546] ? __cfi___alloc_pages+0x10/0x10 [ 480.906293][ T8546] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 480.912445][ T8546] ? __kasan_check_write+0x14/0x20 [ 480.917545][ T8546] ? _raw_spin_lock+0x8e/0xe0 [ 480.922215][ T8546] ? __cfi__raw_spin_lock+0x10/0x10 [ 480.927409][ T8546] ? memset_erms+0x9/0x10 [ 480.931733][ T8546] __get_free_pages+0xe/0x30 [ 480.936319][ T8546] kasan_populate_vmalloc_pte+0x29/0x120 [ 480.941943][ T8546] __apply_to_page_range+0x8de/0xc80 [ 480.947227][ T8546] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 480.953458][ T8546] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 480.959696][ T8546] apply_to_page_range+0x3b/0x50 [ 480.964634][ T8546] kasan_populate_vmalloc+0x60/0x70 [ 480.969828][ T8546] alloc_vmap_area+0x173e/0x1870 [ 480.974765][ T8546] ? vm_map_ram+0x930/0x930 [ 480.979256][ T8546] ? __kasan_kmalloc+0x95/0xb0 [ 480.984103][ T8546] ? kmalloc_node_trace+0x3d/0xb0 [ 480.989122][ T8546] __get_vm_area_node+0x160/0x360 [ 480.994139][ T8546] __vmalloc_node_range+0x326/0x13d0 [ 480.999417][ T8546] ? prealloc_elems_and_freelist+0x8a/0x1e0 [ 481.005302][ T8546] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 481.011023][ T8546] ? __cfi___alloc_pages+0x10/0x10 [ 481.016130][ T8546] ? __this_cpu_preempt_check+0x13/0x20 [ 481.021669][ T8546] ? __cfi___vmalloc_node_range+0x10/0x10 [ 481.027392][ T8546] ? __kasan_check_write+0x14/0x20 [ 481.032504][ T8546] ? mutex_unlock+0x89/0x220 [ 481.037092][ T8546] ? __cfi_mutex_unlock+0x10/0x10 [ 481.042112][ T8546] bpf_map_area_alloc+0xd7/0xe0 [ 481.046956][ T8546] ? prealloc_elems_and_freelist+0x8a/0x1e0 [ 481.052847][ T8546] prealloc_elems_and_freelist+0x8a/0x1e0 [ 481.058558][ T8546] stack_map_alloc+0x3a7/0x530 [ 481.063317][ T8546] map_create+0x49c/0xd80 [ 481.067639][ T8546] __sys_bpf+0x30b/0x780 [ 481.071876][ T8546] ? bpf_link_show_fdinfo+0x320/0x320 [ 481.077240][ T8546] ? __cfi_sched_clock_cpu+0x10/0x10 [ 481.082519][ T8546] __x64_sys_bpf+0x7c/0x90 [ 481.087020][ T8546] x64_sys_call+0x488/0x9a0 [ 481.091517][ T8546] do_syscall_64+0x4c/0xa0 [ 481.095927][ T8546] ? clear_bhb_loop+0x30/0x80 [ 481.100603][ T8546] ? clear_bhb_loop+0x30/0x80 [ 481.105276][ T8546] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 481.111164][ T8546] RIP: 0033:0x7fd204f8f749 [ 481.115573][ T8546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 481.135177][ T8546] RSP: 002b:00007fd205db1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 481.143589][ T8546] RAX: ffffffffffffffda RBX: 00007fd2051e5fa0 RCX: 00007fd204f8f749 [ 481.151558][ T8546] RDX: 0000000000000048 RSI: 0000200000000900 RDI: 0000000000000000 [ 481.159524][ T8546] RBP: 00007fd205db1090 R08: 0000000000000000 R09: 0000000000000000 [ 481.167490][ T8546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 481.175463][ T8546] R13: 00007fd2051e6038 R14: 00007fd2051e5fa0 R15: 00007ffd9d642a28 [ 481.183433][ T8546] [ 488.685879][ T28] audit: type=1400 audit(1763624256.431:145): avc: denied { create } for pid=8679 comm="syz.4.2576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 488.784624][ T8687] device sit0 left promiscuous mode [ 488.959773][ T8687] device sit0 entered promiscuous mode [ 489.119096][ T8696] bond_slave_1: mtu greater than device maximum [ 493.177943][ T8747] device sit0 left promiscuous mode [ 493.217741][ T8747] device sit0 entered promiscuous mode [ 497.618859][ T8778] device pim6reg1 entered promiscuous mode [ 497.711583][ T8776] syz.0.2606 (8776) used greatest stack depth: 20896 bytes left [ 500.378521][ T8789] syz.1.2611[8789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 500.378619][ T8789] syz.1.2611[8789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 501.656058][ T8826] syz.4.2623[8826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 501.679552][ T8828] syz.4.2623[8828] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 501.691084][ T8826] syz.4.2623[8826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 501.698407][ T8828] syz.4.2623[8828] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 501.715950][ T8824] syz.1.2622[8824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 501.727514][ T8819] device bridge_slave_1 left promiscuous mode [ 501.739245][ T8824] syz.1.2622[8824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 501.750641][ T8819] bridge0: port 2(bridge_slave_1) entered disabled state [ 501.787394][ T8819] device bridge_slave_0 left promiscuous mode [ 501.798784][ T8819] bridge0: port 1(bridge_slave_0) entered disabled state [ 502.774111][ T8837] device macsec0 entered promiscuous mode [ 503.223985][ T8856] device syzkaller0 entered promiscuous mode [ 504.561738][ T8874] syz.2.2635[8874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.561834][ T8874] syz.2.2635[8874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 507.313642][ T8913] syz.0.2648[8913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 507.325414][ T8913] syz.0.2648[8913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 508.636099][ T8931] device sit0 left promiscuous mode [ 508.779593][ T8931] device sit0 entered promiscuous mode [ 510.776476][ T8984] FAULT_INJECTION: forcing a failure. [ 510.776476][ T8984] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 510.844788][ T8984] CPU: 1 PID: 8984 Comm: syz.2.2676 Not tainted syzkaller #0 [ 510.852206][ T8984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 510.862256][ T8984] Call Trace: [ 510.865529][ T8984] [ 510.868453][ T8984] __dump_stack+0x21/0x24 [ 510.872784][ T8984] dump_stack_lvl+0xee/0x150 [ 510.877371][ T8984] ? __cfi_dump_stack_lvl+0x8/0x8 [ 510.882393][ T8984] dump_stack+0x15/0x24 [ 510.886543][ T8984] should_fail_ex+0x3d4/0x520 [ 510.891217][ T8984] should_fail+0xb/0x10 [ 510.895370][ T8984] should_fail_usercopy+0x1a/0x20 [ 510.900392][ T8984] _copy_to_user+0x1e/0x90 [ 510.904802][ T8984] simple_read_from_buffer+0xe9/0x160 [ 510.910169][ T8984] proc_fail_nth_read+0x19a/0x210 [ 510.915186][ T8984] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 510.920724][ T8984] ? security_file_permission+0x94/0xb0 [ 510.926268][ T8984] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 510.931806][ T8984] vfs_read+0x26e/0x8c0 [ 510.935966][ T8984] ? __cfi_vfs_read+0x10/0x10 [ 510.940638][ T8984] ? __kasan_check_write+0x14/0x20 [ 510.945741][ T8984] ? mutex_lock+0x8d/0x1a0 [ 510.950155][ T8984] ? __cfi_mutex_lock+0x10/0x10 [ 510.955003][ T8984] ? __fdget_pos+0x2cd/0x380 [ 510.959584][ T8984] ? ksys_read+0x71/0x240 [ 510.963922][ T8984] ksys_read+0x140/0x240 [ 510.968161][ T8984] ? __cfi_ksys_read+0x10/0x10 [ 510.972913][ T8984] ? debug_smp_processor_id+0x17/0x20 [ 510.978272][ T8984] ? perf_trace_sys_enter+0x30/0x150 [ 510.983540][ T8984] __x64_sys_read+0x7b/0x90 [ 510.988019][ T8984] x64_sys_call+0x2f/0x9a0 [ 510.992415][ T8984] do_syscall_64+0x4c/0xa0 [ 510.996809][ T8984] ? clear_bhb_loop+0x30/0x80 [ 511.001468][ T8984] ? clear_bhb_loop+0x30/0x80 [ 511.006128][ T8984] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 511.012017][ T8984] RIP: 0033:0x7fd204f8e15c [ 511.016412][ T8984] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 511.035997][ T8984] RSP: 002b:00007fd205db1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 511.044391][ T8984] RAX: ffffffffffffffda RBX: 00007fd2051e5fa0 RCX: 00007fd204f8e15c [ 511.052340][ T8984] RDX: 000000000000000f RSI: 00007fd205db10a0 RDI: 0000000000000006 [ 511.060296][ T8984] RBP: 00007fd205db1090 R08: 0000000000000000 R09: 0000000000000000 [ 511.068246][ T8984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 511.076200][ T8984] R13: 00007fd2051e6038 R14: 00007fd2051e5fa0 R15: 00007ffd9d642a28 [ 511.084156][ T8984] [ 511.271185][ T8995] syz.2.2679[8995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 511.271279][ T8995] syz.2.2679[8995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 512.227923][ T9018] FAULT_INJECTION: forcing a failure. [ 512.227923][ T9018] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 512.252356][ T9018] CPU: 1 PID: 9018 Comm: syz.4.2688 Not tainted syzkaller #0 [ 512.259730][ T9018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 512.269780][ T9018] Call Trace: [ 512.273059][ T9018] [ 512.275982][ T9018] __dump_stack+0x21/0x24 [ 512.280320][ T9018] dump_stack_lvl+0xee/0x150 [ 512.284912][ T9018] ? __cfi_dump_stack_lvl+0x8/0x8 [ 512.289939][ T9018] dump_stack+0x15/0x24 [ 512.294092][ T9018] should_fail_ex+0x3d4/0x520 [ 512.298772][ T9018] should_fail+0xb/0x10 [ 512.302927][ T9018] should_fail_usercopy+0x1a/0x20 [ 512.308043][ T9018] _copy_from_user+0x1e/0xc0 [ 512.312651][ T9018] __sys_bpf+0x277/0x780 [ 512.316889][ T9018] ? bpf_link_show_fdinfo+0x320/0x320 [ 512.322261][ T9018] ? __cfi_ksys_write+0x10/0x10 [ 512.327109][ T9018] ? do_user_addr_fault+0x9ac/0x1050 [ 512.332404][ T9018] ? debug_smp_processor_id+0x17/0x20 [ 512.337790][ T9018] __x64_sys_bpf+0x7c/0x90 [ 512.342222][ T9018] x64_sys_call+0x488/0x9a0 [ 512.346732][ T9018] do_syscall_64+0x4c/0xa0 [ 512.351150][ T9018] ? clear_bhb_loop+0x30/0x80 [ 512.355830][ T9018] ? clear_bhb_loop+0x30/0x80 [ 512.360513][ T9018] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 512.366412][ T9018] RIP: 0033:0x7fd94458f749 [ 512.370821][ T9018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 512.390424][ T9018] RSP: 002b:00007fd94535c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 512.398842][ T9018] RAX: ffffffffffffffda RBX: 00007fd9447e5fa0 RCX: 00007fd94458f749 [ 512.406816][ T9018] RDX: 0000000000000094 RSI: 0000200000000300 RDI: 0000000000000005 [ 512.414794][ T9018] RBP: 00007fd94535c090 R08: 0000000000000000 R09: 0000000000000000 [ 512.422776][ T9018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 512.430748][ T9018] R13: 00007fd9447e6038 R14: 00007fd9447e5fa0 R15: 00007ffc4763e9e8 [ 512.438729][ T9018] [ 513.451656][ T9054] FAULT_INJECTION: forcing a failure. [ 513.451656][ T9054] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 513.722618][ T9054] CPU: 1 PID: 9054 Comm: syz.2.2700 Not tainted syzkaller #0 [ 513.730036][ T9054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 513.740089][ T9054] Call Trace: [ 513.743361][ T9054] [ 513.746285][ T9054] __dump_stack+0x21/0x24 [ 513.750613][ T9054] dump_stack_lvl+0xee/0x150 [ 513.755196][ T9054] ? __cfi_dump_stack_lvl+0x8/0x8 [ 513.760220][ T9054] ? migrate_enable+0x19c/0x280 [ 513.765065][ T9054] dump_stack+0x15/0x24 [ 513.769215][ T9054] should_fail_ex+0x3d4/0x520 [ 513.773903][ T9054] should_fail+0xb/0x10 [ 513.778071][ T9054] should_fail_usercopy+0x1a/0x20 [ 513.783100][ T9054] _copy_from_user+0x1e/0xc0 [ 513.787684][ T9054] generic_map_update_batch+0x4b1/0x780 [ 513.793233][ T9054] ? __cfi_generic_map_update_batch+0x10/0x10 [ 513.799300][ T9054] ? __fdget+0x19c/0x220 [ 513.803540][ T9054] ? __cfi_generic_map_update_batch+0x10/0x10 [ 513.809620][ T9054] bpf_map_do_batch+0x48c/0x620 [ 513.814468][ T9054] __sys_bpf+0x624/0x780 [ 513.818700][ T9054] ? bpf_link_show_fdinfo+0x320/0x320 [ 513.824069][ T9054] ? __cfi_ksys_write+0x10/0x10 [ 513.828918][ T9054] ? debug_smp_processor_id+0x17/0x20 [ 513.834285][ T9054] __x64_sys_bpf+0x7c/0x90 [ 513.838703][ T9054] x64_sys_call+0x488/0x9a0 [ 513.843202][ T9054] do_syscall_64+0x4c/0xa0 [ 513.847610][ T9054] ? clear_bhb_loop+0x30/0x80 [ 513.852284][ T9054] ? clear_bhb_loop+0x30/0x80 [ 513.856963][ T9054] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 513.862854][ T9054] RIP: 0033:0x7fd204f8f749 [ 513.867263][ T9054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 513.886861][ T9054] RSP: 002b:00007fd205db1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 513.895276][ T9054] RAX: ffffffffffffffda RBX: 00007fd2051e5fa0 RCX: 00007fd204f8f749 [ 513.903243][ T9054] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 513.911211][ T9054] RBP: 00007fd205db1090 R08: 0000000000000000 R09: 0000000000000000 [ 513.919179][ T9054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 513.927144][ T9054] R13: 00007fd2051e6038 R14: 00007fd2051e5fa0 R15: 00007ffd9d642a28 [ 513.935117][ T9054] [ 515.607324][ T9100] device wg2 entered promiscuous mode [ 517.634054][ T9137] device pim6reg1 entered promiscuous mode [ 519.027211][ T9186] device veth0_vlan left promiscuous mode [ 519.221490][ T9186] device veth0_vlan entered promiscuous mode [ 519.303595][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 519.324920][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 519.378981][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 521.289459][ T9181] Ÿë: port 1(syz_tun) entered disabled state [ 521.378097][ T9181] device syz_tun left promiscuous mode [ 521.459917][ T9181] Ÿë: port 1(syz_tun) entered disabled state [ 521.827178][ T9220] bridge0: port 1(bridge_slave_0) entered blocking state [ 521.868416][ T9220] bridge0: port 1(bridge_slave_0) entered disabled state [ 521.896388][ T9220] device bridge_slave_0 entered promiscuous mode [ 521.906334][ T9220] bridge0: port 2(bridge_slave_1) entered blocking state [ 521.950422][ T9220] bridge0: port 2(bridge_slave_1) entered disabled state [ 521.982854][ T9220] device bridge_slave_1 entered promiscuous mode [ 522.990077][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 523.009397][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 523.215834][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 523.239033][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 523.267502][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 523.274597][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 523.315674][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 523.347956][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 523.376189][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 523.383374][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 523.428549][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 523.666425][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 523.680752][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 523.709518][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 523.783343][ T692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 523.822060][ T692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 524.021996][ T9220] device veth0_vlan entered promiscuous mode [ 524.225363][ T692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 524.268837][ T692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 524.312126][ T9220] device veth1_macvtap entered promiscuous mode [ 524.421483][ T692] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 524.437549][ T692] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 524.484079][ T692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 524.502517][ T692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 524.528065][ T692] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 524.615037][ T385] device veth0_vlan left promiscuous mode [ 524.942374][ T692] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 524.950694][ T692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 524.959017][ T692] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 524.967202][ T692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 527.875452][ T9343] FAULT_INJECTION: forcing a failure. [ 527.875452][ T9343] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 527.898994][ T9343] CPU: 0 PID: 9343 Comm: syz.1.2791 Not tainted syzkaller #0 [ 527.906406][ T9343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 527.916469][ T9343] Call Trace: [ 527.919753][ T9343] [ 527.922684][ T9343] __dump_stack+0x21/0x24 [ 527.927016][ T9343] dump_stack_lvl+0xee/0x150 [ 527.931608][ T9343] ? __cfi_dump_stack_lvl+0x8/0x8 [ 527.936637][ T9343] dump_stack+0x15/0x24 [ 527.940793][ T9343] should_fail_ex+0x3d4/0x520 [ 527.945474][ T9343] should_fail+0xb/0x10 [ 527.949631][ T9343] should_fail_usercopy+0x1a/0x20 [ 527.954658][ T9343] _copy_from_user+0x1e/0xc0 [ 527.959250][ T9343] __sys_bpf+0x277/0x780 [ 527.963489][ T9343] ? bpf_link_show_fdinfo+0x320/0x320 [ 527.968864][ T9343] ? schedule+0xb6/0x170 [ 527.973105][ T9343] ? in_lock_functions+0x1/0x20 [ 527.977962][ T9343] ? __kasan_check_write+0x14/0x20 [ 527.983074][ T9343] ? fpregs_restore_userregs+0x128/0x260 [ 527.988716][ T9343] __x64_sys_bpf+0x7c/0x90 [ 527.993141][ T9343] x64_sys_call+0x488/0x9a0 [ 527.997645][ T9343] do_syscall_64+0x4c/0xa0 [ 528.002070][ T9343] ? clear_bhb_loop+0x30/0x80 [ 528.006751][ T9343] ? clear_bhb_loop+0x30/0x80 [ 528.011434][ T9343] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 528.017344][ T9343] RIP: 0033:0x7f81d158f749 [ 528.021760][ T9343] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 528.041364][ T9343] RSP: 