last executing test programs: 4.169430346s ago: executing program 4 (id=9598): close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x14, 0x4, 0x0, 0x0, 0x0, 0x89, 0x80220, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x2}, 0x411, 0x5, 0xb, 0x0, 0x81, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) unlink(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2200052f00fe800000fe800000875a65059ff57b00000000000000000000000000ac1414aa0000883e"], 0xcfa4) write$cgroup_devices(r3, &(0x7f00000001c0)={'c', ' *:* ', 'rwm\x00'}, 0xa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0xfffe) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x1) 3.947992409s ago: executing program 2 (id=9604): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) close(r0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) (async) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000180)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x94f9}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x3}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @tail_call, @exit, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7f}, @jmp={0x5, 0x1, 0xb, 0x4, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffff}], &(0x7f0000000240)='syzkaller\x00', 0x7, 0x86, &(0x7f0000000280)=""/134, 0x41100, 0x22, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0xb, 0x3, 0x81}, 0x10, 0xdfe8, 0xffffffffffffffff, 0x7, &(0x7f00000003c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000400)=[{0x3, 0x4, 0x4, 0x5}, {0x5, 0x2, 0xf, 0x33c1c05315484a87}, {0x3, 0x5, 0xb, 0x1}, {0x5, 0x1, 0x7, 0x5}, {0x3, 0x1, 0xe, 0x5}, {0x3, 0x5, 0x0, 0x7}, {0x4, 0x4, 0xd, 0x3}], 0x10, 0x40}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r1}, &(0x7f0000000140), &(0x7f0000000540)=r2}, 0x20) ioctl$TUNSETLINK(r0, 0x400454cd, 0xffff010e) 3.93917916s ago: executing program 2 (id=9607): r0 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) close(r1) bpf$BPF_PROG_DETACH(0x1c, &(0x7f00000001c0)=ANY=[@ANYRES32=r1], 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)=@o_path={&(0x7f0000000300)='./file0\x00', r0, 0x4000, r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB='1-1'], 0x31) socketpair(0x12, 0x80000, 0x4, &(0x7f0000000440)) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={@cgroup, 0x24, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000001c0), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0), 0x4) r7 = openat$cgroup_procs(r6, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000380), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80c02, 0x0) 3.705323303s ago: executing program 2 (id=9611): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f00000000c0), 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000004b000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300004c000000850000000e000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ff0f0000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r0}, 0xc) 3.59016155s ago: executing program 2 (id=9613): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) close(r0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="1100006a4500000000000000", @ANYRES32=r0, @ANYBLOB, @ANYRES64=0x0], 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x8, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000063014d00000000009500000000000000ff3ca4da7e0cb296f6b122867337f489a18c4f47afc99807682feb5f81eac7abc832edec17799606b2296cffcb48b19eb66fbdb1483f7f97"], &(0x7f0000000100)='GPL\x00'}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x67, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0a0000000400000006000000090000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000850000000800000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r4, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4002000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) write$cgroup_pid(r0, &(0x7f00000005c0), 0x12) 2.986227746s ago: executing program 4 (id=9615): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x24}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x19, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @cgroup_sockopt=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.984677146s ago: executing program 4 (id=9616): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socketpair(0xa, 0x3, 0x4, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x14, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f0000000200), 0x4) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) syz_clone(0x0, &(0x7f0000000500)="f23460a52414bf0850c38d25f783f796b768c923cdf4e1f6ce5044a8b5ea46833f834530617b506a364c51a0fba2e4f1eceb7d658244ca4ee9709f18f33a2df8b8bdaedc971a64c1f6b4618739b876e966effbab61bf9be38c31b83ba4f882e8c206e12243d50d8830cf480960eaa98d89690b66817b0edc07cea91e2a54e20135cd38d6072f27f3a8ba4a780502c6d9af565c07b2a96a6d41134ce5616f87d2cb9e836fdf236493ae6cbc7809ced6d647d3fc6bfe6b7dc9e45918c316d8b9387ea585330a3cafa1f64ae2416e9969b6441b8ce30be1c86d4cc273d43bd93f887fefb446c5436fc2225096c456e2c6", 0xef, &(0x7f0000000140), &(0x7f0000000240), &(0x7f00000002c0)="7e37992b168c0d70dfb0af0898820e14ec92295cf5d028017e9b742a73b5f2e0d9d59a852709eaf0") syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 2.781215668s ago: executing program 2 (id=9618): bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0xe, 0xc, &(0x7f0000000180)=@framed={{0x18, 0x8}, [@alu={0x4, 0x0, 0x2, 0x8}, @printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x76}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (fail_nth: 3) 2.23601572s ago: executing program 1 (id=9623): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8902, 0x7ffffffff000) 2.178428183s ago: executing program 4 (id=9624): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="16000002000000000400000023b55816076ad0ff"], 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000580)={@map=r0, 0xffffffffffffffff, 0x15}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40800000000000073113400000000008510000002000000b7000000000000009500c200000000009500001200000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x70) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0600000004000000990500000a"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r3, 0x0, 0x1ba8847c99}, 0x38) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) 2.158315194s ago: executing program 1 (id=9625): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004680)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@typedef={0x3}]}, {0x0, [0x672608233d8dd4ac, 0x2e, 0x61, 0x5f, 0x2e]}}, &(0x7f0000004580)=""/218, 0x2b, 0xda, 0x1}, 0x28) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 1.817349174s ago: executing program 1 (id=9627): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000240)='%ps \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r1, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540), ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xe3, &(0x7f0000000180)=[{}, {}], 0x10, 0x0, 0x0, &(0x7f0000000800), 0x8, 0xc3, 0x8, 0x8, &(0x7f0000000140)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f00000004c0)='GPL\x00', 0xc, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x17, r3, 0x8, &(0x7f0000000b40)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x3, 0x3, 0x3b1, 0x87}, 0x10, 0x15ca6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x100}, 0x94) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1e000000ff0f0000550000000300000000000200", @ANYRES32=r0, @ANYBLOB="059e00000015caa4f645e39fc715d0629cc94f7a3128256db23ee2846de190c127682a55ed44b60b33cd929d08f414f8ce75ae8313a29d98316dd5dee1e16031ec996ad6aad80ded3aa1ee6ba94c81ae9b773458267b506671c4f031e77ab4e4d5035eefde08c46a36af6d98a7d163d74674ae15d7fcd5d53970454305806d7be02a5fec475db9fb4ab50961574e7608aa17ef6fd6726b88cc2a86b81f7b8adac55b4d9036256f086830ecac33e801070adc297a0476226f9af7882c16aa25b25dc123fb641609398e1dbf6dbe89be9cc4d2aba59deab70317431128ddc3d5124ba10fdce496", @ANYRES32=r2, @ANYRES32=r4, @ANYBLOB="0000000000000000020000000900"/28], 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="a4480600000000e8809600000000000000000000d1f2eb0f0e533db74aed98eec1ac9b86269ee346ac7885d73e37a8c22c8f35f64e34bdc66bb8ff8957c916580408c68a19e0953bbe9e45792634618012f4e7632f40776519bebd2254dc4606fc96f73003fcc62e9f7d892a50", @ANYRES32=r2, @ANYRES32=r4, @ANYBLOB="05000000020000000300"/28], 0x50) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0xff, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffbfffffffff}, 0x828, 0x4000000000000, 0x0, 0x0, 0x8, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x8000000000040}, 0x0, 0x10, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0x10, r5, 0x9607251c09cb2e0e) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYRESOCT=r6], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="460a00000000000063113400000000006037090003fe2c38e000000000000000"], &(0x7f00000003c0)='syzkaller\x00', 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffd3f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) openat$tun(0xffffffffffffff9c, 0x0, 0x98040, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x800, 0x0, 0x2, 0x6, 0x0, 0x2001, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_subtree(r8, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2f0907bd122f6aa3547725cf71d2296bac6ee1ef5cc88b8be8a7ff396ae13646ba7842d24e7bea557a581386b6664d62248666dfbabc019b5a77f7d7c79f9466fc3de34e665b2643c6e"], 0x5) write$cgroup_subtree(r9, &(0x7f0000000500)=ANY=[@ANYBLOB="2d63707520cff4f40300167eeb70331599c5223e7529f8e0bae5a26ad430019480"], 0x5) r10 = openat$cgroup_type(r7, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r10, &(0x7f0000000080), 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000440)={'wg2\x00', @random="c2bcbe9876ac"}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0}, 0x50) 1.729319079s ago: executing program 3 (id=9628): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x19, 0x0, 0x0, 0x8000}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100382, 0x0, 0x40, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000004000000080000000500"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x23, 0x0, 0x0, 0x0, 0x0, 