002b:00007f81d237d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 528.049784][ T9343] RAX: ffffffffffffffda RBX: 00007f81d17e5fa0 RCX: 00007f81d158f749 [ 528.057756][ T9343] RDX: 0000000000000048 RSI: 00002000000007c0 RDI: 0000000000000000 [ 528.065726][ T9343] RBP: 00007f81d237d090 R08: 0000000000000000 R09: 0000000000000000 [ 528.073696][ T9343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 528.081663][ T9343] R13: 00007f81d17e6038 R14: 00007f81d17e5fa0 R15: 00007ffe6a5b1c78 [ 528.089727][ T9343] [ 529.169608][ T9369] device veth1_macvtap left promiscuous mode [ 529.182229][ T9369] device macsec0 entered promiscuous mode [ 529.767691][ T9385] bond_slave_1: mtu less than device minimum [ 537.838152][ T9529] device wg2 entered promiscuous mode [ 539.009656][ T9551] FAULT_INJECTION: forcing a failure. [ 539.009656][ T9551] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 539.032485][ T9551] CPU: 1 PID: 9551 Comm: syz.2.2855 Not tainted syzkaller #0 [ 539.039895][ T9551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 539.049942][ T9551] Call Trace: [ 539.053213][ T9551] [ 539.056126][ T9551] __dump_stack+0x21/0x24 [ 539.060446][ T9551] dump_stack_lvl+0xee/0x150 [ 539.065018][ T9551] ? __cfi_dump_stack_lvl+0x8/0x8 [ 539.070026][ T9551] ? __kasan_check_write+0x14/0x20 [ 539.075117][ T9551] dump_stack+0x15/0x24 [ 539.079257][ T9551] should_fail_ex+0x3d4/0x520 [ 539.083923][ T9551] should_fail+0xb/0x10 [ 539.088067][ T9551] should_fail_usercopy+0x1a/0x20 [ 539.093080][ T9551] _copy_from_user+0x1e/0xc0 [ 539.097659][ T9551] perf_copy_attr+0x15e/0x880 [ 539.102332][ T9551] __se_sys_perf_event_open+0xcb/0x1b80 [ 539.107869][ T9551] ? __kasan_check_write+0x14/0x20 [ 539.112965][ T9551] ? mutex_unlock+0x89/0x220 [ 539.117545][ T9551] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 539.123168][ T9551] ? __cfi_ksys_write+0x10/0x10 [ 539.128005][ T9551] __x64_sys_perf_event_open+0xbf/0xd0 [ 539.133455][ T9551] x64_sys_call+0x385/0x9a0 [ 539.137943][ T9551] do_syscall_64+0x4c/0xa0 [ 539.142343][ T9551] ? clear_bhb_loop+0x30/0x80 [ 539.147006][ T9551] ? clear_bhb_loop+0x30/0x80 [ 539.151671][ T9551] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 539.157552][ T9551] RIP: 0033:0x7fd204f8f749 [ 539.161950][ T9551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 539.181538][ T9551] RSP: 002b:00007fd205db1038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 539.189935][ T9551] RAX: ffffffffffffffda RBX: 00007fd2051e5fa0 RCX: 00007fd204f8f749 [ 539.197888][ T9551] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000480 [ 539.205841][ T9551] RBP: 00007fd205db1090 R08: 0000000000000000 R09: 0000000000000000 [ 539.213793][ T9551] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 539.221749][ T9551] R13: 00007fd2051e6038 R14: 00007fd2051e5fa0 R15: 00007ffd9d642a28 [ 539.229710][ T9551] [ 540.381062][ T9597] device sit0 left promiscuous mode [ 540.916361][ T28] audit: type=1400 audit(1763624308.661:146): avc: denied { create } for pid=9607 comm="syz.3.2877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 540.974408][ T9624] device bridge_slave_1 left promiscuous mode [ 541.019648][ T9624] bridge0: port 2(bridge_slave_1) entered disabled state [ 541.059816][ T9624] device bridge_slave_0 left promiscuous mode [ 541.066561][ T9624] bridge0: port 1(bridge_slave_0) entered disabled state [ 542.080473][ T28] audit: type=1400 audit(1763624309.831:147): avc: denied { read } for pid=9654 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 542.116543][ T28] audit: type=1400 audit(1763624309.831:148): avc: denied { open } for pid=9654 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 542.585752][ T9654] bridge0: port 1(bridge_slave_0) entered blocking state [ 542.603455][ T9654] bridge0: port 1(bridge_slave_0) entered disabled state [ 542.652409][ T9654] device bridge_slave_0 entered promiscuous mode [ 542.864492][ T9654] bridge0: port 2(bridge_slave_1) entered blocking state [ 542.917886][ T9654] bridge0: port 2(bridge_slave_1) entered disabled state [ 543.034548][ T9654] device bridge_slave_1 entered promiscuous mode [ 544.137805][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 544.178612][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 544.269405][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 544.314326][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 544.488514][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 544.495579][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 544.514072][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 544.529126][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 544.563640][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 544.570730][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 544.641738][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 544.658820][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 544.743000][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 544.819609][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 544.976800][ T692] device bridge_slave_1 left promiscuous mode [ 544.989802][ T692] bridge0: port 2(bridge_slave_1) entered disabled state [ 545.043086][ T692] device bridge_slave_0 left promiscuous mode [ 545.060763][ T692] bridge0: port 1(bridge_slave_0) entered disabled state [ 545.388608][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 545.401218][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 545.458106][ T9654] device veth0_vlan entered promiscuous mode [ 545.484237][ T9654] device veth1_macvtap entered promiscuous mode [ 545.492173][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 545.502042][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 545.527179][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 545.538891][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 545.552412][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 545.761066][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 545.775765][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 545.787098][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 545.795839][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 546.397833][ T9713] tun0: tun_chr_ioctl cmd 1074025678 [ 546.421023][ T9713] tun0: group set to 0 [ 547.064336][ T9722] bond_slave_1: mtu less than device minimum [ 548.106884][ T9743] device sit0 left promiscuous mode [ 548.740626][ T9752] bridge0: port 2(bridge_slave_1) entered disabled state [ 548.748274][ T9752] bridge0: port 1(bridge_slave_0) entered disabled state [ 549.025153][ T9760] device sit0 entered promiscuous mode [ 555.354612][ T9869] device veth1_macvtap left promiscuous mode [ 555.409575][ T9869] device macsec0 entered promiscuous mode [ 556.602284][ T9884] FAULT_INJECTION: forcing a failure. [ 556.602284][ T9884] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 556.620991][ T9884] CPU: 0 PID: 9884 Comm: syz.4.2960 Not tainted syzkaller #0 [ 556.628394][ T9884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 556.638450][ T9884] Call Trace: [ 556.641730][ T9884] [ 556.644670][ T9884] __dump_stack+0x21/0x24 [ 556.649015][ T9884] dump_stack_lvl+0xee/0x150 [ 556.653608][ T9884] ? __cfi_dump_stack_lvl+0x8/0x8 [ 556.658632][ T9884] ? ioctl_has_perm+0x391/0x4c0 [ 556.663480][ T9884] dump_stack+0x15/0x24 [ 556.667629][ T9884] should_fail_ex+0x3d4/0x520 [ 556.672305][ T9884] should_fail+0xb/0x10 [ 556.676455][ T9884] should_fail_usercopy+0x1a/0x20 [ 556.681475][ T9884] _copy_from_user+0x1e/0xc0 [ 556.686059][ T9884] __tun_chr_ioctl+0x1ed/0x1e70 [ 556.690913][ T9884] ? tun_flow_create+0x320/0x320 [ 556.695842][ T9884] ? mutex_unlock+0x89/0x220 [ 556.700433][ T9884] tun_chr_ioctl+0x2a/0x40 [ 556.704840][ T9884] ? __cfi_tun_chr_ioctl+0x10/0x10 [ 556.709943][ T9884] __se_sys_ioctl+0x12f/0x1b0 [ 556.714613][ T9884] __x64_sys_ioctl+0x7b/0x90 [ 556.719192][ T9884] x64_sys_call+0x58b/0x9a0 [ 556.723689][ T9884] do_syscall_64+0x4c/0xa0 [ 556.728097][ T9884] ? clear_bhb_loop+0x30/0x80 [ 556.732770][ T9884] ? clear_bhb_loop+0x30/0x80 [ 556.737448][ T9884] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 556.743342][ T9884] RIP: 0033:0x7fd94458f749 [ 556.747761][ T9884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 556.767368][ T9884] RSP: 002b:00007fd94535c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 556.775785][ T9884] RAX: ffffffffffffffda RBX: 00007fd9447e5fa0 RCX: 00007fd94458f749 [ 556.783747][ T9884] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000008 [ 556.791798][ T9884] RBP: 00007fd94535c090 R08: 0000000000000000 R09: 0000000000000000 [ 556.799765][ T9884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 556.807729][ T9884] R13: 00007fd9447e6038 R14: 00007fd9447e5fa0 R15: 00007ffc4763e9e8 [ 556.815697][ T9884] [ 557.130515][ T9897] FAULT_INJECTION: forcing a failure. [ 557.130515][ T9897] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 557.143627][ T9897] CPU: 0 PID: 9897 Comm: syz.4.2965 Not tainted syzkaller #0 [ 557.151001][ T9897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 557.161056][ T9897] Call Trace: [ 557.164333][ T9897] [ 557.167262][ T9897] __dump_stack+0x21/0x24 [ 557.171594][ T9897] dump_stack_lvl+0xee/0x150 [ 557.176191][ T9897] ? __cfi_dump_stack_lvl+0x8/0x8 [ 557.181213][ T9897] ? __kasan_check_write+0x14/0x20 [ 557.186325][ T9897] ? _raw_spin_lock_irq+0x8f/0xe0 [ 557.191345][ T9897] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 557.196893][ T9897] dump_stack+0x15/0x24 [ 557.201055][ T9897] should_fail_ex+0x3d4/0x520 [ 557.205750][ T9897] should_fail+0xb/0x10 [ 557.209913][ T9897] should_fail_usercopy+0x1a/0x20 [ 557.214941][ T9897] copy_page_from_iter_atomic+0x35c/0x1210 [ 557.220748][ T9897] ? __cfi_copy_page_from_iter_atomic+0x10/0x10 [ 557.226986][ T9897] ? __kasan_check_read+0x11/0x20 [ 557.231990][ T9897] ? shmem_write_begin+0x151/0x2c0 [ 557.237090][ T9897] generic_perform_write+0x348/0x6d0 [ 557.242378][ T9897] ? __cfi_generic_perform_write+0x10/0x10 [ 557.248186][ T9897] ? __cfi_file_update_time+0x10/0x10 [ 557.253562][ T9897] __generic_file_write_iter+0x227/0x580 [ 557.259192][ T9897] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 557.264911][ T9897] ? __cfi___generic_file_write_iter+0x10/0x10 [ 557.271052][ T9897] ? rwsem_write_trylock+0x130/0x300 [ 557.276327][ T9897] ? generic_write_checks_count+0x3c6/0x4a0 [ 557.282205][ T9897] ? generic_write_checks+0xca/0x100 [ 557.287472][ T9897] generic_file_write_iter+0xae/0x310 [ 557.292835][ T9897] vfs_write+0x5db/0xca0 [ 557.297067][ T9897] ? slab_free_freelist_hook+0xc2/0x190 [ 557.302601][ T9897] ? __cfi_vfs_write+0x10/0x10 [ 557.307352][ T9897] ? __cfi_mutex_lock+0x10/0x10 [ 557.312191][ T9897] ? __fdget_pos+0x2cd/0x380 [ 557.316763][ T9897] ? ksys_write+0x71/0x240 [ 557.321159][ T9897] ksys_write+0x140/0x240 [ 557.325469][ T9897] ? __cfi_ksys_write+0x10/0x10 [ 557.330300][ T9897] ? debug_smp_processor_id+0x17/0x20 [ 557.335653][ T9897] __x64_sys_write+0x7b/0x90 [ 557.340227][ T9897] x64_sys_call+0x27b/0x9a0 [ 557.344713][ T9897] do_syscall_64+0x4c/0xa0 [ 557.349110][ T9897] ? clear_bhb_loop+0x30/0x80 [ 557.353775][ T9897] ? clear_bhb_loop+0x30/0x80 [ 557.358442][ T9897] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 557.364318][ T9897] RIP: 0033:0x7fd94458f749 [ 557.368715][ T9897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 557.388308][ T9897] RSP: 002b:00007fd942ff7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 557.396720][ T9897] RAX: ffffffffffffffda RBX: 00007fd9447e6090 RCX: 00007fd94458f749 [ 557.404676][ T9897] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000009 [ 557.412635][ T9897] RBP: 00007fd942ff7090 R08: 0000000000000000 R09: 0000000000000000 [ 557.420590][ T9897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 557.428548][ T9897] R13: 00007fd9447e6128 R14: 00007fd9447e6090 R15: 00007ffc4763e9e8 [ 557.436503][ T9897] [ 562.870916][T10012] FAULT_INJECTION: forcing a failure. [ 562.870916][T10012] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 562.901210][T10012] CPU: 1 PID: 10012 Comm: syz.3.3006 Not tainted syzkaller #0 [ 562.908704][T10012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 562.918753][T10012] Call Trace: [ 562.922026][T10012] [ 562.924945][T10012] __dump_stack+0x21/0x24 [ 562.929274][T10012] dump_stack_lvl+0xee/0x150 [ 562.933860][T10012] ? __cfi_dump_stack_lvl+0x8/0x8 [ 562.938880][T10012] ? memcpy+0x56/0x70 [ 562.942856][T10012] dump_stack+0x15/0x24 [ 562.947004][T10012] should_fail_ex+0x3d4/0x520 [ 562.951679][T10012] should_fail+0xb/0x10 [ 562.955836][T10012] should_fail_usercopy+0x1a/0x20 [ 562.960859][T10012] strncpy_from_user+0x24/0x2d0 [ 562.965703][T10012] bpf_prog_load+0x1bb/0x15a0 [ 562.970387][T10012] ? map_freeze+0x390/0x390 [ 562.974887][T10012] ? selinux_bpf+0xc7/0xf0 [ 562.979299][T10012] ? security_bpf+0x93/0xb0 [ 562.983804][T10012] __sys_bpf+0x504/0x780 [ 562.988042][T10012] ? bpf_link_show_fdinfo+0x320/0x320 [ 562.993414][T10012] ? __cfi_ksys_write+0x10/0x10 [ 562.998260][T10012] ? do_user_addr_fault+0x9ac/0x1050 [ 563.003547][T10012] ? debug_smp_processor_id+0x17/0x20 [ 563.008916][T10012] __x64_sys_bpf+0x7c/0x90 [ 563.013336][T10012] x64_sys_call+0x488/0x9a0 [ 563.017841][T10012] do_syscall_64+0x4c/0xa0 [ 563.022255][T10012] ? clear_bhb_loop+0x30/0x80 [ 563.026929][T10012] ? clear_bhb_loop+0x30/0x80 [ 563.031604][T10012] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 563.037499][T10012] RIP: 0033:0x7fafebd8f749 [ 563.041907][T10012] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 563.061506][T10012] RSP: 002b:00007fafeccf7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 563.069918][T10012] RAX: ffffffffffffffda RBX: 00007fafebfe5fa0 RCX: 00007fafebd8f749 [ 563.077883][T10012] RDX: 0000000000000094 RSI: 0000200000000300 RDI: 0000000000000005 [ 563.085846][T10012] RBP: 00007fafeccf7090 R08: 0000000000000000 R09: 0000000000000000 [ 563.093810][T10012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 563.101772][T10012] R13: 00007fafebfe6038 R14: 00007fafebfe5fa0 R15: 00007fffaacb1768 [ 563.109742][T10012] [ 566.435098][T10079] FAULT_INJECTION: forcing a failure. [ 566.435098][T10079] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 566.499322][T10079] CPU: 1 PID: 10079 Comm: syz.4.3028 Not tainted syzkaller #0 [ 566.506853][T10079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 566.516925][T10079] Call Trace: [ 566.520281][T10079] [ 566.523201][T10079] __dump_stack+0x21/0x24 [ 566.527522][T10079] dump_stack_lvl+0xee/0x150 [ 566.532092][T10079] ? __cfi_dump_stack_lvl+0x8/0x8 [ 566.537099][T10079] ? migrate_enable+0x19c/0x280 [ 566.541938][T10079] dump_stack+0x15/0x24 [ 566.546084][T10079] should_fail_ex+0x3d4/0x520 [ 566.550755][T10079] should_fail+0xb/0x10 [ 566.554905][T10079] should_fail_usercopy+0x1a/0x20 [ 566.559925][T10079] _copy_from_user+0x1e/0xc0 [ 566.564590][T10079] generic_map_update_batch+0x458/0x780 [ 566.570123][T10079] ? __cfi_generic_map_update_batch+0x10/0x10 [ 566.576177][T10079] ? __fdget+0x19c/0x220 [ 566.580402][T10079] ? __cfi_generic_map_update_batch+0x10/0x10 [ 566.586450][T10079] bpf_map_do_batch+0x48c/0x620 [ 566.591282][T10079] __sys_bpf+0x624/0x780 [ 566.595503][T10079] ? bpf_link_show_fdinfo+0x320/0x320 [ 566.600860][T10079] ? __cfi_ksys_write+0x10/0x10 [ 566.605692][T10079] ? debug_smp_processor_id+0x17/0x20 [ 566.611048][T10079] __x64_sys_bpf+0x7c/0x90 [ 566.615450][T10079] x64_sys_call+0x488/0x9a0 [ 566.619937][T10079] do_syscall_64+0x4c/0xa0 [ 566.624334][T10079] ? clear_bhb_loop+0x30/0x80 [ 566.628998][T10079] ? clear_bhb_loop+0x30/0x80 [ 566.633663][T10079] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 566.639542][T10079] RIP: 0033:0x7fd94458f749 [ 566.643941][T10079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 566.663530][T10079] RSP: 002b:00007fd94535c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 566.671926][T10079] RAX: ffffffffffffffda RBX: 00007fd9447e5fa0 RCX: 00007fd94458f749 [ 566.679880][T10079] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 566.687835][T10079] RBP: 00007fd94535c090 R08: 0000000000000000 R09: 0000000000000000 [ 566.695785][T10079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 566.703738][T10079] R13: 00007fd9447e6038 R14: 00007fd9447e5fa0 R15: 00007ffc4763e9e8 [ 566.711697][T10079] [ 569.035833][T10132] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 570.130314][T10164] device veth1_macvtap left promiscuous mode [ 570.136404][T10164] device macsec0 entered promiscuous mode [ 571.179044][T10187] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.268353][T10187] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.330403][T10187] device