0xc90a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="09000000020000000400000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r5, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r6, &(0x7f0000000d40), 0x0}, 0x20) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000000000000000006", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r9}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000007d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f0000000340)={&(0x7f0000000580)=""/76, 0x4c, 0x0, &(0x7f0000000600)=""/144, 0x90}}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000700)='\x00') r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{}, &(0x7f0000000280), &(0x7f0000000240)=r10}, 0x20) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_devices(r4, &(0x7f00000002c0)='devices.deny\x00', 0x2, 0x0) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x18, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000feffffff00000000000000001801000000646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000010000808500000019000000b7080000000000007baaf8ff00000000b5080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r14, @ANYBLOB="0000000000000000b70500000800000085000000a800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r11, 0x1, 0x32, &(0x7f00000000c0)=r13, 0x4) sendmsg$inet(r12, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r7, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 1.587605638s ago: executing program 0 (id=9630): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r2) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 1.586325748s ago: executing program 1 (id=9631): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="0002000000000000260005000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x6, 0x10, &(0x7f0000000e40)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000300000018230000", @ANYRES32=r0, @ANYBLOB="00dad1b360e94366ea04000008000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0xfffff000, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x2f00, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) mkdir(&(0x7f0000000000)='./file0\x00', 0x184) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000000c0)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000640)=ANY=[], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x27) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRESOCT=r5, @ANYRESOCT=r0, @ANYRESOCT=r5, @ANYRES64=r5, @ANYRES16=r5, @ANYRES64], 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000380)='[(\'@$&]\x00') r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf434b9eaafdc2a00e9bfde908990817b364e51afe9c8dab05b16a6437211f9f0570759f1cae63487ff68fffffffffffe8e3932e2b75a25a4cf8a9456aa8a701c318c67edb6e9330b53c0eeba8644311ba7541189070000f50c000000d8e5b1dc91c5499be2097784a94b6cc2d272ac751d8bce5db4862c1b2eab7007ceea158dbc329bab5f8450147b2b9629fdd6cdb5507d3a76dbaf6f93d161caa513f8aa41f795507856ea0015166c56ea0103220ed5a66834be086ef206a8606b04fc8462cbbe8233f381b4eefbdbdac708c1f4959cb6c008397006da8e243ec9fb19f3fab2b0f46d73a9f2d7c674cdbe4d7f76f5fbd05043e81f435fccf5063a93aa9b4c7f68670594"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000ec0)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000020000000000000038258198c690780000000000000790a64fc33b09732d94844fd1775aff2f60c7278a09b02b8470a1f9a58d4f9a0c958d94d96cb201de33b838f7d2a74c65fc12aa593047c6bc32a0a9008dfee76544bf85de5256fcf94eda7a658f16b7989b62680984d69a142f144a7bad58d2fa53918e27eff8ba9f04d07dcc354fb399d34d6a6bbf1145056fdfff13aeeeb153be3f97e452354d2433cc5caed54d9a61b444d8b1264b3f816a3d7fcde75d1bf18e21ae162ab9bbfb17d7a765771a9a66acf9833b16e803356454160629cdedf97fdf21724552a857e31b375bc0da35ed9f17d1fb20daa85efcc0e9a45e6a2cef475820b9d714831bb2061d7c71888a7d79161cf280084cc0b17abd7234d2c6ebe7df7b8b9caf8c732dfda904ba51ffe9535369fe63119fa1b3401c83e14a98b6443e9896b167229c70594156be31718f8a8b5fcaf6a2b2811a3a32dabfc512e565f8170aa87832c27800a41a830e8e290329e6b75c7fc63799747657d057c26aff1cf6c9d230fc0ec4431a8e9130f595691197659e9c4fe30db8bffb1f3f738fa04879f8fca1c378ce8681122e32a081b9a5a44a0b47c8a9f9b84637eae3e5507c0bdd8b3071137ba7b61b487b56c7d99bbffc99500d03"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x7, r9}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000200018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095", @ANYRESDEC=r0, @ANYRESDEC=r9, @ANYRES8=r8, @ANYBLOB="82f41ae11ba2443ea15ec3a6e1b69e97b5b92d1cef0ed14abf253c636d3aaa1b85ffca4311c2fe750304c4022a6dc4f563a4f0613aad49ceb05d4efc9a9578f7d08d840f6ed3864147ca8a881d7b6411398b185db25ce77107f98d88d7b913ec5fca872ec24014952a82847bb5973ea3737fd63e8956d257c5c1636f116f5c92e8cb52457d6b0349782f032cd396a0d5947cbf0a17f1", @ANYRES16=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000c80)=ANY=[@ANYRES64=0x0, @ANYBLOB="fff3e5fbbcf7e283f825d1bfc98bdb52f03c4ed633235f2459ea8dfe02acc340ddb0e4b01bf61b8da3ee747bc0e5d61cb0de383b2c3688d744d99e321a8d9deef06a2f0249b20ce184d13555f1defdc69dfa5487185daa7f2eff5f3121ebca362953da39daad9ebd62814325d8738c1235e24c5b1d61d8a721272df95a35dd39b1a1423fbf163d4c4e5dfa97ee2d1b8a3e44f2b632cee4109fc275f003b2d05407013497579241d8d80f2c1959a6d9bf7970b6349f890e57fb5bc0ea18507c816ecf08013c06841f78f2ca7356390f5a1ab45008f24450eebfcfac0874a3b986c15d", @ANYRESDEC=r0, @ANYBLOB="b6acca7375caadcbcaba5a29d837035ac53fc631ce08f69a30dbe0d9a007e73ee9812c356f5ecf68b357b550fbd9edac552822df830da569e32132e43f443fc5c3f539700bbb6c", @ANYRESOCT=r10, @ANYRES32=r0], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000180)=r11, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r8, 0x3000000, 0x12, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0xe00}, 0x28) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYRES16=r6, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xc, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000008000000000000005805000018100000", @ANYRES32=r12, @ANYBLOB="000000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.3720324s ago: executing program 3 (id=9632): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x7, 0x4, 0x900, 0x5, 0x28}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYRES32=r0], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=""/112, 0xa4, 0x70, 0x0, 0x6538, 0x10000}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x11, 0xfffffffb, 0x2, 0x4, 0x10023, r0, 0x9, '\x00', 0x0, r2, 0x1, 0x1, 0x5}, 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000400)={r1, r0}, 0xc) 1.318029814s ago: executing program 3 (id=9633): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x100, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000400000000000000000085000000bb"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @sock_ops=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x101, 0xffc, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b708000000005a027b8af8ff00000000bfa200000000000007020000f8ffffffb703000008ffffffdb01000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 894.294538ms ago: executing program 3 (id=9634): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 882.854719ms ago: executing program 0 (id=9635): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff}, [@call={0x85, 0x0, 0x0, 0x2a}, @printk={@lx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x72}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r0, 0x4) sendmsg$inet(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) 862.79788ms ago: executing program 3 (id=9636): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="05000000"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000019c0)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) 848.423671ms ago: executing program 1 (id=9637): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=@base={0x6, 0x4, 0x4, 0x8}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) close(r1) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r2, r1}, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}]}, {0x0, [0x5f, 0x2e, 0x30]}}, &(0x7f0000000200)=""/55, 0x29, 0x37, 0x0, 0x4, 0x10000}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0d00000004000000040000000900000000000000", @ANYRES32=r0, @ANYBLOB="00000000000000000000000000090000fb000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x42}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85}, 0x52) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'veth1_macvtap\x00'}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair(0x1e, 0x4, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={@ifindex, 0x15, 0x0, 0x1, &(0x7f0000000340)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0), &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 834.288262ms ago: executing program 4 (id=9638): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000080)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000180)={@fallback=r1, r1, 0x10, 0x0, 0x0, @void, @value=r1}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)=ANY=[], 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0xc8, 0x8ba9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xfda8, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x2) write$cgroup_subtree(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00082c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa3b"], 0xfdef) mkdirat$cgroup(r0, &(0x7f00000001c0)='syz0\x00', 0x1ff) mkdirat$cgroup(r0, &(0x7f00000003c0)='syz1\x00', 0x1ff) perf_event_open$cgroup(0x0, r0, 0x0, 0xffffffffffffffff, 0x8) 833.215182ms ago: executing program 0 (id=9639): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x200000000000000, &(0x7f0000000240)=@base={0x9, 0x8, 0x4, 0x4009}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000240)={0x1, 0x0, [0x0]}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) 754.338887ms ago: executing program 4 (id=9640): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5}, 0x10) perf_event_open(&(0x7f00000014c0)={0x5, 0x80, 0x0, 0xff, 0xff, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x1590, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8a, 0x3, 0x0, 0x3, 0x0, 0x10000000000, 0x8808, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0x6}, 0x4108, 0x3, 0x0, 0x6, 0x7, 0xffffffff, 