bridge_slave_0 entered promiscuous mode [ 571.379758][ T692] GPL: port 1(erspan0) entered disabled state [ 571.415457][ T692] device erspan0 left promiscuous mode [ 571.472627][ T692] GPL: port 1(erspan0) entered disabled state [ 571.579764][T10187] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.586855][T10187] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.629248][T10187] device bridge_slave_1 entered promiscuous mode [ 571.810103][ T692] device bridge_slave_1 left promiscuous mode [ 571.816297][ T692] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.839603][ T692] device bridge_slave_0 left promiscuous mode [ 571.863160][ T692] bridge0: port 1(bridge_slave_0) entered disabled state [ 572.736974][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 572.788635][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 572.840213][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 572.868704][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 572.897355][ T385] bridge0: port 1(bridge_slave_0) entered blocking state [ 572.904465][ T385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 572.912279][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 572.920738][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 572.929093][ T385] bridge0: port 2(bridge_slave_1) entered blocking state [ 572.936126][ T385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 572.955868][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 572.963714][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 572.979365][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 573.007750][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 573.021895][T10187] device veth0_vlan entered promiscuous mode [ 573.050173][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 573.058796][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 573.066352][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 573.089896][T10187] device veth1_macvtap entered promiscuous mode [ 573.100372][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 573.182945][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 573.258210][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 573.401893][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 573.486745][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 574.224488][T10264] device wg2 entered promiscuous mode [ 577.712222][ T28] audit: type=1400 audit(1763624345.461:149): avc: denied { create } for pid=10334 comm="syz.4.3109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 581.078968][T10400] syz.3.3129[10400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 581.079110][T10400] syz.3.3129[10400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 581.551187][T10406] device wg2 left promiscuous mode [ 582.419127][T10420] sock: sock_set_timeout: `syz.0.3134' (pid 10420) tries to set negative timeout [ 582.731160][T10428] FAULT_INJECTION: forcing a failure. [ 582.731160][T10428] name failslab, interval 1, probability 0, space 0, times 0 [ 582.743809][T10428] CPU: 1 PID: 10428 Comm: syz.2.3137 Not tainted syzkaller #0 [ 582.751274][T10428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 582.761332][T10428] Call Trace: [ 582.764618][T10428] [ 582.767556][T10428] __dump_stack+0x21/0x24 [ 582.771899][T10428] dump_stack_lvl+0xee/0x150 [ 582.776588][T10428] ? __cfi_dump_stack_lvl+0x8/0x8 [ 582.781635][T10428] ? kasan_set_track+0x60/0x70 [ 582.786408][T10428] ? kasan_save_alloc_info+0x25/0x30 [ 582.791704][T10428] ? __kasan_slab_alloc+0x72/0x80 [ 582.796728][T10428] ? slab_post_alloc_hook+0x4f/0x2d0 [ 582.802000][T10428] ? kmem_cache_alloc+0x16e/0x330 [ 582.807011][T10428] dump_stack+0x15/0x24 [ 582.811151][T10428] should_fail_ex+0x3d4/0x520 [ 582.815820][T10428] __should_failslab+0xac/0xf0 [ 582.820574][T10428] ? ref_tracker_alloc+0x139/0x430 [ 582.825671][T10428] should_failslab+0x9/0x20 [ 582.830159][T10428] __kmem_cache_alloc_node+0x3d/0x2c0 [ 582.835520][T10428] ? ref_tracker_alloc+0x139/0x430 [ 582.840621][T10428] kmalloc_trace+0x29/0xb0 [ 582.845023][T10428] ref_tracker_alloc+0x139/0x430 [ 582.850389][T10428] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 582.855832][T10428] ? slab_post_alloc_hook+0x6d/0x2d0 [ 582.861107][T10428] ? dst_alloc+0x16a/0x1e0 [ 582.865510][T10428] dst_init+0xc4/0x3d0 [ 582.869567][T10428] dst_alloc+0x191/0x1e0 [ 582.873795][T10428] ip_route_output_key_hash_rcu+0x1300/0x2030 [ 582.879851][T10428] ip_route_output_key_hash+0x131/0x1e0 [ 582.885425][T10428] ? __cfi_ip_route_output_key_hash+0x10/0x10 [ 582.891478][T10428] ? 0xffffffffa00037e4 [ 582.895624][T10428] vti6_tnl_xmit+0xd9c/0x1980 [ 582.900289][T10428] ? dev_map_hash_lookup_elem+0x11f/0x180 [ 582.905994][T10428] ? bpf_trace_run2+0x104/0x250 [ 582.910832][T10428] ? __cfi_vti6_tnl_xmit+0x10/0x10 [ 582.915932][T10428] ? __bpf_trace_net_dev_start_xmit+0x25/0x30 [ 582.921983][T10428] ? __cfi___bpf_trace_net_dev_start_xmit+0x10/0x10 [ 582.928560][T10428] dev_hard_start_xmit+0x20b/0x750 [ 582.933663][T10428] __dev_queue_xmit+0x18d9/0x3420 [ 582.938681][T10428] ? __dev_queue_xmit+0x250/0x3420 [ 582.943777][T10428] ? __cfi___dev_queue_xmit+0x10/0x10 [ 582.949140][T10428] ? __kasan_check_write+0x14/0x20 [ 582.954239][T10428] ? skb_release_data+0x1d2/0x890 [ 582.959249][T10428] ? skb_ensure_writable+0x2f8/0x470 [ 582.964519][T10428] ? __kasan_check_write+0x14/0x20 [ 582.969618][T10428] ? pskb_expand_head+0xc4a/0x1210 [ 582.974714][T10428] __bpf_redirect+0x8db/0x1130 [ 582.979462][T10428] bpf_clone_redirect+0x26a/0x3c0 [ 582.984475][T10428] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 582.989924][T10428] ? kasan_set_track+0x60/0x70 [ 582.994669][T10428] ? kasan_set_track+0x4b/0x70 [ 582.999766][T10428] ? kasan_save_alloc_info+0x25/0x30 [ 583.005037][T10428] ? __kasan_slab_alloc+0x72/0x80 [ 583.010047][T10428] ? slab_post_alloc_hook+0x4f/0x2d0 [ 583.015321][T10428] ? kmem_cache_alloc+0x16e/0x330 [ 583.020331][T10428] ? build_skb+0x2a/0x220 [ 583.024641][T10428] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 583.030180][T10428] ? bpf_prog_test_run+0x3e3/0x630 [ 583.035274][T10428] ? __sys_bpf+0x56d/0x780 [ 583.039672][T10428] ? __x64_sys_bpf+0x7c/0x90 [ 583.044247][T10428] ? x64_sys_call+0x488/0x9a0 [ 583.048908][T10428] ? do_syscall_64+0x4c/0xa0 [ 583.053479][T10428] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 583.059542][T10428] ? __kasan_check_read+0x11/0x20 [ 583.064555][T10428] ? bpf_test_timer_continue+0x147/0x4a0 [ 583.070184][T10428] bpf_test_run+0x349/0x8d0 [ 583.074676][T10428] ? __kasan_slab_alloc+0x72/0x80 [ 583.079689][T10428] ? convert___skb_to_skb+0x5b0/0x5b0 [ 583.085049][T10428] ? __cfi_eth_type_trans+0x10/0x10 [ 583.090237][T10428] ? convert___skb_to_skb+0x40/0x5b0 [ 583.095507][T10428] bpf_prog_test_run_skb+0xaec/0x1290 [ 583.100873][T10428] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 583.106666][T10428] bpf_prog_test_run+0x3e3/0x630 [ 583.111586][T10428] ? slab_free_freelist_hook+0xc2/0x190 [ 583.117120][T10428] ? bpf_prog_query+0x270/0x270 [ 583.121951][T10428] ? selinux_bpf+0xce/0xf0 [ 583.126348][T10428] ? security_bpf+0x93/0xb0 [ 583.130834][T10428] __sys_bpf+0x56d/0x780 [ 583.135056][T10428] ? bpf_link_show_fdinfo+0x320/0x320 [ 583.140413][T10428] ? __cfi_ksys_write+0x10/0x10 [ 583.145244][T10428] ? debug_smp_processor_id+0x17/0x20 [ 583.150596][T10428] __x64_sys_bpf+0x7c/0x90 [ 583.155002][T10428] x64_sys_call+0x488/0x9a0 [ 583.159488][T10428] do_syscall_64+0x4c/0xa0 [ 583.163893][T10428] ? clear_bhb_loop+0x30/0x80 [ 583.168558][T10428] ? clear_bhb_loop+0x30/0x80 [ 583.173220][T10428] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 583.179100][T10428] RIP: 0033:0x7fd204f8f749 [ 583.183498][T10428] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 583.203091][T10428] RSP: 002b:00007fd205db1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 583.211486][T10428] RAX: ffffffffffffffda RBX: 00007fd2051e5fa0 RCX: 00007fd204f8f749 [ 583.219446][T10428] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 583.227400][T10428] RBP: 00007fd205db1090 R08: 0000000000000000 R09: 0000000000000000 [ 583.235355][T10428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 583.243307][T10428] R13: 00007fd2051e6038 R14: 00007fd2051e5fa0 R15: 00007ffd9d642a28 [ 583.251265][T10428] [ 584.133663][T10456] FAULT_INJECTION: forcing a failure. [ 584.133663][T10456] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 584.278382][T10456] CPU: 0 PID: 10456 Comm: syz.1.3147 Not tainted syzkaller #0 [ 584.285910][T10456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 584.295968][T10456] Call Trace: [ 584.299247][T10456] [ 584.302174][T10456] __dump_stack+0x21/0x24 [ 584.306510][T10456] dump_stack_lvl+0xee/0x150 [ 584.311103][T10456] ? __cfi_dump_stack_lvl+0x8/0x8 [ 584.316221][T10456] dump_stack+0x15/0x24 [ 584.320379][T10456] should_fail_ex+0x3d4/0x520 [ 584.325077][T10456] should_fail+0xb/0x10 [ 584.329246][T10456] should_fail_usercopy+0x1a/0x20 [ 584.334279][T10456] _copy_from_user+0x1e/0xc0 [ 584.338875][T10456] generic_map_update_batch+0x4b1/0x780 [ 584.344438][T10456] ? irqentry_exit+0x37/0x40 [ 584.349039][T10456] ? __cfi_generic_map_update_batch+0x10/0x10 [ 584.355113][T10456] ? __fdget+0x19c/0x220 [ 584.359364][T10456] ? __cfi_generic_map_update_batch+0x10/0x10 [ 584.365449][T10456] bpf_map_do_batch+0x48c/0x620 [ 584.370323][T10456] __sys_bpf+0x624/0x780 [ 584.374567][T10456] ? bpf_link_show_fdinfo+0x320/0x320 [ 584.379933][T10456] ? __cfi_sched_clock_cpu+0x10/0x10 [ 584.385220][T10456] __x64_sys_bpf+0x7c/0x90 [ 584.389636][T10456] x64_sys_call+0x488/0x9a0 [ 584.394141][T10456] do_syscall_64+0x4c/0xa0 [ 584.398570][T10456] ? clear_bhb_loop+0x30/0x80 [ 584.403249][T10456] ? clear_bhb_loop+0x30/0x80 [ 584.407920][T10456] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 584.413896][T10456] RIP: 0033:0x7fb204b8f749 [ 584.418307][T10456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 584.439146][T10456] RSP: 002b:00007fb205af7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 584.447549][T10456] RAX: ffffffffffffffda RBX: 00007fb204de5fa0 RCX: 00007fb204b8f749 [ 584.455605][T10456] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 584.463556][T10456] RBP: 00007fb205af7090 R08: 0000000000000000 R09: 0000000000000000 [ 584.471525][T10456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 584.479753][T10456] R13: 00007fb204de6038 R14: 00007fb204de5fa0 R15: 00007ffdb3d53208 [ 584.487714][T10456] [ 585.166160][T10465] device syzkaller0 entered promiscuous mode [ 585.952419][T10478] FAULT_INJECTION: forcing a failure. [ 585.952419][T10478] name failslab, interval 1, probability 0, space 0, times 0 [ 585.965263][T10478] CPU: 1 PID: 10478 Comm: syz.4.3156 Not tainted syzkaller #0 [ 585.972731][T10478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 585.982780][T10478] Call Trace: [ 585.986058][T10478] [ 585.988981][T10478] __dump_stack+0x21/0x24 [ 585.993320][T10478] dump_stack_lvl+0xee/0x150 [ 585.997903][T10478] ? __cfi_dump_stack_lvl+0x8/0x8 [ 586.002916][T10478] dump_stack+0x15/0x24 [ 586.007072][T10478] should_fail_ex+0x3d4/0x520 [ 586.011736][T10478] ? copy_signal+0x54/0x630 [ 586.016221][T10478] __should_failslab+0xac/0xf0 [ 586.020966][T10478] should_failslab+0x9/0x20 [ 586.025449][T10478] kmem_cache_alloc+0x3b/0x330 [ 586.030192][T10478] copy_signal+0x54/0x630 [ 586.034500][T10478] ? copy_process+0x1262/0x3480 [ 586.039338][T10478] copy_process+0x1283/0x3480 [ 586.044008][T10478] ? idle_dummy+0x10/0x10 [ 586.048321][T10478] kernel_clone+0x23a/0x810 [ 586.052809][T10478] ? __cfi_kernel_clone+0x10/0x10 [ 586.057816][T10478] ? __kasan_check_write+0x14/0x20 [ 586.062904][T10478] ? mutex_unlock+0x89/0x220 [ 586.067477][T10478] __x64_sys_clone+0x168/0x1b0 [ 586.072226][T10478] ? __cfi___x64_sys_clone+0x10/0x10 [ 586.077503][T10478] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 586.083550][T10478] x64_sys_call+0x990/0x9a0 [ 586.088036][T10478] do_syscall_64+0x4c/0xa0 [ 586.092432][T10478] ? clear_bhb_loop+0x30/0x80 [ 586.097092][T10478] ? clear_bhb_loop+0x30/0x80 [ 586.101751][T10478] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 586.107625][T10478] RIP: 0033:0x7f6fec38f749 [ 586.112019][T10478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 586.131605][T10478] RSP: 002b:00007f6fed2defe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 586.140002][T10478] RAX: ffffffffffffffda RBX: 00007f6fec5e5fa0 RCX: 00007f6fec38f749 [ 586.147954][T10478] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 586.156078][T10478] RBP: 00007f6fed2df090 R08: 0000000000000000 R09: 0000000000000000 [ 586.164029][T10478] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 586.171985][T10478] R13: 00007f6fec5e6038 R14: 00007f6fec5e5fa0 R15: 00007ffde912ac18 [ 586.179944][T10478] [ 586.932968][T10509] device veth1_macvtap left promiscuous mode [ 586.962749][T10509] device macsec0 entered promiscuous mode [ 586.990497][T10511] FAULT_INJECTION: forcing a failure. [ 586.990497][T10511] name failslab, interval 1, probability 0, space 0, times 0 [ 587.010060][T10511] CPU: 0 PID: 10511 Comm: syz.3.3168 Not tainted syzkaller #0 [ 587.017552][T10511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 587.027610][T10511] Call Trace: [ 587.030902][T10511] [ 587.033845][T10511] __dump_stack+0x21/0x24 [ 587.038182][T10511] dump_stack_lvl+0xee/0x150 [ 587.042773][T10511] ? __cfi_dump_stack_lvl+0x8/0x8 [ 587.047799][T10511] ? skb_release_data+0x1d2/0x890 [ 587.052826][T10511] ? skb_ensure_writable+0x2f8/0x470 [ 587.058107][T10511] dump_stack+0x15/0x24 [ 587.062259][T10511] should_fail_ex+0x3d4/0x520 [ 587.066940][T10511] ? skb_clone+0x1f5/0x380 [ 587.071363][T10511] __should_failslab+0xac/0xf0 [ 587.076128][T10511] should_failslab+0x9/0x20 [ 587.080629][T10511] kmem_cache_alloc+0x3b/0x330 [ 587.085394][T10511] skb_clone+0x1f5/0x380 [ 587.089635][T10511] bpf_clone_redirect+0xa7/0x3c0 [ 587.094571][T10511] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 587.100032][T10511] ? kasan_set_track+0x60/0x70 [ 587.104792][T10511] ? kasan_set_track+0x4b/0x70 [ 587.109552][T10511] ? kasan_save_alloc_info+0x25/0x30 [ 587.114840][T10511] ? __kasan_slab_alloc+0x72/0x80 [ 587.119861][T10511] ? slab_post_alloc_hook+0x4f/0x2d0 [ 587.125157][T10511] ? kmem_cache_alloc+0x16e/0x330 [ 587.130191][T10511] ? build_skb+0x2a/0x220 [ 587.134529][T10511] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 587.140087][T10511] ? bpf_prog_test_run+0x3e3/0x630 [ 587.145280][T10511] ? __sys_bpf+0x56d/0x780 [ 587.149688][T10511] ? __x64_sys_bpf+0x7c/0x90 [ 587.154272][T10511] ? x64_sys_call+0x488/0x9a0 [ 587.158931][T10511] ? do_syscall_64+0x4c/0xa0 [ 587.163503][T10511] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 587.169561][T10511] ? __kasan_check_read+0x11/0x20 [ 587.174569][T10511] ? bpf_test_timer_continue+0x147/0x4a0 [ 587.180190][T10511] bpf_test_run+0x349/0x8d0 [ 587.184681][T10511] ? __kasan_slab_alloc+0x72/0x80 [ 587.189777][T10511] ? convert___skb_to_skb+0x5b0/0x5b0 [ 587.195138][T10511] ? __cfi_eth_type_trans+0x10/0x10 [ 587.200324][T10511] ? convert___skb_to_skb+0x40/0x5b0 [ 587.205597][T10511] bpf_prog_test_run_skb+0xaec/0x1290 [ 587.210959][T10511] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 587.216750][T10511] bpf_prog_test_run+0x3e3/0x630 [ 587.221669][T10511] ? slab_free_freelist_hook+0xc2/0x190 [ 587.227202][T10511] ? bpf_prog_query+0x270/0x270 [ 587.232038][T10511] ? selinux_bpf+0xce/0xf0 [ 587.236439][T10511] ? security_bpf+0x93/0xb0 [ 587.240930][T10511] __sys_bpf+0x56d/0x780 [ 587.245156][T10511] ? bpf_link_show_fdinfo+0x320/0x320 [ 587.250513][T10511] ? __cfi_ksys_write+0x10/0x10 [ 587.255352][T10511] ? debug_smp_processor_id+0x17/0x20 [ 587.260705][T10511] __x64_sys_bpf+0x7c/0x90 [ 587.265107][T10511] x64_sys_call+0x488/0x9a0 [ 587.269594][T10511] do_syscall_64+0x4c/0xa0 [ 587.274004][T10511] ? clear_bhb_loop+0x30/0x80 [ 587.278689][T10511] ? clear_bhb_loop+0x30/0x80 [ 587.283368][T10511] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 587.289254][T10511] RIP: 0033:0x7fafebd8f749 [ 587.293661][T10511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 587.313277][T10511] RSP: 002b:00007fafeccf7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 587.321705][T10511] RAX: ffffffffffffffda RBX: 00007fafebfe5fa0 RCX: 00007fafebd8f749 [ 587.329678][T10511] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 587.337670][T10511] RBP: 00007fafeccf7090 R08: 0000000000000000 R09: 0000000000000000 [ 587.345649][T10511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 587.353620][T10511] R13: 00007fafebfe6038 R14: 00007fafebfe5fa0 R15: 00007fffaacb1768 [ 