0x802, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x19) perf_event_open(&(0x7f00000014c0)={0x5, 0x80, 0x0, 0xfe, 0xff, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x1590, 0x0, 0x8, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x0, 0x6000}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r9, @ANYRES32=r8, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r9}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) 638.710383ms ago: executing program 2 (id=9641): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff}, [@call={0x85, 0x0, 0x0, 0x2a}, @printk={@lx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x72}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r0, 0x4) sendmsg$inet(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) (fail_nth: 3) 625.108874ms ago: executing program 1 (id=9642): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r2, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000700)=[0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xe3, &(0x7f0000000780)=[{}, {}], 0x10, 0x0, 0x0, &(0x7f0000000800), 0x8, 0xc3, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f00000004c0)='GPL\x00', 0xc, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x17, r5, 0x8, &(0x7f0000000b40)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x3, 0x3, 0x3b1, 0x87}, 0x10, 0x15ca6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x100}, 0x94) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r6, 0x8, 0x0, 0x4, 0x10, &(0x7f0000000400), 0x1}, 0x6d) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x1, 0x1, 0x0, 0xa, 0x3, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000080)='GPL\x00', 0x38, 0xc8, &(0x7f0000000180)=""/200, 0x41000, 0x0, '\x00', r4, 0x25, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f00000000c0)={0x0, 0x6, 0x2}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000280)=[{0x5, 0x2, 0xf, 0x4}, {0x5, 0x5, 0x4, 0x6}, {0x4, 0x2, 0xf, 0x3}], 0x10, 0xb89}, 0x94) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r0, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@ifindex=r9, 0x7, 0x1, 0x6, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) write$cgroup_pid(r8, &(0x7f00000005c0)=r1, 0x12) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/time\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 559.584368ms ago: executing program 0 (id=9643): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x33}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @call={0x85, 0x0, 0x0, 0x56}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f0000000600)=""/204, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffecc}, 0x70) 204.524028ms ago: executing program 0 (id=9644): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1}, 0x0, 0x0}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0x5, 0x1, 0x40, 0x5, 0x41}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000180), 0x1003, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r1}, 0xc) 45.126458ms ago: executing program 0 (id=9645): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r2) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 0s ago: executing program 3 (id=9646): bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) sendmsg$unix(r0, &(0x7f00000005c0)={0x0, 0xfffffffffffffec1, 0x0, 0x0, 0x0, 0x0, 0x20000090}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x2, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4aef6a06}, [@call={0x85, 0x0, 0x0, 0x75}, @ldst={0x6, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0xfffffffffffffc8d}, 0x4c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000840000002eae4b7b016bc2d023"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xe, 0x4, 0x2, 0x1, 0x100, r4, 0x0, '\x00', r5, r6, 0x3, 0x4, 0x4}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f0000000180)=""/221, 0xdd, 0x0, &(0x7f0000000b00)=""/4096, 0x1000}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000040)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x10001}], &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x10, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0xc, 0xfff, 0x7}, 0x10, r7, 0x0, 0x7, 0x0, &(0x7f00000003c0)=[{0x0, 0x5, 0x5, 0x1}, {0x2, 0x3, 0x5, 0xb}, {0x3, 0x4, 0x6, 0xc}, {0x5, 0x3, 0x0, 0x4}, {0x3, 0x2, 0xb, 0x5}, {0x1, 0x1, 0x0, 0x5}, {0x3, 0x1, 0xc, 0x2}], 0x10, 0x7}, 0x94) kernel console output (not intermixed with test programs): becomes ready [ 1432.168244][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1432.187945][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1432.230853][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1432.253325][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1432.532957][ T8818] device veth0_vlan left promiscuous mode [ 1433.418934][T23560] device syzkaller0 entered promiscuous mode [ 1433.682641][T23573] device syzkaller0 entered promiscuous mode [ 1433.909339][T13930] device syz_tun left promiscuous mode [ 1433.929413][T13930] Ÿë: port 1(syz_tun) entered disabled state [ 1434.072712][T23613] bridge0: port 1(bridge_slave_0) entered blocking state [ 1434.080167][T23613] bridge0: port 1(bridge_slave_0) entered disabled state [ 1434.088665][T23613] device bridge_slave_0 entered promiscuous mode [ 1434.107750][T23613] bridge0: port 2(bridge_slave_1) entered blocking state [ 1434.136087][T23613] bridge0: port 2(bridge_slave_1) entered disabled state [ 1434.158219][T23613] device bridge_slave_1 entered promiscuous mode [ 1434.334539][T23613] bridge0: port 2(bridge_slave_1) entered blocking state [ 1434.341669][T23613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1434.349220][T23613] bridge0: port 1(bridge_slave_0) entered blocking state [ 1434.356289][T23613] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1434.419219][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 1434.437777][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 1434.451054][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1434.459511][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1434.499753][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1434.512992][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 1434.520402][ T341] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1434.536874][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1434.545445][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 1434.552599][ T341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1434.564339][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1434.575537][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1434.595197][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1434.624724][T23613] device veth0_vlan entered promiscuous mode [ 1434.638462][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1434.653071][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1434.674324][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1434.698362][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1434.709318][T23613] device veth1_macvtap entered promiscuous mode [ 1434.723117][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1437.594700][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1437.603782][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1438.289334][ T8818] device veth1_macvtap left promiscuous mode [ 1438.303587][ T8818] device veth0_vlan left promiscuous mode [ 1438.982247][T23754] bridge0: port 2(bridge_slave_1) entered disabled state [ 1438.989847][T23754] bridge0: port 1(bridge_slave_0) entered disabled state [ 1438.999808][T23757] device bridge_slave_1 left promiscuous mode [ 1439.006060][T23757] bridge0: port 2(bridge_slave_1) entered disabled state [ 1439.014422][T23757] device bridge_slave_0 left promiscuous mode [ 1439.059354][T23757] bridge0: port 1(bridge_slave_0) entered disabled state [ 1439.500588][T23767] device syzkaller0 entered promiscuous mode [ 1440.282713][T23798] syz.3.7396[23798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1440.282810][T23798] syz.3.7396[23798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1440.396758][T23808] device syzkaller0 entered promiscuous mode [ 1441.382673][T23862] syz.4.7429[23862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1441.382779][T23862] syz.4.7429[23862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1441.414873][T23865] device syzkaller0 entered promiscuous mode [ 1441.980217][T23894] device syzkaller0 entered promiscuous mode [ 1442.791367][T23938] syz.3.7450[23938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1442.791462][T23938] syz.3.7450[23938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1442.950429][T23942] device syzkaller0 entered promiscuous mode [ 1443.884771][T23979] device syzkaller0 entered promiscuous mode [ 1444.482990][T23993] syz.3.7488[23993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1444.509849][T23993] syz.3.7488[23993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1446.545851][T24196] device syzkaller0 entered promiscuous mode [ 1447.164551][T24226] syz.4.7583[24226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1447.164651][T24226] syz.4.7583[24226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1447.508555][T24244] device syzkaller0 entered promiscuous mode [ 1448.344781][T24289] syz.1.7610[24289] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1448.344880][T24289] syz.1.7610[24289] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1448.363797][T24285] device syzkaller0 entered promiscuous mode [ 1449.301531][T24333] device syzkaller0 entered promiscuous mode [ 1454.232633][T24539] device syzkaller0 entered promiscuous mode [ 1454.645902][T24561] syz.3.7719[24561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1454.646001][T24561] syz.3.7719[24561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1457.672879][T24649] device syzkaller0 entered promiscuous mode [ 1457.968991][T24681] device syzkaller0 entered promiscuous mode [ 1458.073700][T24690] device syzkaller0 entered promiscuous mode [ 1458.309420][T24722] device syzkaller0 entered promiscuous mode [ 1460.394211][T24771] device syzkaller0 entered promiscuous mode [ 1460.601074][T24797] device syzkaller0 entered promiscuous mode [ 1461.113479][T24858] device