587.361607][T10511] [ 587.941907][ T284] Ÿë: port 1(syz_tun) entered disabled state [ 587.951835][ T284] device syz_tun left promiscuous mode [ 587.963815][ T284] Ÿë: port 1(syz_tun) entered disabled state [ 588.732353][T10534] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.791619][T10534] bridge0: port 1(bridge_slave_0) entered disabled state [ 588.811878][T10534] device bridge_slave_0 entered promiscuous mode [ 588.874768][ T334] device veth0_vlan left promiscuous mode [ 589.087608][T10552] sock: sock_set_timeout: `syz.4.3181' (pid 10552) tries to set negative timeout [ 589.188567][T10534] bridge0: port 2(bridge_slave_1) entered blocking state [ 589.195727][T10534] bridge0: port 2(bridge_slave_1) entered disabled state [ 589.203268][T10534] device bridge_slave_1 entered promiscuous mode [ 589.216652][T10566] device sit0 left promiscuous mode [ 591.151411][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 591.272889][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 591.343621][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 591.414513][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 591.431658][ T2737] bridge0: port 1(bridge_slave_0) entered blocking state [ 591.438741][ T2737] bridge0: port 1(bridge_slave_0) entered forwarding state [ 591.506086][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 591.578090][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 591.628794][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 591.647159][ T2737] bridge0: port 2(bridge_slave_1) entered blocking state [ 591.654239][ T2737] bridge0: port 2(bridge_slave_1) entered forwarding state [ 591.682401][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 591.718888][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 591.820611][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 591.913614][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 592.194954][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 592.232687][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 592.340265][T10534] device veth0_vlan entered promiscuous mode [ 592.349902][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 592.360125][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 592.416824][T10534] device veth1_macvtap entered promiscuous mode [ 592.626601][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 592.643802][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 592.661095][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 592.677019][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 592.711052][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 592.718920][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 592.727241][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 592.735692][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 592.744794][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 595.276687][T10662] device syzkaller0 entered promiscuous mode [ 602.502128][T10750] bridge0: port 2(bridge_slave_1) entered disabled state [ 602.519728][T10750] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.939202][T10866] device sit0 entered promiscuous mode [ 609.617008][T10882] device sit0 entered promiscuous mode [ 609.889814][T10885] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 616.698381][T10982] device wg2 entered promiscuous mode [ 617.062920][T10994] device sit0 left promiscuous mode [ 617.162412][T10993] device sit0 entered promiscuous mode [ 618.982191][T11024] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 619.000717][T11024] device syzkaller0 entered promiscuous mode [ 627.885877][T11168] FAULT_INJECTION: forcing a failure. [ 627.885877][T11168] name failslab, interval 1, probability 0, space 0, times 0 [ 628.018562][T11168] CPU: 1 PID: 11168 Comm: syz.1.3386 Not tainted syzkaller #0 [ 628.026076][T11168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 628.036131][T11168] Call Trace: [ 628.039410][T11168] [ 628.042345][T11168] __dump_stack+0x21/0x24 [ 628.046676][T11168] dump_stack_lvl+0xee/0x150 [ 628.051284][T11168] ? __cfi_dump_stack_lvl+0x8/0x8 [ 628.056313][T11168] dump_stack+0x15/0x24 [ 628.060473][T11168] should_fail_ex+0x3d4/0x520 [ 628.065168][T11168] __should_failslab+0xac/0xf0 [ 628.069953][T11168] ? __get_vm_area_node+0x12c/0x360 [ 628.075168][T11168] should_failslab+0x9/0x20 [ 628.079683][T11168] __kmem_cache_alloc_node+0x3d/0x2c0 [ 628.085069][T11168] ? __get_vm_area_node+0x12c/0x360 [ 628.090276][T11168] kmalloc_node_trace+0x26/0xb0 [ 628.095143][T11168] __get_vm_area_node+0x12c/0x360 [ 628.100182][T11168] __vmalloc_node_range+0x326/0x13d0 [ 628.105473][T11168] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 628.111020][T11168] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 628.116746][T11168] ? __cfi___vmalloc_node_range+0x10/0x10 [ 628.122463][T11168] ? __cfi_selinux_capable+0x10/0x10 [ 628.127754][T11168] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 628.133913][T11168] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 628.139458][T11168] __vmalloc+0x79/0x90 [ 628.143522][T11168] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 628.149062][T11168] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 628.154433][T11168] bpf_prog_alloc+0x22/0x1c0 [ 628.159061][T11168] bpf_prog_load+0x7c6/0x15a0 [ 628.163745][T11168] ? map_freeze+0x390/0x390 [ 628.168248][T11168] ? selinux_bpf+0xc7/0xf0 [ 628.172658][T11168] ? security_bpf+0x93/0xb0 [ 628.177159][T11168] __sys_bpf+0x504/0x780 [ 628.181397][T11168] ? bpf_link_show_fdinfo+0x320/0x320 [ 628.186760][T11168] ? preempt_schedule_irq+0xbb/0x110 [ 628.192045][T11168] ? irqentry_exit+0x37/0x40 [ 628.196635][T11168] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 628.202439][T11168] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 628.208596][T11168] __x64_sys_bpf+0x7c/0x90 [ 628.213014][T11168] x64_sys_call+0x488/0x9a0 [ 628.217518][T11168] do_syscall_64+0x4c/0xa0 [ 628.221930][T11168] ? clear_bhb_loop+0x30/0x80 [ 628.226605][T11168] ? clear_bhb_loop+0x30/0x80 [ 628.231283][T11168] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 628.237179][T11168] RIP: 0033:0x7fb204b8f749 [ 628.241599][T11168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 628.261203][T11168] RSP: 002b:00007fb205af7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 628.269622][T11168] RAX: ffffffffffffffda RBX: 00007fb204de5fa0 RCX: 00007fb204b8f749 [ 628.277606][T11168] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 628.285578][T11168] RBP: 00007fb205af7090 R08: 0000000000000000 R09: 0000000000000000 [ 628.293547][T11168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 628.301517][T11168] R13: 00007fb204de6038 R14: 00007fb204de5fa0 R15: 00007ffdb3d53208 [ 628.309491][T11168] [ 628.320588][T11168] syz.1.3386: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 628.337843][T11168] CPU: 0 PID: 11168 Comm: syz.1.3386 Not tainted syzkaller #0 [ 628.345311][T11168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 628.355370][T11168] Call Trace: [ 628.358636][T11168] [ 628.361635][T11168] __dump_stack+0x21/0x24 [ 628.365949][T11168] dump_stack_lvl+0xee/0x150 [ 628.370520][T11168] ? __cfi_dump_stack_lvl+0x8/0x8 [ 628.375525][T11168] ? pr_cont_kernfs_name+0x133/0x160 [ 628.380799][T11168] dump_stack+0x15/0x24 [ 628.384935][T11168] warn_alloc+0x1b0/0x1d0 [ 628.389258][T11168] ? should_failslab+0x9/0x20 [ 628.393914][T11168] ? __cfi_warn_alloc+0x10/0x10 [ 628.398749][T11168] ? kmalloc_node_trace+0x3d/0xb0 [ 628.403749][T11168] ? __get_vm_area_node+0x353/0x360 [ 628.408929][T11168] __vmalloc_node_range+0x34b/0x13d0 [ 628.414227][T11168] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 628.419934][T11168] ? __cfi___vmalloc_node_range+0x10/0x10 [ 628.425635][T11168] ? __cfi_selinux_capable+0x10/0x10 [ 628.430906][T11168] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 628.437047][T11168] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 628.442576][T11168] __vmalloc+0x79/0x90 [ 628.446627][T11168] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 628.452166][T11168] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 628.457536][T11168] bpf_prog_alloc+0x22/0x1c0 [ 628.462118][T11168] bpf_prog_load+0x7c6/0x15a0 [ 628.466788][T11168] ? map_freeze+0x390/0x390 [ 628.471280][T11168] ? selinux_bpf+0xc7/0xf0 [ 628.475681][T11168] ? security_bpf+0x93/0xb0 [ 628.480165][T11168] __sys_bpf+0x504/0x780 [ 628.484387][T11168] ? bpf_link_show_fdinfo+0x320/0x320 [ 628.489740][T11168] ? preempt_schedule_irq+0xbb/0x110 [ 628.495095][T11168] ? irqentry_exit+0x37/0x40 [ 628.499671][T11168] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 628.505461][T11168] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 628.511600][T11168] __x64_sys_bpf+0x7c/0x90 [ 628.516000][T11168] x64_sys_call+0x488/0x9a0 [ 628.520486][T11168] do_syscall_64+0x4c/0xa0 [ 628.524883][T11168] ? clear_bhb_loop+0x30/0x80 [ 628.529547][T11168] ? clear_bhb_loop+0x30/0x80 [ 628.534207][T11168] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 628.540090][T11168] RIP: 0033:0x7fb204b8f749 [ 628.544488][T11168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 628.564081][T11168] RSP: 002b:00007fb205af7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 628.572491][T11168] RAX: ffffffffffffffda RBX: 00007fb204de5fa0 RCX: 00007fb204b8f749 [ 628.580446][T11168] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 628.588400][T11168] RBP: 00007fb205af7090 R08: 0000000000000000 R09: 0000000000000000 [ 628.596352][T11168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 628.604304][T11168] R13: 00007fb204de6038 R14: 00007fb204de5fa0 R15: 00007ffdb3d53208 [ 628.612272][T11168] [ 628.762780][T11168] Mem-Info: [ 628.766153][T11168] active_anon:6495 inactive_anon:0 isolated_anon:0 [ 628.766153][T11168] active_file:25083 inactive_file:2479 isolated_file:0 [ 628.766153][T11168] unevictable:0 dirty:189 writeback:0 [ 628.766153][T11168] slab_reclaimable:8121 slab_unreclaimable:74075 [ 628.766153][T11168] mapped:29532 shmem:163 pagetables:671 [ 628.766153][T11168] sec_pagetables:0 bounce:0 [ 628.766153][T11168] kernel_misc_reclaimable:0 [ 628.766153][T11168] free:1516381 free_pcp:9600 free_cma:0 [ 628.819683][T11168] Node 0 active_anon:25980kB inactive_anon:0kB active_file:100332kB inactive_file:9916kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:118128kB dirty:756kB writeback:0kB shmem:652kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5288kB pagetables:2684kB sec_pagetables:0kB all_unreclaimable? no [ 628.975155][T11168] DMA32 free:2968532kB boost:0kB min:31288kB low:39108kB high:46928kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2974184kB mlocked:0kB bounce:0kB free_pcp:5652kB local_pcp:0kB free_cma:0kB [ 629.381597][T11168] lowmem_reserve[]: 0 3932 3932 3932 [ 629.387400][T11168] Normal free:3096992kB boost:0kB min:42436kB low:53044kB high:63652kB reserved_highatomic:0KB active_anon:25976kB inactive_anon:0kB active_file:100332kB inactive_file:9924kB unevictable:0kB writepending:748kB present:5242880kB managed:4026656kB mlocked:0kB bounce:0kB free_pcp:32740kB local_pcp:10208kB free_cma:0kB [ 629.738322][T11168] lowmem_reserve[]: 0 0 0 0 [ 629.743082][T11168] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2968532kB [ 629.826769][T11168] Normal: 1680*4kB (UME) 1334*8kB (ME) 829*16kB (ME) 415*32kB (UME) 294*64kB (UME) 309*128kB (UM) 166*256kB (UME) 66*512kB (UME) 20*1024kB (UM) 13*2048kB (UME) 701*4096kB (UM) = 3096992kB [ 629.846622][T11168] 27727 total pagecache pages [ 630.145319][T11168] 0 pages in swap cache [ 630.238563][T11168] Free swap = 124996kB [ 630.339872][T11168] Total swap = 124996kB [ 630.389439][T11168] 2097051 pages RAM [ 630.393354][T11168] 0 pages HighMem/MovableOnly [ 630.428995][T11168] 346841 pages reserved [ 630.459858][T11168] 0 pages cma reserved [ 631.137314][T11224] bond_slave_1: mtu less than device minimum [ 634.284897][T11342] device syzkaller0 entered promiscuous mode [ 634.297684][T11342] syzkaller0: create flow: hash 3922798867 index 1 [ 634.308047][T11341] syzkaller0: delete flow: hash 3922798867 index 1 [ 634.341252][T11347] .€: renamed from bond_slave_1 [ 635.552335][T11384] device veth1_macvtap left promiscuous mode [ 635.699892][T11384] device macsec0 entered promiscuous mode [ 635.903773][T11404] syz.0.3466[11404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.903874][T11404] syz.0.3466[11404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 636.848242][T11425] device sit0 left promiscuous mode [ 637.097712][T11425] device sit0 entered promiscuous mode [ 641.172017][T11528] syz.0.3505[11528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 641.172114][T11528] syz.0.3505[11528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.058114][T11550] syz.3.3513[11550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.089050][T11550] syz.3.3513[11550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.506566][T11573] FAULT_INJECTION: forcing a failure. [ 642.506566][T11573] name failslab, interval 1, probability 0, space 0, times 0 [ 642.562938][T11573] CPU: 0 PID: 11573 Comm: syz.1.3512 Not tainted syzkaller #0 [ 642.570441][T11573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 642.580506][T11573] Call Trace: [ 642.583785][T11573] [ 642.586715][T11573] __dump_stack+0x21/0x24 [ 642.591050][T11573] dump_stack_lvl+0xee/0x150 [ 642.595639][T11573] ? __cfi_dump_stack_lvl+0x8/0x8 [ 642.600663][T11573] ? ctx_flexible_sched_in+0x70/0x70 [ 642.605949][T11573] dump_stack+0x15/0x24 [ 642.610103][T11573] should_fail_ex+0x3d4/0x520 [ 642.614785][T11573] __should_failslab+0xac/0xf0 [ 642.619555][T11573] ? kernfs_fop_write_iter+0x156/0x470 [ 642.625017][T11573] should_failslab+0x9/0x20 [ 642.629524][T11573] __kmem_cache_alloc_node+0x3d/0x2c0 [ 642.634900][T11573] ? kernfs_fop_write_iter+0x156/0x470 [ 642.640357][T11573] __kmalloc+0xa1/0x1e0 [ 642.644519][T11573] kernfs_fop_write_iter+0x156/0x470 [ 642.649803][T11573] vfs_write+0x5db/0xca0 [ 642.654055][T11573] ? __cfi_vfs_write+0x10/0x10 [ 642.658829][T11573] ? __cfi_mutex_lock+0x10/0x10 [ 642.663684][T11573] ? __fdget_pos+0x2cd/0x380 [ 642.668271][T11573] ? ksys_write+0x71/0x240 [ 642.672683][T11573] ksys_write+0x140/0x240 [ 642.677009][T11573] ? __cfi_ksys_write+0x10/0x10 [ 642.681856][T11573] ? __kasan_check_write+0x14/0x20 [ 642.686969][T11573] ? fpregs_restore_userregs+0x128/0x260 [ 642.692604][T11573] __x64_sys_write+0x7b/0x90 [ 642.697190][T11573] x64_sys_call+0x27b/0x9a0 [ 642.701693][T11573] do_syscall_64+0x4c/0xa0 [ 642.706114][T11573] ? clear_bhb_loop+0x30/0x80 [ 642.710794][T11573] ? clear_bhb_loop+0x30/0x80 [ 642.715482][T11573] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 642.721380][T11573] RIP: 0033:0x7fb204b8f749 [ 642.725794][T11573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 642.745411][T11573] RSP: 002b:00007fb205ab5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 642.753834][T11573] RAX: ffffffffffffffda RBX: 00007fb204de6180 RCX: 00007fb204b8f749 [ 642.761814][T11573] RDX: 0000000000000005 RSI: 0000200000000080 RDI: 000000000000000d [ 642.769788][T11573] RBP: 00007fb205ab5090 R08: 0000000000000000 R09: 0000000000000000 [ 642.777779][T11573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 642.785750][T11573] R13: 00007fb204de6218 R14: 00007fb204de6180 R15: 00007ffdb3d53208 [ 642.793722][T11573] [ 642.900675][T11578] device sit0 left promiscuous mode [ 643.460469][T11570] device sit0 entered promiscuous mode [ 647.219714][T11682] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 648.878509][T11720] device pim6reg1 entered promiscuous mode [ 649.957396][T11757] device sit0 entered promiscuous mode [ 651.788906][T11804] device sit0 left promiscuous mode [ 653.662067][T11839] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 653.667959][T11839] syzkaller1: linktype set to 0 [ 654.990613][T11849] FAULT_INJECTION: forcing a failure. [ 654.990613][T11849] name failslab, interval 1, probability 0, space 0, times 0 [ 655.219109][T11849] CPU: 1 PID: 11849 Comm: syz.2.3616 Not tainted syzkaller #0 [ 655.226669][T11849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 655.236723][T11849] Call Trace: [ 655.239993][T11849] [ 655.242913][T11849] __dump_stack+0x21/0x24 [ 655.247236][T11849] dump_stack_lvl+0xee/0x150 [ 655.251814][T11849] ? __cfi_dump_stack_lvl+0x8/0x8 [ 655.256840][T11849] ? skb_release_data+0x1d2/0x890 [ 655.261876][T11849] ? skb_ensure_writable+0x2f8/0x470 [ 655.267162][T11849] dump_stack+0x15/0x24 [ 655.271308][T11849] should_fail_ex+0x3d4/0x520 [ 655.275976][T11849] ? skb_clone+0x1f5/0x380 [ 655.280379][T11849] __should_failslab+0xac/0xf0 [ 655.285134][T11849] should_failslab+0x9/0x20 [ 655.289630][T11849] kmem_cache_alloc+0x3b/0x330 [ 655.294382][T11849] skb_clone+0x1f5/0x380 [ 655.298614][T11849] bpf_clone_redirect+0xa7/0x3c0 [ 655.303540][T11849] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 655.308982][T11849] ? kasan_set_track+0x60/0x70 [ 655.313733][T11849] ? kasan_set_track+0x4b/0x70 [ 655.318573][T11849] ? kasan_save_alloc_info+0x25/0x30 [ 655.323853][T11849] ? __kasan_slab_alloc+0x72/0x80 [ 655.328869][T11849] ? slab_post_alloc_hook+0x4f/0x2d0 [ 655.334144][T11849] ? kmem_cache_alloc+0x16e/0x330 [ 655.339245][T11849] ? build_skb+0x2a/0x220 [ 655.343559][T11849] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 655.349098][T11849] ? bpf_prog_test_run+0x3e3/0x630 [ 655.354194][T11849] ? __sys_bpf+0x56d/0x780 [ 655.358591][T11849] ? __x64_sys_bpf+0x7c/0x90 [ 655.363175][T11849] ? x64_sys_call+0x488/0x9a0 [ 655.367841][T11849] ? do_syscall_64+0x4c/0xa0 [ 655.372417][T11849] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 655.378480][T11849] ? __kasan_check_read+0x11/0x20 [ 655.383490][T11849] ? bpf_test_timer_continue+0x147/0x4a0 [ 655.389115][T11849] bpf_test_run+0x349/0x8d0 [ 655.393619][T11849] ? __kasan_slab_alloc+0x72/0x80 [ 655.398633][T11849] ? convert___skb_to_skb+0x5b0/0x5b0 [ 655.404004][T11849] ? __cfi_eth_type_trans+0x10/0x10 [ 655.409194][T11849] ? convert___skb_to_skb+0x40/0x5b0 [ 655.414474][T11849] bpf_prog_test_run_skb+0xaec/0x1290 [ 655.419842][T11849] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 655.425639][T11849] bpf_prog_test_run+0x3e3/0x630 [ 655.430562][T11849] ? slab_free_freelist_hook+0xc2/0x190 [ 655.436103][T11849] ? bpf_prog_query+0x270/0x270 [ 655.440942][T11849] ? selinux_bpf+0xce/0xf0 [ 655.445346][T11849] ? security_bpf+0x93/0xb0 [ 655.449835][T11849] __sys_bpf+0x56d/0x780 [ 655.454064][T11849] ? bpf_link_show_fdinfo+0x320/0x320 [ 655.459423][T11849] ? __cfi_ksys_write+0x10/0x10 [ 655.464259][T11849] ? debug_smp_processor_id+0x17/0x20 [ 655.469620][T11849] __x64_sys_bpf+0x7c/0x90 [ 655.474029][T11849] x64_sys_call+0x488/0x9a0 [ 655.478522][T11849] do_syscall_64+0x4c/0xa0 [ 655.482926][T11849] ? clear_bhb_loop+0x30/0x80 [ 655.487597][T11849] ? clear_bhb_loop+0x30/0x80 [ 655.492268][T11849] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 655.498149][T11849] RIP: 0033:0x7fd204f8f749 [ 655.502550][T11849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 655.522143][T11849] RSP: 002b:00007fd205db1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 655.530550][T11849] RAX: ffffffffffffffda RBX: 00007fd2051e5fa0 RCX: 00007fd204f8f749 [ 655.538508][T11849] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 655.546472][T11849] RBP: 00007fd205db1090 R08: 0000000000000000 R09: 0000000000000000 [ 655.554431][T11849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 655.562395][T11849] R13: 00007fd2051e6038 R14: 00007fd2051e5fa0 R15: 00007ffd9d642a28 [ 655.570377][T11849] [ 657.209747][T11873] device wg2 left promiscuous mode [ 657.396875][T11877] device sit0 left promiscuous mode [ 658.046695][T11872] device sit0 entered promiscuous mode [ 660.459467][T11916] device sit0 left promiscuous mode [ 660.753442][T11917] device sit0 entered promiscuous mode [ 662.433314][T11951] device sit0 entered promiscuous mode [ 664.274302][T12003] bridge0: port 2(bridge_slave_1) entered disabled state [ 664.284673][T12003] bridge0: port 1(bridge_slave_0) entered disabled state [ 664.681116][T12012] syzkaller: port 1(erspan0) entered blocking state [ 664.690151][T12012] syzkaller: port 1(erspan0) entered disabled state [ 664.697912][T12012] device erspan0 entered promiscuous mode [ 664.845403][T12019] syz.3.3674[12019] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 664.845495][T12019] syz.3.3674[12019] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 665.047677][T12028] FAULT_INJECTION: forcing a failure. [ 665.047677][T12028] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 665.079604][T12028] CPU: 1 PID: 12028 Comm: syz.3.3679 Not tainted syzkaller #0 [ 665.087105][T12028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 665.097161][T12028] Call Trace: [ 665.100440][T12028] [ 665.103370][T12028] __dump_stack+0x21/0x24 [ 665.107707][T12028] dump_stack_lvl+0xee/0x150 [ 665.112302][T12028] ? __cfi_dump_stack_lvl+0x8/0x8 [ 665.117326][T12028] dump_stack+0x15/0x24 [ 665.121475][T12028] should_fail_ex+0x3d4/0x520 [ 665.126141][T12028] should_fail+0xb/0x10 [ 665.130291][T12028] should_fail_usercopy+0x1a/0x20 [ 665.135304][T12028] _copy_to_user+0x1e/0x90 [ 665.139708][T12028] bpf_test_finish+0x1a8/0x6b0 [ 665.144461][T12028] ? __cfi_xdp_test_run_init_page+0x10/0x10 [ 665.150342][T12028] ? convert_skb_to___skb+0x430/0x430 [ 665.155715][T12028] ? __kasan_check_write+0x14/0x20 [ 665.160811][T12028] ? _copy_from_user+0x8f/0xc0 [ 665.165557][T12028] ? bpf_test_init+0x141/0x160 [ 665.170308][T12028] bpf_prog_test_run_xdp+0x782/0xe50 [ 665.175582][T12028] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 665.181377][T12028] ? __kasan_check_write+0x14/0x20 [ 665.186468][T12028] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 665.192258][T12028] bpf_prog_test_run+0x3e3/0x630 [ 665.197177][T12028] ? slab_free_freelist_hook+0xc2/0x190 [ 665.202759][T12028] ? bpf_prog_query+0x270/0x270 [ 665.207593][T12028] ? selinux_bpf+0xce/0xf0 [ 665.211995][T12028] ? security_bpf+0x93/0xb0 [ 665.216483][T12028] __sys_bpf+0x56d/0x780 [ 665.220708][T12028] ? bpf_link_show_fdinfo+0x320/0x320 [ 665.226065][T12028] ? __cfi_ksys_write+0x10/0x10 [ 665.230895][T12028] ? debug_smp_processor_id+0x17/0x20 [ 665.236250][T12028] __x64_sys_bpf+0x7c/0x90 [ 665.240655][T12028] x64_sys_call+0x488/0x9a0 [ 665.245144][T12028] do_syscall_64+0x4c/0xa0 [ 665.249546][T12028] ? clear_bhb_loop+0x30/0x80 [ 665.254209][T12028] ? clear_bhb_loop+0x30/0x80 [ 665.258873][T12028] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 665.264749][T12028] RIP: 0033:0x7f4d06f8f749 [ 665.269147][T12028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 665.288737][T12028] RSP: 002b:00007f4d07ec6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 665.297135][T12028] RAX: ffffffffffffffda RBX: 00007f4d071e5fa0 RCX: 00007f4d06f8f749 [ 665.305096][T12028] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 665.313048][T12028] RBP: 00007f4d07ec6090 R08: 0000000000000000 R09: 0000000000000000 [ 665.321003][T12028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 665.328954][T12028] R13: 00007f4d071e6038 R14: 00007f4d071e5fa0 R15: 00007ffdc5c43388 [ 665.336912][T12028] [ 667.380402][T12097] device sit0 left promiscuous mode [ 667.627758][T12097] device sit0 entered promiscuous mode [ 668.267313][T12139] device sit0 left promiscuous mode [ 668.316327][T12139] device sit0 entered promiscuous mode [ 669.569014][T12167] device sit0 left promiscuous mode [ 673.883642][T12287] device syzkaller0 entered promiscuous mode [ 673.992228][ T28] audit: type=1400 audit(1763624441.741:150): avc: denied { create } for pid=12292 comm="syz.4.3766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 677.051751][T12344] ref_ctr_offset mismatch. inode: 0x3ac offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 681.916534][T12419] bond_slave_1: mtu less than device minimum [ 682.558694][T12423] device veth0_vlan left promiscuous mode [ 682.569435][T12423] device veth0_vlan entered promiscuous mode [ 682.605852][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 682.648114][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 682.668933][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 683.287776][T12436] device sit0 left promiscuous mode [ 683.433076][T12436] device sit0 entered promiscuous mode [ 686.212404][T12487] device veth0_vlan left promiscuous mode [ 686.252427][T12487] device veth0_vlan entered promiscuous mode [ 687.141762][T12504] bridge0: port 2(bridge_slave_1) entered disabled state [ 687.149694][T12504] bridge0: port 1(bridge_slave_0) entered disabled state [ 687.964033][T12540] device syzkaller0 entered promiscuous mode [ 689.424096][T12576] syz.4.3862 uses obsolete (PF_INET,SOCK_PACKET) [ 689.584454][T12568] device veth0_vlan left promiscuous mode [ 689.758906][T12568] device veth0_vlan entered promiscuous mode [ 689.905332][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 689.927977][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 689.976344][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 690.027598][T12583] bridge0: port 3(gretap0) entered blocking state [ 690.038326][T12583] bridge0: port 3(gretap0) entered disabled state [ 690.072718][T12583] device gretap0 entered promiscuous mode [ 693.431997][T12670] device bridge_slave_1 left promiscuous mode [ 693.580382][T12670] bridge0: port 2(bridge_slave_1) entered disabled state [ 693.676275][T12670] device bridge_slave_0 left promiscuous mode [ 693.687650][T12670] bridge0: port 1(bridge_slave_0) entered disabled state [ 693.900942][T12672] device macsec0 left promiscuous mode [ 694.535765][T12686] device veth0_vlan left promiscuous mode [ 694.543802][T12686] device veth0_vlan entered promiscuous mode [ 699.119980][T12754] syz.4.3920[12754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.120077][T12754] syz.4.3920[12754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 700.729960][T12816] device macsec0 entered promiscuous mode [ 701.795106][T12858] FAULT_INJECTION: forcing a failure. [ 701.795106][T12858] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 701.864561][T12858] CPU: 1 PID: 12858 Comm: syz.3.3958 Not tainted syzkaller #0 [ 701.872066][T12858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 701.882120][T12858] Call Trace: [ 701.885393][T12858] [ 701.888315][T12858] __dump_stack+0x21/0x24 [ 701.892674][T12858] dump_stack_lvl+0xee/0x150 [ 701.897272][T12858] ? __cfi_dump_stack_lvl+0x8/0x8 [ 701.902301][T12858] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 701.908465][T12858] dump_stack+0x15/0x24 [ 701.912624][T12858] should_fail_ex+0x3d4/0x520 [ 701.917315][T12858] should_fail+0xb/0x10 [ 701.921478][T12858] should_fail_usercopy+0x1a/0x20 [ 701.926512][T12858] _copy_from_user+0x1e/0xc0 [ 701.931105][T12858] generic_map_update_batch+0x458/0x780 [ 701.936737][T12858] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 701.942584][T12858] ? __cfi_generic_map_update_batch+0x10/0x10 [ 701.948655][T12858] ? __fdget+0x19c/0x220 [ 701.952896][T12858] ? __cfi_generic_map_update_batch+0x10/0x10 [ 701.958963][T12858] bpf_map_do_batch+0x48c/0x620 [ 701.963817][T12858] __sys_bpf+0x624/0x780 [ 701.968055][T12858] ? bpf_link_show_fdinfo+0x320/0x320 [ 701.973430][T12858] ? __cfi_sched_clock_cpu+0x10/0x10 [ 701.978725][T12858] __x64_sys_bpf+0x7c/0x90 [ 701.983142][T12858] x64_sys_call+0x488/0x9a0 [ 701.987647][T12858] do_syscall_64+0x4c/0xa0 [ 701.992063][T12858] ? clear_bhb_loop+0x30/0x80 [ 701.996743][T12858] ? clear_bhb_loop+0x30/0x80 [ 702.001426][T12858] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 702.007321][T12858] RIP: 0033:0x7f4d06f8f749 [ 702.011734][T12858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 702.031338][T12858] RSP: 002b:00007f4d07ec6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 702.039761][T12858] RAX: ffffffffffffffda RBX: 00007f4d071e5fa0 RCX: 00007f4d06f8f749 [ 702.047742][T12858] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 702.055719][T12858] RBP: 00007f4d07ec6090 R08: 0000000000000000 R09: 0000000000000000 [ 702.063692][T12858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 702.071668][T12858] R13: 00007f4d071e6038 R14: 00007f4d071e5fa0 R15: 00007ffdc5c43388 [ 702.079644][T12858] [ 702.664577][ T28] audit: type=1400 audit(1763624470.391:151): avc: denied { create } for pid=12893 comm="syz.3.3971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 702.701357][T12894] device veth0_vlan left promiscuous mode [ 702.767652][T12894] device veth0_vlan entered promiscuous mode [ 704.430935][T12948] FAULT_INJECTION: forcing a failure. [ 704.430935][T12948] name failslab, interval 1, probability 0, space 0, times 0 [ 704.478254][T12948] CPU: 0 PID: 12948 Comm: syz.2.3989 Not tainted syzkaller #0 [ 704.485751][T12948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 704.495805][T12948] Call Trace: [ 704.499080][T12948] [ 704.502009][T12948] __dump_stack+0x21/0x24 [ 704.506339][T12948] dump_stack_lvl+0xee/0x150 [ 704.510930][T12948] ? __cfi_dump_stack_lvl+0x8/0x8 [ 704.515971][T12948] dump_stack+0x15/0x24 [ 704.520140][T12948] should_fail_ex+0x3d4/0x520 [ 704.524825][T12948] ? vm_area_dup+0x65/0x280 [ 704.529335][T12948] __should_failslab+0xac/0xf0 [ 704.534107][T12948] should_failslab+0x9/0x20 [ 704.538605][T12948] kmem_cache_alloc+0x3b/0x330 [ 704.543374][T12948] vm_area_dup+0x65/0x280 [ 704.547712][T12948] copy_mm+0xb45/0x1a10 [ 704.551876][T12948] ? copy_signal+0x630/0x630 [ 704.556478][T12948] ? _raw_spin_lock+0x8e/0xe0 [ 704.561169][T12948] ? __cfi__raw_spin_lock+0x10/0x10 [ 704.566371][T12948] ? __init_rwsem+0x12c/0x240 [ 704.571057][T12948] ? copy_signal+0x4ea/0x630 [ 704.575651][T12948] copy_process+0x12b4/0x3480 [ 704.580343][T12948] ? idle_dummy+0x10/0x10 [ 704.584693][T12948] kernel_clone+0x23a/0x810 [ 704.589201][T12948] ? __cfi_kernel_clone+0x10/0x10 [ 704.594233][T12948] ? __kasan_check_write+0x14/0x20 [ 704.599404][T12948] ? mutex_unlock+0x89/0x220 [ 704.604021][T12948] __x64_sys_clone+0x168/0x1b0 [ 704.608804][T12948] ? __cfi___x64_sys_clone+0x10/0x10 [ 704.614105][T12948] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 704.620183][T12948] x64_sys_call+0x990/0x9a0 [ 704.624693][T12948] do_syscall_64+0x4c/0xa0 [ 704.629107][T12948] ? clear_bhb_loop+0x30/0x80 [ 704.633791][T12948] ? clear_bhb_loop+0x30/0x80 [ 704.638470][T12948] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 704.644362][T12948] RIP: 0033:0x7fd204f8f749 [ 704.648772][T12948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 704.668378][T12948] RSP: 002b:00007fd205db0fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 704.676796][T12948] RAX: ffffffffffffffda RBX: 00007fd2051e5fa0 RCX: 00007fd204f8f749 [ 704.684767][T12948] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 704.692734][T12948] RBP: 00007fd205db1090 R08: 0000000000000000 R09: 0000000000000000 [ 704.700705][T12948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 704.708670][T12948] R13: 00007fd2051e6038 R14: 00007fd2051e5fa0 R15: 00007ffd9d642a28 [ 704.716646][T12948] [ 707.741199][T13049] FAULT_INJECTION: forcing a failure. [ 707.741199][T13049] name failslab, interval 1, probability 0, space 0, times 0 [ 707.755284][T13049] CPU: 0 PID: 13049 Comm: syz.2.4026 Not tainted syzkaller #0 [ 707.762759][T13049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 707.772828][T13049] Call Trace: [ 707.776106][T13049] [ 707.779044][T13049] __dump_stack+0x21/0x24 [ 707.783378][T13049] dump_stack_lvl+0xee/0x150 [ 707.787972][T13049] ? __cfi_dump_stack_lvl+0x8/0x8 [ 707.792994][T13049] ? kasan_save_alloc_info+0x25/0x30 [ 707.798286][T13049] ? kmalloc_trace+0x40/0xb0 [ 707.802875][T13049] ? alloc_perf_context+0x59/0x2e0 [ 707.807994][T13049] ? find_get_context+0x34c/0x9e0 [ 707.813024][T13049] ? __x64_sys_perf_event_open+0xbf/0xd0 [ 707.818666][T13049] dump_stack+0x15/0x24 [ 707.822825][T13049] should_fail_ex+0x3d4/0x520 [ 707.827506][T13049] __should_failslab+0xac/0xf0 [ 707.832270][T13049] should_failslab+0x9/0x20 [ 707.836772][T13049] slab_pre_alloc_hook+0x30/0x1e0 [ 707.841814][T13049] kmem_cache_alloc_lru+0x49/0x280 [ 707.846950][T13049] ? __d_alloc+0x34/0x6c0 [ 707.851284][T13049] __d_alloc+0x34/0x6c0 [ 707.855446][T13049] d_alloc_pseudo+0x1d/0x70 [ 707.859966][T13049] alloc_file_pseudo+0xc8/0x1f0 [ 707.864821][T13049] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 707.870277][T13049] ? alloc_perf_context+0x222/0x2e0 [ 707.875479][T13049] anon_inode_getfile+0xa6/0x180 [ 707.880416][T13049] __se_sys_perf_event_open+0xbd2/0x1b80 [ 707.886056][T13049] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 707.891692][T13049] ? __cfi_ksys_write+0x10/0x10 [ 707.896540][T13049] __x64_sys_perf_event_open+0xbf/0xd0 [ 707.902003][T13049] x64_sys_call+0x385/0x9a0 [ 707.906504][T13049] do_syscall_64+0x4c/0xa0 [ 707.910952][T13049] ? clear_bhb_loop+0x30/0x80 [ 707.915633][T13049] ? clear_bhb_loop+0x30/0x80 [ 707.920322][T13049] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 707.926223][T13049] RIP: 0033:0x7fd204f8f749 [ 707.930633][T13049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 707.950241][T13049] RSP: 002b:00007fd205db1038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 707.958664][T13049] RAX: ffffffffffffffda RBX: 00007fd2051e5fa0 RCX: 00007fd204f8f749 [ 