syzkaller0 entered promiscuous mode [ 1461.530711][T24914] device syzkaller0 entered promiscuous mode [ 1461.909203][T24968] device syzkaller0 entered promiscuous mode [ 1464.512332][T25024] device syzkaller0 entered promiscuous mode [ 1464.879556][T25064] device syzkaller0 entered promiscuous mode [ 1465.381471][T25115] device syzkaller0 entered promiscuous mode [ 1465.990578][T25158] device syzkaller0 entered promiscuous mode [ 1466.729987][T25211] device syzkaller0 entered promiscuous mode [ 1466.737644][T25215] syz.1.8014[25215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1466.737733][T25215] syz.1.8014[25215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1467.086687][T25239] device syzkaller0 entered promiscuous mode [ 1467.474575][T25292] device syzkaller0 entered promiscuous mode [ 1467.962303][T25341] device syzkaller0 entered promiscuous mode [ 1468.657077][T25402] syz.3.8098[25402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1468.657174][T25402] syz.3.8098[25402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1468.796045][T25411] device syzkaller0 entered promiscuous mode [ 1469.266238][T25447] device syzkaller0 entered promiscuous mode [ 1470.236557][T25543] device syzkaller0 entered promiscuous mode [ 1470.924321][T25554] syz.1.8186[25554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1470.927939][T25554] syz.1.8186[25554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1470.986137][T25580] device syzkaller0 entered promiscuous mode [ 1472.289437][T25706] device syzkaller0 entered promiscuous mode [ 1472.895121][T25759] device syzkaller0 entered promiscuous mode [ 1473.336285][T25800] device syzkaller0 entered promiscuous mode [ 1473.971748][T25851] device syzkaller0 entered promiscuous mode [ 1474.611713][T25907] device syzkaller0 entered promiscuous mode [ 1475.351695][T25965] syz.0.8358[25965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1475.351779][T25965] syz.0.8358[25965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1477.580393][T26152] device syzkaller0 entered promiscuous mode [ 1477.730463][T26169] device syzkaller0 entered promiscuous mode [ 1477.985243][T26205] device syzkaller0 entered promiscuous mode [ 1478.677226][T26257] device syzkaller0 entered promiscuous mode [ 1478.725400][T26261] syz.1.8500[26261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1478.725482][T26261] syz.1.8500[26261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1479.350600][T26306] device syzkaller0 entered promiscuous mode [ 1479.694752][T26308] syz.3.8525[26308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1479.694861][T26308] syz.3.8525[26308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1480.774714][T26398] syz.0.8550[26398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1480.913325][T26398] syz.0.8550[26398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1481.601776][T26459] device syzkaller0 entered promiscuous mode [ 1482.242405][T26506] device syzkaller0 entered promiscuous mode [ 1482.463018][T26492] bridge0: port 1(bridge_slave_0) entered blocking state [ 1482.470423][T26492] bridge0: port 1(bridge_slave_0) entered disabled state [ 1482.478051][T26492] device bridge_slave_0 entered promiscuous mode [ 1482.485503][T26492] bridge0: port 2(bridge_slave_1) entered blocking state [ 1482.492620][T26492] bridge0: port 2(bridge_slave_1) entered disabled state [ 1482.500393][T26492] device bridge_slave_1 entered promiscuous mode [ 1482.582211][T26492] bridge0: port 2(bridge_slave_1) entered blocking state [ 1482.589338][T26492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1482.596921][T26492] bridge0: port 1(bridge_slave_0) entered blocking state [ 1482.604168][T26492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1482.681369][T18687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1482.710538][T18687] bridge0: port 1(bridge_slave_0) entered disabled state [ 1482.762153][T18687] bridge0: port 2(bridge_slave_1) entered disabled state [ 1482.790740][T18687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1482.805693][T18687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1482.826133][T18687] bridge0: port 1(bridge_slave_0) entered blocking state [ 1482.834374][T18687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1482.861253][T26546] device syzkaller0 entered promiscuous mode [ 1482.892176][T18687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1482.918162][T18687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1482.926881][T18687] bridge0: port 2(bridge_slave_1) entered blocking state [ 1482.934190][T18687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1482.990977][T18687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1483.001681][T18687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1483.052018][T18687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1483.062668][T18687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1483.118961][ T8818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1483.138266][ T8818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1483.244727][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1483.253070][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1483.263009][T26492] device veth0_vlan entered promiscuous mode [ 1483.358446][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1483.378052][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1483.493438][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1483.506620][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1483.537109][T26492] device veth1_macvtap entered promiscuous mode [ 1483.628726][T18687] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1483.640424][T18687] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1483.667847][T18687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1483.756780][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1483.778402][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1483.879394][ T10] device bridge_slave_1 left promiscuous mode [ 1483.886106][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1483.911196][ T10] device bridge_slave_0 left promiscuous mode [ 1483.939767][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1484.016160][ T10] device veth1_macvtap left promiscuous mode [ 1484.094832][ T10] device veth0_vlan left promiscuous mode [ 1484.443636][T26622] syz.1.8606[26622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1484.443725][T26622] syz.1.8606[26622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1484.576952][T26616] device syzkaller0 entered promiscuous mode [ 1485.593679][T26660] device syzkaller0 entered promiscuous mode [ 1485.646513][T26667] syz.1.8677[26667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1485.646589][T26667] syz.1.8677[26667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1486.840776][T26706] device syzkaller0 entered promiscuous mode [ 1487.201309][T26725] device syzkaller0 entered promiscuous mode [ 1487.389657][T26708] syz.0.8696[26708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1487.436361][T26708] syz.0.8696[26708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1488.504929][T26776] syz.2.8726[26776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1488.545014][T26776] syz.2.8726[26776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1490.107162][T26844] syz.1.8748[26844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1490.339185][T26844] syz.1.8748[26844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1492.554809][T26993] device syzkaller0 entered promiscuous mode [ 1493.637627][T27055] device syzkaller0 entered promiscuous mode [ 1493.815446][T27067] syz.3.8834[27067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1493.815545][T27067] syz.3.8834[27067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1493.997842][T27066] device syzkaller0 entered promiscuous mode [ 1494.299501][T27095] device syzkaller0 entered promiscuous mode [ 1494.657560][T27113] device syzkaller0 entered promiscuous mode [ 1494.784953][T27123] syz.0.8862[27123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1494.785036][T27123] syz.0.8862[27123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1495.310989][T27142] device syzkaller0 entered promiscuous mode [ 1499.594143][T27147] device syzkaller0 entered promiscuous mode [ 1500.500902][T27199] syz.0.8886[27199] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1500.500963][T27199] syz.0.8886[27199] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1500.875459][T27209] device syzkaller0 entered promiscuous mode [ 1501.033074][T27217] device syzkaller0 entered promiscuous mode [ 1501.140897][T27228] device syzkaller0 entered promiscuous mode [ 1502.283801][T27272] syz.2.8915[27272] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1502.283938][T27272] syz.2.8915[27272] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1502.796258][T27279] syz.0.8919[27279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1502.970428][T27279] syz.0.8919[27279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1503.400591][T27302] device syzkaller0 entered promiscuous mode [ 1503.881503][T27318] device syzkaller0 entered promiscuous mode [ 1507.250630][T27360] device syzkaller0 entered promiscuous mode [ 1508.170061][T27391] syz.1.8960[27391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1508.170156][T27391] syz.1.8960[27391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1508.469204][T27403] device syzkaller0 entered promiscuous mode [ 1508.511452][T27386] syz.2.8962[27386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1508.534845][T27386] syz.2.8962[27386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1508.641437][T27413] syz.4.8963[27413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1508.717883][T27413] syz.4.8963[27413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1510.528055][T27486] syz.1.8985[27486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1510.600689][T27486] syz.1.8985[27486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1511.221076][T27506] syz.3.9003[27506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1511.267542][T27506] syz.3.9003[27506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1511.341860][T27529] Â: renamed from pim6reg1 [ 1511.663095][T27537] device syzkaller0 entered promiscuous mode [ 1512.327605][T27582] bridge0: port 2(bridge_slave_1) entered disabled state [ 1512.335077][T27582] bridge0: port 1(bridge_slave_0) entered disabled state [ 1512.798596][T27601] device syzkaller0 entered promiscuous mode [ 1513.391150][T27642] device syzkaller0 entered promiscuous mode [ 1513.732400][T27629] bpf_get_probe_write_proto: 2 callbacks suppressed [ 1513.732437][T27629] syz.4.9055[27629] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1513.776027][T27629] syz.4.9055[27629] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1514.035796][T27683] syz.3.9068[27683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1514.084336][T27683] syz.3.9068[27683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1514.106835][T27687] device syzkaller0 entered promiscuous mode [ 1515.132871][T27710] syz.3.9086[27710] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1515.141175][T27710] syz.3.9086[27710] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1515.531074][T27748] device syzkaller0 entered promiscuous mode [ 1515.695213][T27755] device syzkaller0 entered promiscuous mode [ 1516.438195][T27785] syz.4.9108[27785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1516.438304][T27785] syz.4.9108[27785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1517.358362][ T30] audit: type=1400 audit(1769209237.302:148): avc: denied { create } for pid=27814 comm="syz.0.9126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 1517.766321][T27834] tap0: tun_chr_ioctl cmd 21731 [ 1518.466828][T27853] syz.3.9135[27853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1518.466913][T27853] syz.3.9135[27853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1519.646650][T27924] syz.3.9157[27924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1519.720980][T27924] syz.3.9157[27924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1520.035351][T27951] device syzkaller0 entered promiscuous mode [ 1522.598007][T27981] syz.0.9180[27981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1522.598112][T27981] syz.0.9180[27981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1522.803244][T27992] device syzkaller0 entered promiscuous mode [ 1522.867899][T27995] device syzkaller0 entered promiscuous mode [ 1522.888758][T28003] FAULT_INJECTION: forcing a failure. [ 1522.888758][T28003] name failslab, interval 1, probability 0, space 0, times 0 [ 1522.901577][T28003] CPU: 1 PID: 28003 Comm: syz.1.9189 Tainted: G W syzkaller #0 [ 1522.910476][T28003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1522.920734][T28003] Call Trace: [ 1522.924212][T28003] [ 1522.927160][T28003] __dump_stack+0x21/0x30 [ 1522.931628][T28003] dump_stack_lvl+0x110/0x170 [ 1522.936483][T28003] ? show_regs_print_info+0x20/0x20 [ 1522.941739][T28003] ? netif_receive_skb_list_internal+0x841/0xab0 [ 1522.948294][T28003] dump_stack+0x15/0x20 [ 1522.952575][T28003] should_fail+0x3c1/0x510 [ 1522.957258][T28003] __should_failslab+0xa4/0xe0 [ 1522.962065][T28003] should_failslab+0x9/0x20 [ 1522.966623][T28003] slab_pre_alloc_hook+0x3b/0xe0 [ 1522.971598][T28003] kmem_cache_alloc_trace+0x48/0x270 [ 1522.977001][T28003] ? tun_flow_create+0x60/0x320 [ 1522.981989][T28003] ? _raw_spin_lock_irq+0xf0/0xf0 [ 1522.987048][T28003] tun_flow_create+0x60/0x320 [ 1522.991753][T28003] tun_flow_update+0x1e3/0x570 [ 1522.996534][T28003] tun_get_user+0x2860/0x3400 [ 1523.001233][T28003] ? tun_do_read+0x1d30/0x1d30 [ 1523.006020][T28003] ? kstrtouint_from_user+0x1c4/0x220 [ 1523.011416][T28003] ? kstrtol_from_user+0x2a0/0x2a0 [ 1523.016547][T28003] ? avc_policy_seqno+0x1b/0x70 [ 1523.021412][T28003] ? selinux_file_permission+0x2aa/0x510 [ 1523.027065][T28003] tun_chr_write_iter+0x1eb/0x2e0 [ 1523.032122][T28003] vfs_write+0x835/0xfd0 [ 1523.036376][T28003] ? putname+0x111/0x160 [ 1523.040642][T28003] ? file_end_write+0x1b0/0x1b0 [ 1523.045510][T28003] ? __fget_files+0x2c4/0x320 [ 1523.050291][T28003] ? __fdget_pos+0x1f7/0x380 [ 1523.055004][T28003] ? ksys_write+0x71/0x250 [ 1523.059430][T28003] ksys_write+0x149/0x250 [ 1523.063773][T28003] ? __ia32_sys_read+0x90/0x90 [ 1523.068698][T28003] ? debug_smp_processor_id+0x17/0x20 [ 1523.074119][T28003] __x64_sys_write+0x7b/0x90 [ 1523.078737][T28003] x64_sys_call+0x8ef/0x9a0 [ 1523.083444][T28003] do_syscall_64+0x4c/0xa0 [ 1523.087888][T28003] ? clear_bhb_loop+0x50/0xa0 [ 1523.092585][T28003] ? clear_bhb_loop+0x50/0xa0 [ 1523.097277][T28003] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1523.103218][T28003] RIP: 0033:0x7fa08433dcb9 [ 1523.107659][T28003] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1523.127719][T28003] RSP: 002b:00007fa082d79028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1523.136171][T28003] RAX: ffffffffffffffda RBX: 00007fa0845b9090 RCX: 00007fa08433dcb9 [ 1523.144165][T28003] RDX: 0000000000000012 RSI: 00002000000005c0 RDI: 0000000000000003 [ 1523.152162][T28003] RBP: 00007fa082d79090 R08: 0000000000000000 R09: 0000000000000000 [ 1523.160155][T28003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1523.168141][T28003] R13: 00007fa0845b9128 R14: 00007fa0845b9090 R15: 00007ffcd1b1eda8 [ 1523.176325][T28003] [ 1523.337410][T28014] FAULT_INJECTION: forcing a failure. [ 1523.337410][T28014] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1523.361630][T28014] CPU: 1 PID: 28014 Comm: syz.0.9197 Tainted: G W syzkaller #0 [ 1523.370553][T28014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1523.378765][T28012] device syzkaller0 entered promiscuous mode [ 1523.380645][T28014] Call Trace: [ 1523.380654][T28014] [ 1523.380662][T28014] __dump_stack+0x21/0x30 [ 1523.380696][T28014] dump_stack_lvl+0x110/0x170 [ 1523.401948][T28014] ? show_regs_print_info+0x20/0x20 [ 1523.407200][T28014] ? vfs_write+0xc72/0xfd0 [ 1523.411669][T28014] dump_stack+0x15/0x20 [ 1523.415863][T28014] should_fail+0x3c1/0x510 [ 1523.420325][T28014] should_fail_usercopy+0x1a/0x20 [ 1523.425402][T28014] _copy_from_user+0x20/0xd0 [ 1523.430037][T28014] __sys_bpf+0x258/0x7d0 [ 1523.434323][T28014] ? bpf_link_show_fdinfo+0x330/0x330 [ 1523.439815][T28014] ? debug_smp_processor_id+0x17/0x20 [ 1523.445228][T28014] __x64_sys_bpf+0x7c/0x90 [ 1523.449684][T28014] x64_sys_call+0x4b9/0x9a0 [ 1523.454232][T28014] do_syscall_64+0x4c/0xa0 [ 1523.458821][T28014] ? clear_bhb_loop+0x50/0xa0 [ 1523.463541][T28014] ? clear_bhb_loop+0x50/0xa0 [ 1523.468262][T28014] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1523.474200][T28014] RIP: 0033:0x7fd302158cb9 [ 1523.478646][T28014] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1523.498429][T28014] RSP: 002b:00007fd300bb5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1523.506896][T28014] RAX: ffffffffffffffda RBX: 00007fd3023d3fa0 RCX: 00007fd302158cb9 [ 1523.514911][T28014] RDX: 0000000000000028 RSI: 0000200000000000 RDI: 0000000000000012 [ 1523.523012][T28014] RBP: 00007fd300bb5090 R08: 0000000000000000 R09: 0000000000000000 [ 1523.531031][T28014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1523.539133][T28014] R13: 00007fd3023d4038 R14: 00007fd3023d3fa0 R15: 00007ffdf3cc0468 [ 1523.547200][T28014] [ 1523.709797][T28039] FAULT_INJECTION: forcing a failure. [ 1523.709797][T28039] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1523.767813][T28039] CPU: 0 PID: 28039 Comm: syz.4.9206 Tainted: G W syzkaller #0 [ 1523.776750][T28039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1523.786839][T28039] Call Trace: [ 1523.790161][T28039] [ 1523.793138][T28039] __dump_stack+0x21/0x30 [ 1523.797516][T28039] dump_stack_lvl+0x110/0x170 [ 1523.802258][T28039] ? show_regs_print_info+0x20/0x20 [ 1523.807497][T28039] ? vfs_write+0xc72/0xfd0 [ 1523.812054][T28039] dump_stack+0x15/0x20 [ 1523.816242][T28039] should_fail+0x3c1/0x510 [ 1523.820698][T28039] should_fail_usercopy+0x1a/0x20 [ 1523.825778][T28039] _copy_from_user+0x20/0xd0 [ 1523.830502][T28039] __sys_bpf+0x258/0x7d0 [ 1523.834784][T28039] ? bpf_link_show_fdinfo+0x330/0x330 [ 1523.840372][T28039] ? debug_smp_processor_id+0x17/0x20 [ 1523.845888][T28039] __x64_sys_bpf+0x7c/0x90 [ 1523.850368][T28039] x64_sys_call+0x4b9/0x9a0 [ 1523.855052][T28039] do_syscall_64+0x4c/0xa0 [ 1523.859533][T28039] ? clear_bhb_loop+0x50/0xa0 [ 1523.864252][T28039] ? clear_bhb_loop+0x50/0xa0 [ 1523.868984][T28039] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1523.874919][T28039] RIP: 0033:0x7f4b84397cb9 [ 1523.879367][T28039] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1523.899107][T28039] RSP: 002b:00007f4b82df4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1523.907566][T28039] RAX: ffffffffffffffda RBX: 00007f4b84612fa0 RCX: 00007f4b84397cb9 [ 1523.915584][T28039] RDX: 000000000000000c RSI: 00002000000003c0 RDI: 000000000000000a [ 1523.923710][T28039] RBP: 00007f4b82df4090 R08: 0000000000000000 R09: 0000000000000000 [ 1523.931844][T28039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1523.940214][T28039] R13: 00007f4b84613038 R14: 00007f4b84612fa0 R15: 00007ffe568ddcc8 [ 1523.948485][T28039] [ 1524.006812][T28046] FAULT_INJECTION: forcing a failure. [ 1524.006812][T28046] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1524.066139][T28046] CPU: 0 PID: 28046 Comm: syz.1.9209 Tainted: G W syzkaller #0 [ 1524.075142][T28046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1524.085238][T28046] Call Trace: [ 1524.088569][T28046] [ 1524.091520][T28046] __dump_stack+0x21/0x30 [ 1524.095889][T28046] dump_stack_lvl+0x110/0x170 [ 1524.100601][T28046] ? show_regs_print_info+0x20/0x20 [ 1524.105836][T28046] ? has_cap_mac_admin+0x370/0x370 [ 1524.111030][T28046] dump_stack+0x15/0x20 [ 1524.115317][T28046] should_fail+0x3c1/0x510 [ 1524.119753][T28046] should_fail_usercopy+0x1a/0x20 [ 1524.124798][T28046] _copy_from_user+0x20/0xd0 [ 1524.129456][T28046] get_user_ifreq+0x6c/0x180 [ 1524.134090][T28046] sock_ioctl+0x613/0x6f0 [ 1524.138467][T28046] ? sock_poll+0x3f0/0x3f0 [ 1524.142994][T28046] ? security_file_ioctl+0x84/0xa0 [ 1524.148142][T28046] ? sock_poll+0x3f0/0x3f0 [ 1524.152605][T28046] __se_sys_ioctl+0x121/0x1a0 [ 1524.157335][T28046] __x64_sys_ioctl+0x7b/0x90 [ 1524.161964][T28046] x64_sys_call+0x2f/0x9a0 [ 1524.166415][T28046] do_syscall_64+0x4c/0xa0 [ 1524.171033][T28046] ? clear_bhb_loop+0x50/0xa0 [ 1524.175731][T28046] ? clear_bhb_loop+0x50/0xa0 [ 1524.180431][T28046] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1524.186345][T28046] RIP: 0033:0x7fa08433dcb9 [ 1524.190780][T28046] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1524.210511][T28046] RSP: 002b:00007fa082d9a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1524.219055][T28046] RAX: ffffffffffffffda RBX: 00007fa0845b8fa0 RCX: 00007fa08433dcb9 [ 1524.227054][T28046] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000004 [ 1524.235053][T28046] RBP: 00007fa082d9a090 R08: 0000000000000000 R09: 0000000000000000 [ 1524.243042][T28046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1524.251030][T28046] R13: 00007fa0845b9038 R14: 00007fa0845b8fa0 R15: 00007ffcd1b1eda8 [ 1524.259203][T28046] [ 1524.378413][T28058] FAULT_INJECTION: forcing a failure. [ 1524.378413][T28058] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1524.486648][T28058] CPU: 1 PID: 28058 Comm: syz.1.9213 Tainted: G W syzkaller #0 [ 1524.495572][T28058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1524.505662][T28058] Call Trace: [ 1524.508968][T28058] [ 1524.512016][T28058] __dump_stack+0x21/0x30 [ 1524.516381][T28058] dump_stack_lvl+0x110/0x170 [ 1524.521086][T28058] ? show_regs_print_info+0x20/0x20 [ 1524.526315][T28058] ? vfs_write+0xc72/0xfd0 [ 1524.530766][T28058] dump_stack+0x15/0x20 [ 1524.535046][T28058] should_fail+0x3c1/0x510 [ 1524.539512][T28058] should_fail_usercopy+0x1a/0x20 [ 1524.544569][T28058] _copy_from_user+0x20/0xd0 [ 1524.549196][T28058] __sys_bpf+0x258/0x7d0 [ 1524.553475][T28058] ? bpf_link_show_fdinfo+0x330/0x330 [ 1524.558879][T28058] ? debug_smp_processor_id+0x17/0x20 [ 1524.564286][T28058] __x64_sys_bpf+0x7c/0x90 [ 1524.568734][T28058] x64_sys_call+0x4b9/0x9a0 [ 1524.573272][T28058] do_syscall_64+0x4c/0xa0 [ 1524.577723][T28058] ? clear_bhb_loop+0x50/0xa0 [ 1524.582430][T28058] ? clear_bhb_loop+0x50/0xa0 [ 1524.587135][T28058] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1524.593060][T28058] RIP: 0033:0x7fa08433dcb9 [ 1524.597504][T28058] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1524.617264][T28058] RSP: 002b:00007fa082d9a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1524.625729][T28058] RAX: ffffffffffffffda RBX: 00007fa0845b8fa0 RCX: 00007fa08433dcb9 [ 1524.633824][T28058] RDX: 000000000000000c RSI: 00002000000003c0 RDI: 000000000000000a [ 1524.641837][T28058] RBP: 00007fa082d9a090 R08: 0000000000000000 R09: 0000000000000000 [ 1524.649933][T28058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1524.658211][T28058] R13: 00007fa0845b9038 R14: 00007fa0845b8fa0 R15: 00007ffcd1b1eda8 [ 1524.666237][T28058] [ 1525.063031][T28074] device syzkaller0 entered promiscuous mode [ 1525.443249][T28075] syz.3.9219[28075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1525.447001][T28075] syz.3.9219[28075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1525.525873][T28091] FAULT_INJECTION: forcing a failure. [ 1525.525873][T28091] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1525.778270][T28091] CPU: 1 PID: 28091 Comm: syz.1.9222 Tainted: G W syzkaller #0 [ 1525.787292][T28091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1525.797391][T28091] Call Trace: [ 1525.800709][T28091] [ 1525.803681][T28091] __dump_stack+0x21/0x30 [ 1525.808061][T28091] dump_stack_lvl+0x110/0x170 [ 1525.812875][T28091] ? show_regs_print_info+0x20/0x20 [ 1525.818110][T28091] ? vfs_write+0xc72/0xfd0 [ 1525.822660][T28091] dump_stack+0x15/0x20 [ 1525.826851][T28091] should_fail+0x3c1/0x510 [ 1525.831290][T28091] should_fail_usercopy+0x1a/0x20 [ 1525.836333][T28091] _copy_from_user+0x20/0xd0 [ 1525.840944][T28091] __sys_bpf+0x258/0x7d0 [ 1525.845607][T28091] ? bpf_link_show_fdinfo+0x330/0x330 [ 1525.851115][T28091] ? debug_smp_processor_id+0x17/0x20 [ 1525.856526][T28091] __x64_sys_bpf+0x7c/0x90 [ 1525.861146][T28091] x64_sys_call+0x4b9/0x9a0 [ 1525.865682][T28091] do_syscall_64+0x4c/0xa0 [ 1525.870136][T28091] ? clear_bhb_loop+0x50/0xa0 [ 1525.874926][T28091] ? clear_bhb_loop+0x50/0xa0 [ 1525.879623][T28091] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1525.885622][T28091] RIP: 0033:0x7fa08433dcb9 [ 1525.890087][T28091] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1525.909736][T28091] RSP: 002b:00007fa082d9a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1525.918276][T28091] RAX: ffffffffffffffda RBX: 00007fa0845b8fa0 RCX: 00007fa08433dcb9 [ 1525.926276][T28091] RDX: 0000000000000048 RSI: 00002000000054c0 RDI: 0000000000000005 [ 1525.934263][T28091] RBP: 00007fa082d9a090 R08: 0000000000000000 R09: 0000000000000000 [ 1525.942247][T28091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1525.950261][T28091] R13: 00007fa0845b9038 R14: 00007fa0845b8fa0 R15: 00007ffcd1b1eda8 [ 1525.958253][T28091] [ 1526.983152][T28131] FAULT_INJECTION: forcing a failure. [ 1526.983152][T28131] name failslab, interval 1, probability 0, space 0, times 0 [ 1527.005429][T28131] CPU: 1 PID: 28131 Comm: syz.3.9240 Tainted: G W syzkaller #0 [ 1527.014365][T28131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1527.024540][T28131] Call Trace: [ 1527.027848][T28131] [ 1527.030803][T28131] __dump_stack+0x21/0x30 [ 1527.035217][T28131] dump_stack_lvl+0x110/0x170 [ 1527.039941][T28131] ? show_regs_print_info+0x20/0x20 [ 1527.045255][T28131] ? avc_has_perm+0x163/0x250 [ 1527.049963][T28131] ? security_file_permission+0x79/0xa0 [ 1527.055751][T28131] dump_stack+0x15/0x20 [ 1527.061711][T28131] should_fail+0x3c1/0x510 [ 1527.066229][T28131] __should_failslab+0xa4/0xe0 [ 1527.071042][T28131] should_failslab+0x9/0x20 [ 1527.075697][T28131] slab_pre_alloc_hook+0x3b/0xe0 [ 1527.080683][T28131] ? sock_alloc_inode+0x1b/0xb0 [ 1527.085576][T28131] kmem_cache_alloc+0x44/0x260 [ 1527.090395][T28131] ? sockfs_init_fs_context+0xb0/0xb0 [ 1527.095807][T28131] sock_alloc_inode+0x1b/0xb0 [ 1527.100531][T28131] ? sockfs_init_fs_context+0xb0/0xb0 [ 1527.105930][T28131] new_inode_pseudo+0x62/0x210 [ 1527.111005][T28131] __sock_create+0x12c/0x7a0 [ 1527.115901][T28131] __sys_socketpair+0x1a1/0x590 [ 1527.120993][T28131] __x64_sys_socketpair+0x9b/0xb0 [ 1527.126061][T28131] x64_sys_call+0x36/0x9a0 [ 1527.130685][T28131] do_syscall_64+0x4c/0xa0 [ 1527.135144][T28131] ? clear_bhb_loop+0x50/0xa0 [ 1527.139855][T28131] ? clear_bhb_loop+0x50/0xa0 [ 1527.144570][T28131] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1527.150582][T28131] RIP: 0033:0x7f1d30c19cb9 [ 1527.155570][T28131] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1527.175410][T28131] RSP: 002b:00007f1d2f676028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1527.184108][T28131] RAX: ffffffffffffffda RBX: 00007f1d30e94fa0 RCX: 00007f1d30c19cb9 [ 1527.192403][T28131] RDX: 0000000000000300 RSI: 0000000000000003 RDI: 0000000000000011 [ 1527.200518][T28131] RBP: 00007f1d2f676090 R08: 0000000000000000 R09: 0000000000000000 [ 1527.208645][T28131] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1527.216712][T28131] R13: 00007f1d30e95038 R14: 00007f1d30e94fa0 R15: 00007fff9028e4a8 [ 1527.224995][T28131] [ 1527.477846][T28131] socket: no more sockets [ 1527.516493][T28146] FAULT_INJECTION: forcing a failure. [ 1527.516493][T28146] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1527.537481][T28146] CPU: 0 PID: 28146 Comm: syz.0.9245 Tainted: G W syzkaller #0 [ 1527.546580][T28146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1527.557201][T28146] Call Trace: [ 1527.560519][T28146] [ 1527.563584][T28146] __dump_stack+0x21/0x30 [ 1527.568069][T28146] dump_stack_lvl+0x110/0x170 [ 1527.572819][T28146] ? show_regs_print_info+0x20/0x20 [ 1527.578068][T28146] ? vfs_write+0xc72/0xfd0 [ 1527.582604][T28146] dump_stack+0x15/0x20 [ 1527.586782][T28146] should_fail+0x3c1/0x510 [ 1527.591225][T28146] should_fail_usercopy+0x1a/0x20 [ 1527.596266][T28146] _copy_from_user+0x20/0xd0 [ 1527.600884][T28146] __sys_bpf+0x258/0x7d0 [ 1527.605252][T28146] ? bpf_link_show_fdinfo+0x330/0x330 [ 1527.610663][T28146] ? debug_smp_processor_id+0x17/0x20 [ 1527.616081][T28146] __x64_sys_bpf+0x7c/0x90 [ 1527.620539][T28146] x64_sys_call+0x4b9/0x9a0 [ 1527.625068][T28146] do_syscall_64+0x4c/0xa0 [ 1527.629597][T28146] ? clear_bhb_loop+0x50/0xa0 [ 1527.634295][T28146] ? clear_bhb_loop+0x50/0xa0 [ 1527.638989][T28146] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1527.644920][T28146] RIP: 0033:0x7fd302158cb9 [ 1527.649349][T28146] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1527.669076][T28146] RSP: 002b:00007fd300bb5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1527.677642][T28146] RAX: ffffffffffffffda RBX: 00007fd3023d3fa0 RCX: 00007fd302158cb9 [ 1527.685657][T28146] RDX: 000000000000000c RSI: 00002000000004c0 RDI: 000000000000000a [ 1527.694167][T28146] RBP: 00007fd300bb5090 R08: 0000000000000000 R09: 0000000000000000 [ 1527.702153][T28146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1527.710142][T28146] R13: 00007fd3023d4038 R14: 00007fd3023d3fa0 R15: 00007ffdf3cc0468 [ 1527.718134][T28146] [ 1527.809495][T28153] bridge0: port 2(bridge_slave_1) entered disabled state [ 1527.816934][T28153] bridge0: port 1(bridge_slave_0) entered disabled state [ 1527.826039][T28155] FAULT_INJECTION: forcing a failure. [ 1527.826039][T28155] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1527.839457][T28155] CPU: 1 PID: 28155 Comm: syz.2.9248 Tainted: G W syzkaller #0 [ 1527.848452][T28155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1527.858567][T28155] Call Trace: [ 1527.861884][T28155] [ 1527.864840][T28155] __dump_stack+0x21/0x30 [ 1527.869209][T28155] dump_stack_lvl+0x110/0x170 [ 1527.873919][T28155] ? show_regs_print_info+0x20/0x20 [ 1527.879262][T28155] ? vfs_write+0xc72/0xfd0 [ 1527.883825][T28155] dump_stack+0x15/0x20 [ 1527.888134][T28155] should_fail+0x3c1/0x510 [ 1527.892602][T28155] should_fail_usercopy+0x1a/0x20 [ 1527.897696][T28155] _copy_from_user+0x20/0xd0 [ 1527.902324][T28155] __sys_bpf+0x258/0x7d0 [ 1527.906611][T28155] ? bpf_link_show_fdinfo+0x330/0x330 [ 1527.912021][T28155] ? debug_smp_processor_id+0x17/0x20 [ 1527.917430][T28155] __x64_sys_bpf+0x7c/0x90 [ 1527.921882][T28155] x64_sys_call+0x4b9/0x9a0 [ 1527.926424][T28155] do_syscall_64+0x4c/0xa0 [ 1527.930889][T28155] ? clear_bhb_loop+0x50/0xa0 [ 1527.935604][T28155] ? clear_bhb_loop+0x50/0xa0 [ 1527.940319][T28155] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1527.946375][T28155] RIP: 0033:0x7fcf8d457cb9 [ 1527.950833][T28155] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1527.970759][T28155] RSP: 002b:00007fcf8beb4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1527.979323][T28155] RAX: ffffffffffffffda RBX: 00007fcf8d6d2fa0 RCX: 00007fcf8d457cb9 [ 1527.987441][T28155] RDX: 000000000000000c RSI: 00002000000004c0 RDI: 000000000000000a [ 1527.995459][T28155] RBP: 00007fcf8beb4090 R08: 0000000000000000 R09: 0000000000000000 [ 1528.003468][T28155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1528.011563][T28155] R13: 00007fcf8d6d3038 R14: 00007fcf8d6d2fa0 R15: 00007ffd4b1754c8 [ 1528.019691][T28155] [ 1528.208117][T28169] FAULT_INJECTION: forcing a failure. [ 1528.208117][T28169] name failslab, interval 1, probability 0, space 0, times 0 [ 1528.267520][T28169] CPU: 1 PID: 28169 Comm: syz.3.9253 Tainted: G W syzkaller #0 [ 1528.276569][T28169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1528.287221][T28169] Call Trace: [ 1528.290546][T28169] [ 1528.293512][T28169] __dump_stack+0x21/0x30 [ 1528.297890][T28169] dump_stack_lvl+0x110/0x170 [ 1528.302620][T28169] ? show_regs_print_info+0x20/0x20 [ 1528.307866][T28169] dump_stack+0x15/0x20 [ 1528.312068][T28169] should_fail+0x3c1/0x510 [ 1528.316529][T28169] __should_failslab+0xa4/0xe0 [ 1528.321343][T28169] should_failslab+0x9/0x20 [ 1528.325970][T28169] slab_pre_alloc_hook+0x3b/0xe0 [ 1528.330949][T28169] ? __alloc_skb+0xe0/0x740 [ 1528.335487][T28169] kmem_cache_alloc+0x44/0x260 [ 1528.340473][T28169] __alloc_skb+0xe0/0x740 [ 1528.344840][T28169] inet_netconf_notify_devconf+0x169/0x220 [ 1528.350677][T28169] inetdev_event+0x7d9/0x10a0 [ 1528.355388][T28169] ? devinet_exit_net+0x220/0x220 [ 1528.360442][T28169] ? up_read+0x56/0x1d0 [ 1528.364715][T28169] raw_notifier_call_chain+0x90/0x100 [ 1528.370118][T28169] unregister_netdevice_many+0x10a1/0x1aa0 [ 1528.375960][T28169] ? kasan_save_stack+0x3a/0x60 [ 1528.380842][T28169] ? kasan_record_aux_stack+0xe/0x10 [ 1528.386149][T28169] ? task_work_add+0x27/0x1e0 [ 1528.390848][T28169] ? alloc_netdev_mqs+0xc90/0xc90 [ 1528.395894][T28169] ? x64_sys_call+0x14e/0x9a0 [ 1528.400659][T28169] ? locks_remove_posix+0x550/0x550 [ 1528.405957][T28169] ? __kasan_check_read+0x11/0x20 [ 1528.411009][T28169] unregister_netdevice_queue+0x324/0x370 [ 1528.416782][T28169] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1528.423523][T28169] ? list_netdevice+0x4c0/0x4c0 [ 1528.428474][T28169] ppp_release+0xef/0x1f0 [ 1528.432924][T28169] ? ppp_open+0x70/0x70 [ 1528.437120][T28169] __fput+0x20b/0x8b0 [ 1528.441132][T28169] ____fput+0x15/0x20 [ 1528.445138][T28169] task_work_run+0x127/0x190 [ 1528.449753][T28169] exit_to_user_mode_loop+0xd0/0xe0 [ 1528.454990][T28169] exit_to_user_mode_prepare+0x87/0xd0 [ 1528.460475][T28169] syscall_exit_to_user_mode+0x1a/0x30 [ 1528.465972][T28169] do_syscall_64+0x58/0xa0 [ 1528.470424][T28169] ? clear_bhb_loop+0x50/0xa0 [ 1528.475123][T28169] ? clear_bhb_loop+0x50/0xa0 [ 1528.479819][T28169] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1528.485739][T28169] RIP: 0033:0x7f1d30c19cb9 [ 1528.490201][T28169] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1528.509838][T28169] RSP: 002b:00007f1d2f676028 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 1528.518275][T28169] RAX: 0000000000000000 RBX: 00007f1d30e94fa0 RCX: 00007f1d30c19cb9 [ 1528.526269][T28169] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1528.534270][T28169] RBP: 00007f1d2f676090 R08: 0000000000000000 R09: 0000000000000000 [ 1528.542643][T28169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1528.550682][T28169] R13: 00007f1d30e95038 R14: 00007f1d30e94fa0 R15: 00007fff9028e4a8 [ 1528.558716][T28169] [ 1528.619089][T28177] FAULT_INJECTION: forcing a failure. [ 1528.619089][T28177] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1528.635540][T28177] CPU: 1 PID: 28177 Comm: syz.2.9256 Tainted: G W syzkaller #0 [ 1528.644468][T28177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1528.654587][T28177] Call Trace: [ 1528.657908][T28177] [ 1528.660899][T28177] __dump_stack+0x21/0x30 [ 1528.665284][T28177] dump_stack_lvl+0x110/0x170 [ 1528.670012][T28177] ? show_regs_print_info+0x20/0x20 [ 1528.675255][T28177] ? vfs_write+0xc72/0xfd0 [ 1528.679741][T28177] dump_stack+0x15/0x20 [ 1528.683942][T28177] should_fail+0x3c1/0x510 [ 1528.688400][T28177] should_fail_usercopy+0x1a/0x20 [ 1528.693478][T28177] _copy_from_user+0x20/0xd0 [ 1528.698123][T28177] __sys_bpf+0x258/0x7d0 [ 1528.702422][T28177] ? bpf_link_show_fdinfo+0x330/0x330 [ 1528.707850][T28177] ? debug_smp_processor_id+0x17/0x20 [ 1528.713283][T28177] __x64_sys_bpf+0x7c/0x90 [ 1528.717751][T28177] x64_sys_call+0x4b9/0x9a0 [ 1528.722309][T28177] do_syscall_64+0x4c/0xa0 [ 1528.726774][T28177] ? clear_bhb_loop+0x50/0xa0 [ 1528.731482][T28177] ? clear_bhb_loop+0x50/0xa0 [ 1528.736192][T28177] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1528.742115][T28177] RIP: 0033:0x7fcf8d457cb9 [ 1528.746559][T28177] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1528.766527][T28177] RSP: 002b:00007fcf8beb4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1528.774987][T28177] RAX: ffffffffffffffda RBX: 00007fcf8d6d2fa0 RCX: 00007fcf8d457cb9 [ 1528.783015][T28177] RDX: 000000000000000c RSI: 00002000000004c0 RDI: 000000000000000a [ 1528.791022][T28177] RBP: 00007fcf8beb4090 R08: 0000000000000000 R09: 0000000000000000 [ 1528.799026][T28177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1528.807061][T28177] R13: 00007fcf8d6d3038 R14: 00007fcf8d6d2fa0 R15: 00007ffd4b1754c8 [ 1528.815365][T28177] [ 1529.118204][T28190] : renamed from veth0_vlan [ 1529.425747][T28179] syz.4.9257[28179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1529.491188][T28179] syz.4.9257[28179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1529.700005][T28216] FAULT_INJECTION: forcing a failure. [ 1529.700005][T28216] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1529.751654][T28216] CPU: 0 PID: 28216 Comm: syz.4.9268 Tainted: G W syzkaller #0 [ 1529.760597][T28216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1529.770713][T28216] Call Trace: [ 1529.774118][T28216] [ 1529.777084][T28216] __dump_stack+0x21/0x30 [ 1529.781451][T28216] dump_stack_lvl+0x110/0x170 [ 1529.786331][T28216] ? show_regs_print_info+0x20/0x20 [ 1529.791601][T28216] ? vfs_write+0xc72/0xfd0 [ 1529.796075][T28216] dump_stack+0x15/0x20 [ 1529.800296][T28216] should_fail+0x3c1/0x510 [ 1529.804968][T28216] should_fail_usercopy+0x1a/0x20 [ 1529.810059][T28216] _copy_from_user+0x20/0xd0 [ 1529.814698][T28216] __sys_bpf+0x258/0x7d0 [ 1529.819174][T28216] ? bpf_link_show_fdinfo+0x330/0x330 [ 1529.824600][T28216] ? debug_smp_processor_id+0x17/0x20 [ 1529.830208][T28216] __x64_sys_bpf+0x7c/0x90 [ 1529.834673][T28216] x64_sys_call+0x4b9/0x9a0 [ 1529.839213][T28216] do_syscall_64+0x4c/0xa0 [ 1529.843681][T28216] ? clear_bhb_loop+0x50/0xa0 [ 1529.848390][T28216] ? clear_bhb_loop+0x50/0xa0 [ 1529.853234][T28216] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1529.859287][T28216] RIP: 0033:0x7f4b84397cb9 [ 1529.863920][T28216] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1529.883603][T28216] RSP: 002b:00007f4b82df4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1529.892149][T28216] RAX: ffffffffffffffda RBX: 00007f4b84612fa0 RCX: 00007f4b84397cb9 [ 1529.900286][T28216] RDX: 000000000000000c RSI: 0000200000000080 RDI: 000000000000000a [ 1529.908478][T28216] RBP: 00007f4b82df4090 R08: 0000000000000000 R09: 0000000000000000 [ 1529.916686][T28216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1529.924826][T28216] R13: 00007f4b84613038 R14: 00007f4b84612fa0 R15: 00007ffe568ddcc8 [ 1529.932863][T28216] [ 1530.086583][T28225] device syzkaller0 entered promiscuous mode [ 1530.128131][T28239] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 1531.085866][T28255] FAULT_INJECTION: forcing a failure. [ 1531.085866][T28255] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1531.127602][T28255] CPU: 0 PID: 28255 Comm: syz.4.9284 Tainted: G W syzkaller #0 [ 1531.136542][T28255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1531.146735][T28255] Call Trace: [ 1531.150048][T28255] [ 1531.153004][T28255] __dump_stack+0x21/0x30 [ 1531.157372][T28255] dump_stack_lvl+0x110/0x170 [ 1531.162086][T28255] ? show_regs_print_info+0x20/0x20 [ 1531.167314][T28255] dump_stack+0x15/0x20 [ 1531.171512][T28255] should_fail+0x3c1/0x510 [ 1531.175952][T28255] should_fail_usercopy+0x1a/0x20 [ 1531.181197][T28255] _copy_from_user+0x20/0xd0 [ 1531.186491][T28255] do_vfs_ioctl+0x17af/0x1d80 [ 1531.191232][T28255] ? __ia32_compat_sys_ioctl+0x900/0x900 [ 1531.196928][T28255] ? ioctl_has_perm+0x1b8/0x4f0 [ 1531.201827][T28255] ? ioctl_has_perm+0x3ab/0x4f0 [ 1531.206756][T28255] ? security_file_permission+0x79/0xa0 [ 1531.212475][T28255] ? has_cap_mac_admin+0x370/0x370 [ 1531.217701][T28255] ? vfs_write+0xc72/0xfd0 [ 1531.222158][T28255] ? selinux_file_ioctl+0x3a0/0x4d0 [ 1531.227476][T28255] ? selinux_file_alloc_security+0x120/0x120 [ 1531.233493][T28255] ? mutex_unlock+0x8f/0x230 [ 1531.238211][T28255] ? __mutex_lock_slowpath+0x10/0x10 [ 1531.243546][T28255] ? __fget_files+0x2c4/0x320 [ 1531.248359][T28255] ? security_file_ioctl+0x84/0xa0 [ 1531.253518][T28255] __se_sys_ioctl+0x9f/0x1a0 [ 1531.258150][T28255] __x64_sys_ioctl+0x7b/0x90 [ 1531.262793][T28255] x64_sys_call+0x2f/0x9a0 [ 1531.267247][T28255] do_syscall_64+0x4c/0xa0 [ 1531.271789][T28255] ? clear_bhb_loop+0x50/0xa0 [ 1531.276511][T28255] ? clear_bhb_loop+0x50/0xa0 [ 1531.281237][T28255] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1531.287170][T28255] RIP: 0033:0x7f4b84397cb9 [ 1531.291623][T28255] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1531.311269][T28255] RSP: 