707.966640][T13049] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000480 [ 707.974613][T13049] RBP: 00007fd205db1090 R08: 0000000000000000 R09: 0000000000000000 [ 707.982582][T13049] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 707.990548][T13049] R13: 00007fd2051e6038 R14: 00007fd2051e5fa0 R15: 00007ffd9d642a28 [ 707.998524][T13049] [ 710.184804][T13131] device syzkaller0 entered promiscuous mode [ 710.281895][T13130] device sit0 left promiscuous mode [ 710.851572][ T28] audit: type=1400 audit(1763624478.601:152): avc: denied { ioctl } for pid=13145 comm="syz.2.4063" path="pid:[4026532453]" dev="nsfs" ino=4026532453 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 710.981194][T13156] FAULT_INJECTION: forcing a failure. [ 710.981194][T13156] name failslab, interval 1, probability 0, space 0, times 0 [ 711.090331][T13156] CPU: 1 PID: 13156 Comm: syz.3.4066 Not tainted syzkaller #0 [ 711.097846][T13156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 711.107909][T13156] Call Trace: [ 711.111197][T13156] [ 711.114136][T13156] __dump_stack+0x21/0x24 [ 711.118475][T13156] dump_stack_lvl+0xee/0x150 [ 711.123074][T13156] ? __cfi_dump_stack_lvl+0x8/0x8 [ 711.128099][T13156] ? __kasan_check_write+0x14/0x20 [ 711.133215][T13156] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 711.138672][T13156] dump_stack+0x15/0x24 [ 711.142823][T13156] should_fail_ex+0x3d4/0x520 [ 711.147489][T13156] __should_failslab+0xac/0xf0 [ 711.152244][T13156] ? kvmalloc_node+0x294/0x480 [ 711.156994][T13156] should_failslab+0x9/0x20 [ 711.161483][T13156] __kmem_cache_alloc_node+0x3d/0x2c0 [ 711.166854][T13156] ? kvmalloc_node+0x294/0x480 [ 711.171603][T13156] __kmalloc_node+0xa1/0x1e0 [ 711.176184][T13156] kvmalloc_node+0x294/0x480 [ 711.180756][T13156] ? __cfi_kvmalloc_node+0x10/0x10 [ 711.185864][T13156] alloc_netdev_mqs+0x8d/0xf90 [ 711.190615][T13156] ? __cfi_ip6_tnl_dev_setup+0x10/0x10 [ 711.196064][T13156] ? dev_valid_name+0x227/0x310 [ 711.200903][T13156] ? ip6_tnl_locate+0x5a1/0x790 [ 711.205744][T13156] ip6_tnl_locate+0x604/0x790 [ 711.210410][T13156] ? cap_capable+0x1aa/0x230 [ 711.214993][T13156] ? ip6_tnl_link_config+0xa00/0xa00 [ 711.220270][T13156] ? memcpy+0x56/0x70 [ 711.224239][T13156] ip6_tnl_siocdevprivate+0x696/0xe30 [ 711.229602][T13156] ? __cfi_ip6_tnl_siocdevprivate+0x10/0x10 [ 711.235691][T13156] ? full_name_hash+0x9d/0xf0 [ 711.240359][T13156] dev_ifsioc+0xbc4/0xed0 [ 711.244688][T13156] ? ioctl_has_perm+0x391/0x4c0 [ 711.249531][T13156] ? dev_ioctl+0xd10/0xd10 [ 711.253937][T13156] ? __kasan_check_write+0x14/0x20 [ 711.259034][T13156] ? mutex_lock+0x8d/0x1a0 [ 711.263438][T13156] ? __cfi_mutex_lock+0x10/0x10 [ 711.268280][T13156] ? dev_get_by_name_rcu+0xe5/0x130 [ 711.273478][T13156] dev_ioctl+0x5f3/0xd10 [ 711.277719][T13156] sock_ioctl+0x675/0x6e0 [ 711.282044][T13156] ? __cfi_sock_ioctl+0x10/0x10 [ 711.286885][T13156] ? security_file_ioctl+0x95/0xc0 [ 711.291994][T13156] ? __cfi_sock_ioctl+0x10/0x10 [ 711.296853][T13156] __se_sys_ioctl+0x12f/0x1b0 [ 711.301531][T13156] __x64_sys_ioctl+0x7b/0x90 [ 711.306228][T13156] x64_sys_call+0x58b/0x9a0 [ 711.310740][T13156] do_syscall_64+0x4c/0xa0 [ 711.315150][T13156] ? clear_bhb_loop+0x30/0x80 [ 711.319830][T13156] ? clear_bhb_loop+0x30/0x80 [ 711.324662][T13156] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 711.330586][T13156] RIP: 0033:0x7f4d06f8f749 [ 711.334995][T13156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 711.354637][T13156] RSP: 002b:00007f4d07ec6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 711.363047][T13156] RAX: ffffffffffffffda RBX: 00007f4d071e5fa0 RCX: 00007f4d06f8f749 [ 711.371015][T13156] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000007 [ 711.378983][T13156] RBP: 00007f4d07ec6090 R08: 0000000000000000 R09: 0000000000000000 [ 711.386944][T13156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 711.394906][T13156] R13: 00007f4d071e6038 R14: 00007f4d071e5fa0 R15: 00007ffdc5c43388 [ 711.402876][T13156] [ 711.818413][T13174] ref_ctr_offset mismatch. inode: 0x44a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 711.859462][T13172] GPL: port 1(erspan0) entered blocking state [ 711.865949][T13172] GPL: port 1(erspan0) entered disabled state [ 711.883048][T13172] device erspan0 entered promiscuous mode [ 712.435039][T13196] FAULT_INJECTION: forcing a failure. [ 712.435039][T13196] name failslab, interval 1, probability 0, space 0, times 0 [ 712.629197][T13196] CPU: 1 PID: 13196 Comm: syz.2.4076 Not tainted syzkaller #0 [ 712.636702][T13196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 712.646774][T13196] Call Trace: [ 712.650058][T13196] [ 712.653080][T13196] __dump_stack+0x21/0x24 [ 712.657416][T13196] dump_stack_lvl+0xee/0x150 [ 712.662007][T13196] ? __cfi_dump_stack_lvl+0x8/0x8 [ 712.667034][T13196] dump_stack+0x15/0x24 [ 712.671196][T13196] should_fail_ex+0x3d4/0x520 [ 712.675882][T13196] __should_failslab+0xac/0xf0 [ 712.680652][T13196] should_failslab+0x9/0x20 [ 712.685153][T13196] kmem_cache_alloc_node+0x42/0x340 [ 712.690350][T13196] ? __alloc_skb+0xea/0x4b0 [ 712.694861][T13196] __alloc_skb+0xea/0x4b0 [ 712.699194][T13196] ppp_write+0xb6/0x3b0 [ 712.703363][T13196] ? security_file_permission+0x94/0xb0 [ 712.708920][T13196] ? __cfi_ppp_write+0x10/0x10 [ 712.713701][T13196] vfs_write+0x40c/0xca0 [ 712.717950][T13196] ? slab_free_freelist_hook+0xc2/0x190 [ 712.723508][T13196] ? __cfi_vfs_write+0x10/0x10 [ 712.728280][T13196] ? __fget_files+0x2d5/0x330 [ 712.732965][T13196] ? __fdget_pos+0x1f2/0x380 [ 712.737570][T13196] ? ksys_write+0x71/0x240 [ 712.741991][T13196] ksys_write+0x140/0x240 [ 712.746327][T13196] ? __cfi_ksys_write+0x10/0x10 [ 712.751178][T13196] ? debug_smp_processor_id+0x17/0x20 [ 712.756555][T13196] __x64_sys_write+0x7b/0x90 [ 712.761146][T13196] x64_sys_call+0x27b/0x9a0 [ 712.765651][T13196] do_syscall_64+0x4c/0xa0 [ 712.770085][T13196] ? clear_bhb_loop+0x30/0x80 [ 712.774771][T13196] ? clear_bhb_loop+0x30/0x80 [ 712.779506][T13196] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 712.785402][T13196] RIP: 0033:0x7fd204f8f749 [ 712.789827][T13196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 712.809522][T13196] RSP: 002b:00007fd205d90038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 712.817942][T13196] RAX: ffffffffffffffda RBX: 00007fd2051e6090 RCX: 00007fd204f8f749 [ 712.825918][T13196] RDX: 000000000000000a RSI: 0000200000000080 RDI: 0000000000000006 [ 712.833897][T13196] RBP: 00007fd205d90090 R08: 0000000000000000 R09: 0000000000000000 [ 712.841870][T13196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 712.849845][T13196] R13: 00007fd2051e6128 R14: 00007fd2051e6090 R15: 00007ffd9d642a28 [ 712.857915][T13196] [ 712.934551][T13203] device sit0 left promiscuous mode [ 713.005589][T13203] device sit0 entered promiscuous mode [ 716.885264][T13238] device sit0 left promiscuous mode [ 716.906599][T13242] device sit0 entered promiscuous mode [ 716.965974][T13255] tap0: tun_chr_ioctl cmd 1074025681 [ 717.008842][T13270] FAULT_INJECTION: forcing a failure. [ 717.008842][T13270] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 717.021938][T13270] CPU: 1 PID: 13270 Comm: syz.1.4104 Not tainted syzkaller #0 [ 717.029406][T13270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 717.039463][T13270] Call Trace: [ 717.042742][T13270] [ 717.045666][T13270] __dump_stack+0x21/0x24 [ 717.049996][T13270] dump_stack_lvl+0xee/0x150 [ 717.054582][T13270] ? __cfi_dump_stack_lvl+0x8/0x8 [ 717.059602][T13270] ? __kasan_check_write+0x14/0x20 [ 717.064710][T13270] ? _raw_spin_lock_irq+0x8f/0xe0 [ 717.069731][T13270] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 717.075280][T13270] dump_stack+0x15/0x24 [ 717.079437][T13270] should_fail_ex+0x3d4/0x520 [ 717.084113][T13270] should_fail+0xb/0x10 [ 717.088269][T13270] should_fail_usercopy+0x1a/0x20 [ 717.093294][T13270] copy_page_from_iter_atomic+0x35c/0x1210 [ 717.099102][T13270] ? __cfi_copy_page_from_iter_atomic+0x10/0x10 [ 717.105343][T13270] ? __kasan_check_read+0x11/0x20 [ 717.110362][T13270] ? shmem_write_begin+0x151/0x2c0 [ 717.115471][T13270] generic_perform_write+0x348/0x6d0 [ 717.120754][T13270] ? file_update_time+0x2dd/0x340 [ 717.125781][T13270] ? __cfi_generic_perform_write+0x10/0x10 [ 717.131589][T13270] ? __cfi_file_update_time+0x10/0x10 [ 717.136969][T13270] __generic_file_write_iter+0x227/0x580 [ 717.142601][T13270] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 717.148321][T13270] ? __cfi___generic_file_write_iter+0x10/0x10 [ 717.154470][T13270] ? rwsem_write_trylock+0x130/0x300 [ 717.159746][T13270] ? generic_write_checks_count+0x3c6/0x4a0 [ 717.165624][T13270] ? generic_write_checks+0xca/0x100 [ 717.170893][T13270] generic_file_write_iter+0xae/0x310 [ 717.176268][T13270] vfs_write+0x5db/0xca0 [ 717.180495][T13270] ? slab_free_freelist_hook+0xc2/0x190 [ 717.186029][T13270] ? __cfi_vfs_write+0x10/0x10 [ 717.190778][T13270] ? __cfi_mutex_lock+0x10/0x10 [ 717.195614][T13270] ? __fdget_pos+0x2cd/0x380 [ 717.200182][T13270] ? ksys_write+0x71/0x240 [ 717.204580][T13270] ksys_write+0x140/0x240 [ 717.208893][T13270] ? __cfi_ksys_write+0x10/0x10 [ 717.213723][T13270] ? debug_smp_processor_id+0x17/0x20 [ 717.219076][T13270] __x64_sys_write+0x7b/0x90 [ 717.223647][T13270] x64_sys_call+0x27b/0x9a0 [ 717.228136][T13270] do_syscall_64+0x4c/0xa0 [ 717.232536][T13270] ? clear_bhb_loop+0x30/0x80 [ 717.237198][T13270] ? clear_bhb_loop+0x30/0x80 [ 717.241859][T13270] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 717.247735][T13270] RIP: 0033:0x7fb204b8f749 [ 717.252136][T13270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 717.271722][T13270] RSP: 002b:00007fb205af7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 717.280120][T13270] RAX: ffffffffffffffda RBX: 00007fb204de5fa0 RCX: 00007fb204b8f749 [ 717.288071][T13270] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000007 [ 717.296022][T13270] RBP: 00007fb205af7090 R08: 0000000000000000 R09: 0000000000000000 [ 717.303973][T13270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 717.311927][T13270] R13: 00007fb204de6038 R14: 00007fb204de5fa0 R15: 00007ffdb3d53208 [ 717.319886][T13270] [ 717.832760][T13299] FAULT_INJECTION: forcing a failure. [ 717.832760][T13299] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 717.923623][T13299] CPU: 0 PID: 13299 Comm: syz.0.4116 Not tainted syzkaller #0 [ 717.931121][T13299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 717.941171][T13299] Call Trace: [ 717.944442][T13299] [ 717.947364][T13299] __dump_stack+0x21/0x24 [ 717.951693][T13299] dump_stack_lvl+0xee/0x150 [ 717.956278][T13299] ? __cfi_dump_stack_lvl+0x8/0x8 [ 717.961296][T13299] dump_stack+0x15/0x24 [ 717.965444][T13299] should_fail_ex+0x3d4/0x520 [ 717.970121][T13299] should_fail_alloc_page+0x61/0x90 [ 717.975317][T13299] prepare_alloc_pages+0x148/0x5f0 [ 717.980425][T13299] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 717.985626][T13299] __alloc_pages+0x124/0x450 [ 717.990213][T13299] ? __cfi___alloc_pages+0x10/0x10 [ 717.995324][T13299] ? percpu_counter_add_batch+0x13c/0x160 [ 718.001040][T13299] __folio_alloc+0x12/0x40 [ 718.005454][T13299] shmem_alloc_and_acct_folio+0x650/0x870 [ 718.011171][T13299] ? shmem_replace_folio+0x590/0x590 [ 718.016456][T13299] ? xas_load+0x390/0x3b0 [ 718.020784][T13299] ? __filemap_get_folio+0x93e/0x980 [ 718.026066][T13299] ? __cfi___filemap_get_folio+0x10/0x10 [ 718.031701][T13299] ? do_user_addr_fault+0x9ac/0x1050 [ 718.036986][T13299] shmem_get_folio_gfp+0x119f/0x2230 [ 718.042273][T13299] shmem_write_begin+0xea/0x2c0 [ 718.047123][T13299] generic_perform_write+0x2f6/0x6d0 [ 718.052410][T13299] ? file_update_time+0x2dd/0x340 [ 718.057436][T13299] ? __cfi_generic_perform_write+0x10/0x10 [ 718.063240][T13299] ? __cfi_file_update_time+0x10/0x10 [ 718.068611][T13299] __generic_file_write_iter+0x227/0x580 [ 718.074249][T13299] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 718.079970][T13299] ? __cfi___generic_file_write_iter+0x10/0x10 [ 718.086121][T13299] ? rwsem_write_trylock+0x130/0x300 [ 718.091408][T13299] ? generic_write_checks_count+0x3c6/0x4a0 [ 718.097304][T13299] ? generic_write_checks+0xca/0x100 [ 718.102585][T13299] generic_file_write_iter+0xae/0x310 [ 718.107956][T13299] vfs_write+0x5db/0xca0 [ 718.112199][T13299] ? slab_free_freelist_hook+0xc2/0x190 [ 718.117750][T13299] ? __cfi_vfs_write+0x10/0x10 [ 718.122514][T13299] ? __cfi_mutex_lock+0x10/0x10 [ 718.127362][T13299] ? __fdget_pos+0x2cd/0x380 [ 718.131945][T13299] ? ksys_write+0x71/0x240 [ 718.136358][T13299] ksys_write+0x140/0x240 [ 718.140687][T13299] ? __cfi_ksys_write+0x10/0x10 [ 718.145532][T13299] ? debug_smp_processor_id+0x17/0x20 [ 718.150898][T13299] __x64_sys_write+0x7b/0x90 [ 718.155486][T13299] x64_sys_call+0x27b/0x9a0 [ 718.159992][T13299] do_syscall_64+0x4c/0xa0 [ 718.164401][T13299] ? clear_bhb_loop+0x30/0x80 [ 718.169075][T13299] ? clear_bhb_loop+0x30/0x80 [ 718.173754][T13299] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 718.179647][T13299] RIP: 0033:0x7f6d3518f749 [ 718.184061][T13299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 718.203666][T13299] RSP: 002b:00007f6d360bf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 718.212093][T13299] RAX: ffffffffffffffda RBX: 00007f6d353e5fa0 RCX: 00007f6d3518f749 [ 718.220068][T13299] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000007 [ 718.228042][T13299] RBP: 00007f6d360bf090 R08: 0000000000000000 R09: 0000000000000000 [ 718.236012][T13299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 718.243993][T13299] R13: 00007f6d353e6038 R14: 00007f6d353e5fa0 R15: 00007ffcfb7c5248 [ 718.251969][T13299] [ 719.145232][T13319] device syzkaller0 entered promiscuous mode [ 720.493345][ T385] device erspan0 left promiscuous mode [ 720.508349][ T385] GPL: port 1(erspan0) entered disabled state [ 720.633632][ T385] device gretap0 left promiscuous mode [ 720.693552][ T385] bridge0: port 3(gretap0) entered disabled state [ 720.888964][ T385] device bridge_slave_1 left promiscuous mode [ 720.895187][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 720.978384][ T385] device bridge_slave_0 left promiscuous mode [ 720.988084][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 721.003183][ T385] device veth0_vlan left promiscuous mode [ 721.197020][T13372] device syzkaller0 entered promiscuous mode [ 721.273157][ T40] syzkaller0: tun_net_xmit 48 [ 721.291924][T13367] syzkaller0: create flow: hash 894911989 index 1 [ 721.418435][T13366] syzkaller0: delete flow: hash 894911989 index 1 [ 721.583523][T13348] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.600027][T13348] bridge0: port 1(bridge_slave_0) entered disabled state [ 721.607521][T13348] device bridge_slave_0 entered promiscuous mode [ 721.619488][T13348] bridge0: port 2(bridge_slave_1) entered blocking state [ 721.626602][T13348] bridge0: port 2(bridge_slave_1) entered disabled state [ 721.634158][T13348] device bridge_slave_1 entered promiscuous mode [ 722.261161][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 722.299461][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 722.374415][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 722.426320][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 722.506968][ T385] bridge0: port 1(bridge_slave_0) entered blocking state [ 722.514079][ T385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 722.533761][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 722.558384][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 722.569511][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 722.578009][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 722.585073][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 722.615517][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 722.668262][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 722.709225][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 722.722605][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 722.731398][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 722.739676][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 722.754703][T13348] device veth0_vlan entered promiscuous mode [ 722.787775][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 722.800743][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 722.827083][T13348] device veth1_macvtap entered promiscuous mode [ 722.894271][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 722.905295][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 722.951083][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 722.997928][T13437] tap0: tun_chr_ioctl cmd 1074025681 [ 723.011729][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 723.020222][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 723.183534][T13459] syz.0.4168[13459] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 723.183630][T13459] syz.0.4168[13459] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 724.074114][T13479] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.096706][T13479] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.128674][T13479] device bridge_slave_0 entered promiscuous mode [ 724.176527][T13479] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.183846][T13479] bridge0: port 2(bridge_slave_1) entered disabled state [ 724.191637][T13479] device bridge_slave_1 entered promiscuous mode [ 724.430749][ T385] device bridge_slave_1 left promiscuous mode [ 724.437132][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 724.445016][ T385] device bridge_slave_0 left promiscuous mode [ 724.451559][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.460413][ T385] device veth1_macvtap left promiscuous mode [ 724.466619][ T385] device veth0_vlan left promiscuous mode [ 724.797937][T13479] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.805034][T13479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 724.812336][T13479] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.819373][T13479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 724.961152][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.972894][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 725.151184][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 725.182022][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 725.199510][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 725.219695][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 725.228021][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 725.235079][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 725.383257][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 725.470645][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 725.513638][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 725.520735][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 725.581549][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 725.647318][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 725.710503][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 725.781403][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 725.848530][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 725.913753][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 725.975589][T13479] device veth0_vlan entered promiscuous mode [ 726.051230][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 726.069408][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 726.120822][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 726.138763][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 726.149252][T13479] device veth1_macvtap entered promiscuous mode [ 726.155957][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 726.224839][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 726.255542][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 726.292719][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 726.307546][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 726.329359][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 726.337729][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 726.806953][T13531] bridge0: port 1(bridge_slave_0) entered blocking state [ 726.820355][T13531] bridge0: port 1(bridge_slave_0) entered disabled state [ 726.837407][T13531] device bridge_slave_0 entered promiscuous mode [ 726.847394][T13531] bridge0: port 2(bridge_slave_1) entered blocking state [ 726.865514][T13531] bridge0: port 2(bridge_slave_1) entered disabled state [ 726.882272][T13531] device bridge_slave_1 entered promiscuous mode [ 727.258733][ T385] device bridge_slave_1 left promiscuous mode [ 727.264876][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 727.343089][ T385] device bridge_slave_0 left promiscuous mode [ 727.391055][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 727.451575][ T385] device veth1_macvtap left promiscuous mode [ 727.477054][ T385] device veth0_vlan left promiscuous mode [ 727.980165][T13564] FAULT_INJECTION: forcing a failure. [ 727.980165][T13564] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 728.006302][T13564] CPU: 1 PID: 13564 Comm: syz.0.4199 Not tainted syzkaller #0 [ 728.013795][T13564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 728.023854][T13564] Call Trace: [ 728.027142][T13564] [ 728.030078][T13564] __dump_stack+0x21/0x24 [ 728.034417][T13564] dump_stack_lvl+0xee/0x150 [ 728.039013][T13564] ? __cfi_dump_stack_lvl+0x8/0x8 [ 728.044041][T13564] ? migrate_enable+0x19c/0x280 [ 728.048893][T13564] dump_stack+0x15/0x24 [ 728.053050][T13564] should_fail_ex+0x3d4/0x520 [ 728.057730][T13564] should_fail+0xb/0x10 [ 728.061877][T13564] should_fail_usercopy+0x1a/0x20 [ 728.066887][T13564] _copy_from_user+0x1e/0xc0 [ 728.071459][T13564] generic_map_update_batch+0x4b1/0x780 [ 728.077022][T13564] ? __cfi_generic_map_update_batch+0x10/0x10 [ 728.083074][T13564] ? __fdget+0x19c/0x220 [ 728.087298][T13564] ? __cfi_generic_map_update_batch+0x10/0x10 [ 728.093344][T13564] bpf_map_do_batch+0x48c/0x620 [ 728.098178][T13564] __sys_bpf+0x624/0x780 [ 728.102401][T13564] ? bpf_link_show_fdinfo+0x320/0x320 [ 728.107755][T13564] ? __cfi_sched_clock_cpu+0x10/0x10 [ 728.113023][T13564] __x64_sys_bpf+0x7c/0x90 [ 728.117427][T13564] x64_sys_call+0x488/0x9a0 [ 728.121912][T13564] do_syscall_64+0x4c/0xa0 [ 728.126338][T13564] ? clear_bhb_loop+0x30/0x80 [ 728.131007][T13564] ? clear_bhb_loop+0x30/0x80 [ 728.135672][T13564] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 728.141547][T13564] RIP: 0033:0x7f6d3518f749 [ 728.145942][T13564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 728.165528][T13564] RSP: 002b:00007f6d360bf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 728.173926][T13564] RAX: ffffffffffffffda RBX: 00007f6d353e5fa0 RCX: 00007f6d3518f749 [ 728.181877][T13564] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 728.189831][T13564] RBP: 00007f6d360bf090 R08: 0000000000000000 R09: 0000000000000000 [ 728.197782][T13564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 728.205730][T13564] R13: 00007f6d353e6038 R14: 00007f6d353e5fa0 R15: 00007ffcfb7c5248 [ 728.213684][T13564] [ 728.221027][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 728.230229][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 728.252001][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 728.269757][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 728.320189][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 728.327248][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 728.334818][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 728.343242][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 728.351768][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 728.358827][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 728.388910][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 728.396861][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 728.427007][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 728.435270][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 728.448680][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 728.463234][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 728.490457][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 728.500930][T13531] device veth0_vlan entered promiscuous mode [ 728.508250][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 728.516251][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 728.534214][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 728.544475][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 728.610438][T13531] device veth1_macvtap entered promiscuous mode [ 728.620381][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 728.629948][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 728.639284][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 728.650131][T13589] device macsec0 left promiscuous mode [ 728.671637][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 728.683236][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 728.696637][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 728.707158][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 729.938718][ T334] device bridge_slave_1 left promiscuous mode [ 729.944885][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 730.044738][ T334] device bridge_slave_0 left promiscuous mode [ 730.117159][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 730.229193][ T334] device veth1_macvtap left promiscuous mode [ 730.258712][ T334] device veth0_vlan left promiscuous mode [ 731.151141][T13619] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.160427][T13619] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.171259][T13619] device bridge_slave_0 entered promiscuous mode [ 731.191018][T13619] bridge0: port 2(bridge_slave_1) entered blocking state [ 731.205648][T13619] bridge0: port 2(bridge_slave_1) entered disabled state [ 731.229839][T13619] device bridge_slave_1 entered promiscuous mode [ 731.601545][T13619] bridge0: port 2(bridge_slave_1) entered blocking state [ 731.608663][T13619] bridge0: port 2(bridge_slave_1) entered forwarding state [ 731.615977][T13619] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.623044][T13619] bridge0: port 1(bridge_slave_0) entered forwarding state [ 731.811283][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.869541][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 731.900341][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 731.918641][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 731.944305][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 731.968579][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 731.996071][ T2737] bridge0: port 1(bridge_slave_0) entered blocking state [ 732.003178][ T2737] bridge0: port 1(bridge_slave_0) entered forwarding state [ 732.110893][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 732.124895][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 732.204445][ T2737] bridge0: port 2(bridge_slave_1) entered blocking state [ 732.211555][ T2737] bridge0: port 2(bridge_slave_1) entered forwarding state [ 732.317591][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 732.354853][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 732.410743][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 732.431408][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 732.556435][T13696] device syzkaller0 entered promiscuous mode [ 732.644727][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 732.675491][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 732.766307][T13619] device veth0_vlan entered promiscuous mode [ 732.827876][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 732.882391][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 732.910841][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 732.926874][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 732.967127][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 732.998582][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 733.105504][T13619] device veth1_macvtap entered promiscuous mode [ 733.182737][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 733.218770][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 733.228509][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 733.247459][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 733.256465][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 733.417390][T13719] device sit0 entered promiscuous mode [ 734.910543][T13740] device macsec0 entered promiscuous mode [ 735.222489][T13748] device sit0 left promiscuous mode [ 735.296282][T13748] device sit0 entered promiscuous mode [ 735.752683][T13757] bridge0: port 1(bridge_slave_0) entered blocking state [ 735.764433][T13757] bridge0: port 1(bridge_slave_0) entered disabled state [ 735.772383][T13757] device bridge_slave_0 entered promiscuous mode [ 736.027805][T13757] bridge0: port 2(bridge_slave_1) entered blocking state [ 736.050361][T13757] bridge0: port 2(bridge_slave_1) entered disabled state [ 736.158033][T13757] device bridge_slave_1 entered promiscuous mode [ 736.470148][ T692] device bridge_slave_1 left promiscuous mode [ 736.476296][ T692] bridge0: port 2(bridge_slave_1) entered disabled state [ 736.534923][ T692] device bridge_slave_0 left promiscuous mode [ 736.563303][ T692] bridge0: port 1(bridge_slave_0) entered disabled state [ 736.579513][ T692] device veth1_macvtap left promiscuous mode [ 736.591868][ T692] device veth0_vlan left promiscuous mode [ 737.598276][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 737.605754][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 738.038771][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 738.048671][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 738.057499][T13715] bridge0: port 1(bridge_slave_0) entered blocking state [ 738.064583][T13715] bridge0: port 1(bridge_slave_0) entered forwarding state [ 738.145658][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 738.228527][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 738.252705][T13715] bridge0: port 2(bridge_slave_1) entered blocking state [ 738.259794][T13715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 738.280238][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 738.404792][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 738.430955][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 738.459760][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 738.505899][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 738.667742][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 738.676283][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 738.741729][T13757] device veth0_vlan entered promiscuous mode [ 738.769119][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 738.778877][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 738.802287][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 738.814490][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 739.029112][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 739.037587][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 739.050101][T13876] kfree: port 1(veth0) entered blocking state [ 739.056279][T13876] kfree: port 1(veth0) entered disabled state [ 739.075733][T13876] device veth0 entered promiscuous mode [ 739.089095][T13757] device veth1_macvtap entered promiscuous mode [ 739.216738][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 739.248724][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 739.311405][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 739.427697][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 739.483093][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 740.623877][ T692] device bridge_slave_1 left promiscuous mode [ 740.671927][ T692] bridge0: port 2(bridge_slave_1) entered disabled state [ 740.738478][ T692] device bridge_slave_0 left promiscuous mode [ 740.744739][ T692] bridge0: port 1(bridge_slave_0) entered disabled state [ 740.791624][ T692] device veth1_macvtap left promiscuous mode [ 740.797765][ T692] device veth0_vlan left promiscuous mode [ 741.045559][T13910] device wg2 left promiscuous mode [ 741.533591][T13909] bridge0: port 1(bridge_slave_0) entered blocking state [ 741.567174][T13909] bridge0: port 1(bridge_slave_0) entered disabled state [ 741.583872][T13909] device bridge_slave_0 entered promiscuous mode [ 741.697853][T13930] device pim6reg1 entered promiscuous mode [ 741.710031][T13909] bridge0: port 2(bridge_slave_1) entered blocking state [ 741.718596][T13909] bridge0: port 2(bridge_slave_1) entered disabled state [ 741.734820][T13909] device bridge_slave_1 entered promiscuous mode [ 741.807182][T13933] FAULT_INJECTION: forcing a failure. [ 741.807182][T13933] name failslab, interval 1, probability 0, space 0, times 0 [ 741.819852][T13933] CPU: 0 PID: 13933 Comm: syz.1.4316 Not tainted syzkaller #0 [ 741.827311][T13933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 741.837358][T13933] Call Trace: [ 741.840638][T13933] [ 741.843568][T13933] __dump_stack+0x21/0x24 [ 741.847903][T13933] dump_stack_lvl+0xee/0x150 [ 741.852511][T13933] ? __cfi_dump_stack_lvl+0x8/0x8 [ 741.857534][T13933] ? kasan_set_track+0x60/0x70 [ 741.862295][T13933] ? kasan_save_alloc_info+0x25/0x30 [ 741.867579][T13933] ? __kasan_slab_alloc+0x72/0x80 [ 741.872601][T13933] ? slab_post_alloc_hook+0x4f/0x2d0 [ 741.877889][T13933] ? kmem_cache_alloc+0x16e/0x330 [ 741.882910][T13933] dump_stack+0x15/0x24 [ 741.887063][T13933] should_fail_ex+0x3d4/0x520 [ 741.891750][T13933] __should_failslab+0xac/0xf0 [ 741.896512][T13933] ? ref_tracker_alloc+0x139/0x430 [ 741.901617][T13933] should_failslab+0x9/0x20 [ 741.906126][T13933] __kmem_cache_alloc_node+0x3d/0x2c0 [ 741.911513][T13933] ? ref_tracker_alloc+0x139/0x430 [ 741.916632][T13933] kmalloc_trace+0x29/0xb0 [ 741.921046][T13933] ref_tracker_alloc+0x139/0x430 [ 741.925974][T13933] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 741.931427][T13933] ? slab_post_alloc_hook+0x6d/0x2d0 [ 741.936711][T13933] ? dst_alloc+0x16a/0x1e0 [ 741.941123][T13933] dst_init+0xc4/0x3d0 [ 741.945187][T13933] dst_alloc+0x191/0x1e0 [ 741.949423][T13933] ip_route_output_key_hash_rcu+0x1300/0x2030 [ 741.955489][T13933] ip_route_output_key_hash+0x131/0x1e0 [ 741.961038][T13933] ? __cfi_ip_route_output_key_hash+0x10/0x10 [ 741.967104][T13933] ? 0xffffffffa0003764 [ 741.971248][T13933] vti6_tnl_xmit+0xd9c/0x1980 [ 741.975923][T13933] ? __cfi_vti6_tnl_xmit+0x10/0x10 [ 741.981030][T13933] dev_hard_start_xmit+0x20b/0x750 [ 741.986142][T13933] __dev_queue_xmit+0x18d9/0x3420 [ 741.991165][T13933] ? __dev_queue_xmit+0x250/0x3420 [ 741.996275][T13933] ? __cfi___dev_queue_xmit+0x10/0x10 [ 742.001651][T13933] ? __kasan_check_write+0x14/0x20 [ 742.006755][T13933] ? skb_release_data+0x1d2/0x890 [ 742.011775][T13933] ? skb_ensure_writable+0x2f8/0x470 [ 742.017069][T13933] ? __kasan_check_write+0x14/0x20 [ 742.022183][T13933] ? pskb_expand_head+0xc4a/0x1210 [ 742.027299][T13933] __bpf_redirect+0x8db/0x1130 [ 742.032056][T13933] bpf_clone_redirect+0x26a/0x3c0 [ 742.037077][T13933] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 742.042530][T13933] ? kasan_set_track+0x60/0x70 [ 742.047288][T13933] ? kasan_set_track+0x4b/0x70 [ 742.052046][T13933] ? kasan_save_alloc_info+0x25/0x30 [ 742.057326][T13933] ? __kasan_slab_alloc+0x72/0x80 [ 742.062343][T13933] ? slab_post_alloc_hook+0x4f/0x2d0 [ 742.067626][T13933] ? kmem_cache_alloc+0x16e/0x330 [ 742.072659][T13933] ? build_skb+0x2a/0x220 [ 742.076981][T13933] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 742.082525][T13933] ? bpf_prog_test_run+0x3e3/0x630 [ 742.087638][T13933] ? __sys_bpf+0x56d/0x780 [ 742.092045][T13933] ? __x64_sys_bpf+0x7c/0x90 [ 742.096638][T13933] ? x64_sys_call+0x488/0x9a0 [ 742.101310][T13933] ? do_syscall_64+0x4c/0xa0 [ 742.105895][T13933] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 742.111964][T13933] ? __kasan_check_read+0x11/0x20 [ 742.116983][T13933] ? bpf_test_timer_continue+0x147/0x4a0 [ 742.122614][T13933] bpf_test_run+0x349/0x8d0 [ 742.127128][T13933] ? __kasan_slab_alloc+0x72/0x80 [ 742.132148][T13933] ? convert___skb_to_skb+0x5b0/0x5b0 [ 742.137523][T13933] ? __cfi_eth_type_trans+0x10/0x10 [ 742.142729][T13933] ? convert___skb_to_skb+0x40/0x5b0 [ 742.148017][T13933] bpf_prog_test_run_skb+0xaec/0x1290 [ 742.153390][T13933] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 742.159183][T13933] bpf_prog_test_run+0x3e3/0x630 [ 742.164101][T13933] ? slab_free_freelist_hook+0xc2/0x190 [ 742.169633][T13933] ? bpf_prog_query+0x270/0x270 [ 742.174465][T13933] ? selinux_bpf+0xce/0xf0 [ 742.178864][T13933] ? security_bpf+0x93/0xb0 [ 742.183349][T13933] __sys_bpf+0x56d/0x780 [ 742.187568][T13933] ? bpf_link_show_fdinfo+0x320/0x320 [ 742.192920][T13933] ? __cfi_ksys_write+0x10/0x10 [ 742.197748][T13933] ? debug_smp_processor_id+0x17/0x20 [ 742.203096][T13933] __x64_sys_bpf+0x7c/0x90 [ 742.207494][T13933] x64_sys_call+0x488/0x9a0 [ 742.211976][T13933] do_syscall_64+0x4c/0xa0 [ 742.216370][T13933] ? clear_bhb_loop+0x30/0x80 [ 742.221036][T13933] ? clear_bhb_loop+0x30/0x80 [ 742.225693][T13933] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 742.231567][T13933] RIP: 0033:0x7fb204b8f749 [ 742.235960][T13933] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 742.255544][T13933] RSP: 002b:00007fb205af7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 742.263936][T13933] RAX: ffffffffffffffda RBX: 00007fb204de5fa0 RCX: 00007fb204b8f749 [ 742.271887][T13933] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 742.279834][T13933] RBP: 00007fb205af7090 R08: 0000000000000000 R09: 0000000000000000 [ 742.287783][T13933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 742.295730][T13933] R13: 00007fb204de6038 R14: 00007fb204de5fa0 R15: 00007ffdb3d53208 [ 742.303683][T13933] [ 743.323857][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 743.413861][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 743.501571][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 743.562514][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 743.590700][T13715] bridge0: port 1(bridge_slave_0) entered blocking state [ 743.597773][T13715] bridge0: port 1(bridge_slave_0) entered forwarding state [ 743.605262][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 743.619454][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 743.643703][T13715] bridge0: port 2(bridge_slave_1) entered blocking state [ 743.650806][T13715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 743.658484][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 743.707340][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 743.729858][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 743.925422][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 744.074860][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 744.167274][T13909] device veth0_vlan entered promiscuous mode [ 744.309022][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 744.348911][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 744.438829][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 744.447866][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 744.469777][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 744.484349][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 744.529637][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 744.593689][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 744.631262][T13909] device veth1_macvtap entered promiscuous mode [ 744.697657][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 744.728412][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 744.751228][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 744.877970][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 744.932345][T13715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 746.068827][T13715] device bridge_slave_1 left promiscuous mode [ 746.074981][T13715] bridge0: port 2(bridge_slave_1) entered disabled state [ 746.082404][T13715] device bridge_slave_0 left promiscuous mode [ 746.088589][T13715] bridge0: port 1(bridge_slave_0) entered disabled state [ 746.096260][T13715] device veth1_macvtap left promiscuous mode [ 746.102339][T13715] device veth0_vlan left promiscuous mode [ 746.960901][T14009] bridge0: port 1(bridge_slave_0) entered blocking state [ 746.967971][T14009] bridge0: port 1(bridge_slave_0) entered disabled state [ 747.106685][T14009] device bridge_slave_0 entered promiscuous mode [ 747.141226][T14009] bridge0: port 2(bridge_slave_1) entered blocking state [ 747.158629][T14009] bridge0: port 2(bridge_slave_1) entered disabled state [ 747.206789][T14009] device bridge_slave_1 entered promiscuous mode [ 748.066806][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 748.079792][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 748.108519][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 748.116932][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 748.180788][ T385] bridge0: port 1(bridge_slave_0) entered blocking state [ 748.187866][ T385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 748.218444][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 748.226863][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 748.235299][ T385] bridge0: port 2(bridge_slave_1) entered blocking state [ 748.242471][ T385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 748.310433][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 748.392485][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 748.432463][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 748.485445][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 748.636555][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 748.649744][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 748.659472][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 748.681281][T14009] device veth0_vlan entered promiscuous mode [ 748.690641][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 748.721256][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 748.750504][T14009] device veth1_macvtap entered promiscuous mode [ 748.784936][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 748.799942][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 748.832514][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 748.866059][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 748.902003][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 748.968998][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 748.997220][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 749.005685][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 749.023611][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 749.138831][T14089] FAULT_INJECTION: forcing a failure. [ 749.138831][T14089] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 749.151927][T14089] CPU: 0 PID: 14089 Comm: syz.1.4367 Not tainted syzkaller #0 [ 749.159392][T14089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 749.169447][T14089] Call Trace: [ 749.172724][T14089] [ 749.175641][T14089] __dump_stack+0x21/0x24 [ 749.179960][T14089] dump_stack_lvl+0xee/0x150 [ 749.184533][T14089] ? __cfi_dump_stack_lvl+0x8/0x8 [ 749.189543][T14089] dump_stack+0x15/0x24 [ 749.193685][T14089] should_fail_ex+0x3d4/0x520 [ 749.198348][T14089] should_fail+0xb/0x10 [ 749.202489][T14089] should_fail_usercopy+0x1a/0x20 [ 749.207494][T14089] strncpy_from_user+0x24/0x2d0 [ 749.212324][T14089] ? unwind_get_return_address+0x4d/0x90 [ 749.217943][T14089] strncpy_from_user_nofault+0x73/0x150 [ 749.223469][T14089] bpf_probe_read_compat_str+0xe6/0x180 [ 749.228999][T14089] bpf_prog_9bca56546c9b26d5+0x3d/0x3f [ 749.234440][T14089] bpf_trace_run4+0x11b/0x270 [ 749.239104][T14089] ? __cfi_bpf_trace_run4+0x10/0x10 [ 749.244292][T14089] ? unwind_next_frame+0x3d5/0x700 [ 749.249389][T14089] ? x64_sys_call+0x488/0x9a0 [ 749.254052][T14089] __bpf_trace_fib_table_lookup+0x35/0x40 [ 749.259756][T14089] fib_table_lookup+0x1a0b/0x1a60 [ 749.264767][T14089] ? __kasan_check_write+0x14/0x20 [ 749.269859][T14089] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 749.275302][T14089] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 749.281233][T14089] ? __stack_depot_save+0x36/0x480 [ 749.286333][T14089] fib_compute_spec_dst+0x539/0x870 [ 749.291513][T14089] ? __cfi_fib_compute_spec_dst+0x10/0x10 [ 749.297216][T14089] ? __bpf_redirect+0x8db/0x1130 [ 749.302136][T14089] ? __kasan_check_write+0x14/0x20 [ 749.307247][T14089] ? dst_init+0x2cd/0x3d0 [ 749.311580][T14089] ? __local_bh_enable_ip+0x58/0x80 [ 749.316779][T14089] ? _raw_spin_unlock_bh+0x50/0x60 [ 749.321874][T14089] __ip_options_compile+0xc0b/0x19a0 [ 749.327148][T14089] ipv4_link_failure+0x427/0x790 [ 749.332073][T14089] ? __cfi_ipv4_link_failure+0x10/0x10 [ 749.337517][T14089] ? xfrm_lookup_route+0x12c/0x180 [ 749.342613][T14089] ? __cfi_ipv4_link_failure+0x10/0x10 [ 749.348058][T14089] vti6_tnl_xmit+0xffc/0x1980 [ 749.352722][T14089] ? __cfi_vti6_tnl_xmit+0x10/0x10 [ 749.357818][T14089] dev_hard_start_xmit+0x20b/0x750 [ 749.362921][T14089] __dev_queue_xmit+0x18d9/0x3420 [ 749.367935][T14089] ? __dev_queue_xmit+0x250/0x3420 [ 749.373046][T14089] ? __cfi___dev_queue_xmit+0x10/0x10 [ 749.378409][T14089] ? __kasan_check_write+0x14/0x20 [ 749.383501][T14089] ? skb_release_data+0x1d2/0x890 [ 749.388515][T14089] ? skb_ensure_writable+0x2f8/0x470 [ 749.393783][T14089] ? __kasan_check_write+0x14/0x20 [ 749.398873][T14089] ? pskb_expand_head+0xc4a/0x1210 [ 749.403972][T14089] __bpf_redirect+0x8db/0x1130 [ 749.408719][T14089] bpf_clone_redirect+0x26a/0x3c0 [ 749.413730][T14089] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 749.419176][T14089] ? kasan_set_track+0x60/0x70 [ 749.423929][T14089] ? kasan_set_track+0x4b/0x70 [ 749.428675][T14089] ? kasan_save_alloc_info+0x25/0x30 [ 749.433948][T14089] ? __kasan_slab_alloc+0x72/0x80 [ 749.438962][T14089] ? slab_post_alloc_hook+0x4f/0x2d0 [ 749.444244][T14089] ? kmem_cache_alloc+0x16e/0x330 [ 749.449258][T14089] ? build_skb+0x2a/0x220 [ 749.453575][T14089] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 749.459112][T14089] ? bpf_prog_test_run+0x3e3/0x630 [ 749.464209][T14089] ? __sys_bpf+0x56d/0x780 [ 749.468605][T14089] ? __x64_sys_bpf+0x7c/0x90 [ 749.473181][T14089] ? x64_sys_call+0x488/0x9a0 [ 749.477844][T14089] ? do_syscall_64+0x4c/0xa0 [ 749.482413][T14089] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 749.488469][T14089] ? __kasan_check_read+0x11/0x20 [ 749.493489][T14089] ? bpf_test_timer_continue+0x147/0x4a0 [ 749.499130][T14089] bpf_test_run+0x349/0x8d0 [ 749.503634][T14089] ? __kasan_slab_alloc+0x72/0x80 [ 749.508649][T14089] ? convert___skb_to_skb+0x5b0/0x5b0 [ 749.514016][T14089] ? __cfi_eth_type_trans+0x10/0x10 [ 749.519203][T14089] ? convert___skb_to_skb+0x40/0x5b0 [ 749.524472][T14089] bpf_prog_test_run_skb+0xaec/0x1290 [ 749.529832][T14089] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 749.535622][T14089] bpf_prog_test_run+0x3e3/0x630 [ 749.540546][T14089] ? slab_free_freelist_hook+0xc2/0x190 [ 749.546078][T14089] ? bpf_prog_query+0x270/0x270 [ 749.550910][T14089] ? selinux_bpf+0xce/0xf0 [ 749.555312][T14089] ? security_bpf+0x93/0xb0 [ 749.559799][T14089] __sys_bpf+0x56d/0x780 [ 749.564033][T14089] ? bpf_link_show_fdinfo+0x320/0x320 [ 749.569403][T14089] ? __cfi_ksys_write+0x10/0x10 [ 749.574243][T14089] ? debug_smp_processor_id+0x17/0x20 [ 749.579608][T14089] __x64_sys_bpf+0x7c/0x90 [ 749.584019][T14089] x64_sys_call+0x488/0x9a0 [ 749.588507][T14089] do_syscall_64+0x4c/0xa0 [ 749.592904][T14089] ? clear_bhb_loop+0x30/0x80 [ 749.597566][T14089] ? clear_bhb_loop+0x30/0x80 [ 749.602226][T14089] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 749.608107][T14089] RIP: 0033:0x7fb204b8f749 [ 749.612513][T14089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 749.632130][T14089] RSP: 002b:00007fb205af7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 749.640561][T14089] RAX: ffffffffffffffda RBX: 00007fb204de5fa0 RCX: 00007fb204b8f749 [ 749.648521][T14089] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 749.656474][T14089] RBP: 00007fb205af7090 R08: 0000000000000000 R09: 0000000000000000 [ 749.664431][T14089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 749.672392][T14089] R13: 00007fb204de6038 R14: 00007fb204de5fa0 R15: 00007ffdb3d53208 [ 749.680368][T14089] [ 750.238844][ T385] device bridge_slave_1 left promiscuous mode [ 750.244965][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 750.252466][ T385] device bridge_slave_0 left promiscuous mode [ 750.258755][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 750.267570][ T385] device veth1_macvtap left promiscuous mode [ 750.273776][ T385] device veth0_vlan left promiscuous mode [ 750.942225][ T385] device erspan0 left promiscuous mode [ 750.947703][ T385] syzkaller: port 1(erspan0) entered disabled state [ 751.119087][ T385] device bridge_slave_1 left promiscuous mode [ 751.125191][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 751.132545][ T385] device bridge_slave_0 left promiscuous mode [ 751.138662][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 751.146169][ T385] device veth0 left promiscuous mode [ 751.151514][ T385] kfree: port 1(veth0) entered disabled state [ 751.158307][ T385] device bridge_slave_1 left promiscuous mode [ 751.164384][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 751.171686][ T385] device bridge_slave_0 left promiscuous mode [ 751.177762][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 751.185794][ T385] device bridge_slave_1 left promiscuous mode [ 751.191940][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 751.199262][ T385] device bridge_slave_0 left promiscuous mode [ 751.205340][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 751.213340][ T385] device veth0_vlan left promiscuous mode [ 751.219267][ T385] device veth0_vlan left promiscuous mode [ 751.225075][ T385] device veth0_vlan left promiscuous mode