002b:00007f4b82df4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1531.319940][T28255] RAX: ffffffffffffffda RBX: 00007f4b84612fa0 RCX: 00007f4b84397cb9 [ 1531.328108][T28255] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000006 [ 1531.336342][T28255] RBP: 00007f4b82df4090 R08: 0000000000000000 R09: 0000000000000000 [ 1531.344711][T28255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1531.353057][T28255] R13: 00007f4b84613038 R14: 00007f4b84612fa0 R15: 00007ffe568ddcc8 [ 1531.361168][T28255] [ 1531.853409][T28276] FAULT_INJECTION: forcing a failure. [ 1531.853409][T28276] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1531.894752][T28276] CPU: 1 PID: 28276 Comm: syz.0.9290 Tainted: G W syzkaller #0 [ 1531.903825][T28276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1531.914197][T28276] Call Trace: [ 1531.917556][T28276] [ 1531.920955][T28276] __dump_stack+0x21/0x30 [ 1531.925509][T28276] dump_stack_lvl+0x110/0x170 [ 1531.930332][T28276] ? show_regs_print_info+0x20/0x20 [ 1531.935752][T28276] ? vfs_write+0xc72/0xfd0 [ 1531.940337][T28276] dump_stack+0x15/0x20 [ 1531.944544][T28276] should_fail+0x3c1/0x510 [ 1531.948999][T28276] should_fail_usercopy+0x1a/0x20 [ 1531.954075][T28276] _copy_from_user+0x20/0xd0 [ 1531.958688][T28276] __sys_bpf+0x258/0x7d0 [ 1531.962966][T28276] ? bpf_link_show_fdinfo+0x330/0x330 [ 1531.968804][T28276] ? debug_smp_processor_id+0x17/0x20 [ 1531.974502][T28276] __x64_sys_bpf+0x7c/0x90 [ 1531.979167][T28276] x64_sys_call+0x4b9/0x9a0 [ 1531.983817][T28276] do_syscall_64+0x4c/0xa0 [ 1531.988513][T28276] ? clear_bhb_loop+0x50/0xa0 [ 1531.993247][T28276] ? clear_bhb_loop+0x50/0xa0 [ 1531.998063][T28276] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1532.004197][T28276] RIP: 0033:0x7fd302158cb9 [ 1532.008908][T28276] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1532.029385][T28276] RSP: 002b:00007fd300bb5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1532.037832][T28276] RAX: ffffffffffffffda RBX: 00007fd3023d3fa0 RCX: 00007fd302158cb9 [ 1532.045881][T28276] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 1532.053873][T28276] RBP: 00007fd300bb5090 R08: 0000000000000000 R09: 0000000000000000 [ 1532.061864][T28276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1532.070014][T28276] R13: 00007fd3023d4038 R14: 00007fd3023d3fa0 R15: 00007ffdf3cc0468 [ 1532.078026][T28276] [ 1532.402476][T28290] device syzkaller0 entered promiscuous mode [ 1532.621196][T28296] Â: renamed from pim6reg1 [ 1533.729807][T28323] device syzkaller0 entered promiscuous mode [ 1534.183327][ T30] audit: type=1400 audit(1769209254.132:149): avc: denied { attach_queue } for pid=28346 comm="syz.4.9317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1534.245438][T28360] device syzkaller0 entered promiscuous mode [ 1534.258608][T28362] FAULT_INJECTION: forcing a failure. [ 1534.258608][T28362] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1534.303649][T28362] CPU: 0 PID: 28362 Comm: syz.0.9323 Tainted: G W syzkaller #0 [ 1534.312668][T28362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1534.322837][T28362] Call Trace: [ 1534.326322][T28362] [ 1534.329276][T28362] __dump_stack+0x21/0x30 [ 1534.333638][T28362] dump_stack_lvl+0x110/0x170 [ 1534.338342][T28362] ? show_regs_print_info+0x20/0x20 [ 1534.343581][T28362] dump_stack+0x15/0x20 [ 1534.347884][T28362] should_fail+0x3c1/0x510 [ 1534.352441][T28362] should_fail_usercopy+0x1a/0x20 [ 1534.357498][T28362] _copy_from_iter+0x21e/0x1070 [ 1534.362384][T28362] ? stack_trace_save+0xf0/0xf0 [ 1534.367356][T28362] ? copy_mc_pipe_to_iter+0x770/0x770 [ 1534.372759][T28362] ? stack_trace_save+0xa6/0xf0 [ 1534.377645][T28362] tun_get_user+0x415/0x3400 [ 1534.382271][T28362] ? ____kasan_slab_free+0x125/0x160 [ 1534.387600][T28362] ? kmem_cache_free+0xd0/0x320 [ 1534.392480][T28362] ? putname+0x111/0x160 [ 1534.396754][T28362] ? do_sys_openat2+0x6df/0x7f0 [ 1534.401638][T28362] ? do_syscall_64+0x4c/0xa0 [ 1534.406268][T28362] ? tun_do_read+0x1d30/0x1d30 [ 1534.411191][T28362] ? kstrtouint_from_user+0x1c4/0x220 [ 1534.416594][T28362] ? kstrtol_from_user+0x2a0/0x2a0 [ 1534.418790][T28369] device syzkaller0 entered promiscuous mode [ 1534.421829][T28362] ? avc_policy_seqno+0x1b/0x70 [ 1534.432702][T28362] ? selinux_file_permission+0x2aa/0x510 [ 1534.438367][T28362] tun_chr_write_iter+0x1eb/0x2e0 [ 1534.443415][T28362] vfs_write+0x835/0xfd0 [ 1534.447684][T28362] ? file_end_write+0x1b0/0x1b0 [ 1534.452558][T28362] ? __fget_files+0x2c4/0x320 [ 1534.457253][T28362] ? __fdget_pos+0x1f7/0x380 [ 1534.461867][T28362] ? ksys_write+0x71/0x250 [ 1534.466300][T28362] ksys_write+0x149/0x250 [ 1534.470641][T28362] ? __ia32_sys_read+0x90/0x90 [ 1534.475418][T28362] ? debug_smp_processor_id+0x17/0x20 [ 1534.481095][T28362] __x64_sys_write+0x7b/0x90 [ 1534.485711][T28362] x64_sys_call+0x8ef/0x9a0 [ 1534.490235][T28362] do_syscall_64+0x4c/0xa0 [ 1534.494681][T28362] ? clear_bhb_loop+0x50/0xa0 [ 1534.499374][T28362] ? clear_bhb_loop+0x50/0xa0 [ 1534.504066][T28362] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1534.509982][T28362] RIP: 0033:0x7fd302158cb9 [ 1534.514503][T28362] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1534.534268][T28362] RSP: 002b:00007fd300bb5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1534.542707][T28362] RAX: ffffffffffffffda RBX: 00007fd3023d3fa0 RCX: 00007fd302158cb9 [ 1534.550693][T28362] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000008 [ 1534.558773][T28362] RBP: 00007fd300bb5090 R08: 0000000000000000 R09: 0000000000000000 [ 1534.566759][T28362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1534.574743][T28362] R13: 00007fd3023d4038 R14: 00007fd3023d3fa0 R15: 00007ffdf3cc0468 [ 1534.582839][T28362] [ 1535.047794][T28392] device sit0 entered promiscuous mode [ 1535.210466][T28388] device macsec0 entered promiscuous mode [ 1535.758480][T28441] device sit0 entered promiscuous mode [ 1535.825436][T28431] device sit0 left promiscuous mode [ 1536.217189][T28449] device macsec0 entered promiscuous mode [ 1536.304067][T28465] device syzkaller0 entered promiscuous mode [ 1536.609110][T28484] device syzkaller0 entered promiscuous mode [ 1537.599238][T28520] device syzkaller0 entered promiscuous mode [ 1538.518064][T28555] FAULT_INJECTION: forcing a failure. [ 1538.518064][T28555] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1538.634634][T28555] CPU: 0 PID: 28555 Comm: syz.3.9393 Tainted: G W syzkaller #0 [ 1538.643636][T28555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1538.653833][T28555] Call Trace: [ 1538.657261][T28555] [ 1538.660211][T28555] __dump_stack+0x21/0x30 [ 1538.664618][T28555] dump_stack_lvl+0x110/0x170 [ 1538.669504][T28555] ? show_regs_print_info+0x20/0x20 [ 1538.674759][T28555] dump_stack+0x15/0x20 [ 1538.679039][T28555] should_fail+0x3c1/0x510 [ 1538.683496][T28555] should_fail_usercopy+0x1a/0x20 [ 1538.688557][T28555] strncpy_from_user+0x24/0x2e0 [ 1538.693454][T28555] bpf_prog_load+0x1fb/0x1640 [ 1538.698255][T28555] ? proc_fail_nth_write+0x180/0x200 [ 1538.703581][T28555] ? map_freeze+0x360/0x360 [ 1538.708320][T28555] ? selinux_bpf+0xc7/0xf0 [ 1538.712882][T28555] ? security_bpf+0x82/0xa0 [ 1538.717516][T28555] __sys_bpf+0x51d/0x7d0 [ 1538.721796][T28555] ? bpf_link_show_fdinfo+0x330/0x330 [ 1538.727207][T28555] ? debug_smp_processor_id+0x17/0x20 [ 1538.732617][T28555] __x64_sys_bpf+0x7c/0x90 [ 1538.737191][T28555] x64_sys_call+0x4b9/0x9a0 [ 1538.741724][T28555] do_syscall_64+0x4c/0xa0 [ 1538.745629][T28558] device syzkaller0 entered promiscuous mode [ 1538.746178][T28555] ? clear_bhb_loop+0x50/0xa0 [ 1538.756959][T28555] ? clear_bhb_loop+0x50/0xa0 [ 1538.761808][T28555] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1538.767784][T28555] RIP: 0033:0x7f1d30c19cb9 [ 1538.772245][T28555] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1538.791983][T28555] RSP: 002b:00007f1d2f676028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1538.800444][T28555] RAX: ffffffffffffffda RBX: 00007f1d30e94fa0 RCX: 00007f1d30c19cb9 [ 1538.809044][T28555] RDX: 0000000000000094 RSI: 0000200000000140 RDI: 0000000000000005 [ 1538.817051][T28555] RBP: 00007f1d2f676090 R08: 0000000000000000 R09: 0000000000000000 [ 1538.825238][T28555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1538.833466][T28555] R13: 00007f1d30e95038 R14: 00007f1d30e94fa0 R15: 00007fff9028e4a8 [ 1538.841742][T28555] [ 1539.206831][T28568] device syzkaller0 entered promiscuous mode [ 1539.238295][T28573] device veth0_vlan left promiscuous mode [ 1539.247689][T28573] device veth0_vlan entered promiscuous mode [ 1539.273448][ T30] audit: type=1400 audit(1769209259.222:150): avc: denied { create } for pid=28576 comm="syz.1.9402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 1539.370833][T28577] ref_ctr_offset mismatch. inode: 0x2c4 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1539.559050][T28586] device syzkaller0 entered promiscuous mode [ 1539.719744][T28599] FAULT_INJECTION: forcing a failure. [ 1539.719744][T28599] name failslab, interval 1, probability 0, space 0, times 0 [ 1539.771646][T28607] FAULT_INJECTION: forcing a failure. [ 1539.771646][T28607] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1539.792288][T28609] FAULT_INJECTION: forcing a failure. [ 1539.792288][T28609] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1539.809446][T28607] CPU: 0 PID: 28607 Comm: syz.0.9414 Tainted: G W syzkaller #0 [ 1539.818471][T28607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1539.828735][T28607] Call Trace: [ 1539.832339][T28607] [ 1539.835411][T28607] __dump_stack+0x21/0x30 [ 1539.839869][T28607] dump_stack_lvl+0x110/0x170 [ 1539.844681][T28607] ? show_regs_print_info+0x20/0x20 [ 1539.850003][T28607] dump_stack+0x15/0x20 [ 1539.854285][T28607] should_fail+0x3c1/0x510 [ 1539.858963][T28607] should_fail_usercopy+0x1a/0x20 [ 1539.864244][T28607] _copy_to_user+0x20/0x90 [ 1539.868706][T28607] bpf_prog_test_run_raw_tp+0x500/0x680 [ 1539.874303][T28607] ? bpf_prog_test_run_tracing+0x500/0x500 [ 1539.880161][T28607] ? fput_many+0x15a/0x1a0 [ 1539.884669][T28607] ? bpf_prog_test_run_tracing+0x500/0x500 [ 1539.890517][T28607] bpf_prog_test_run+0x3d5/0x630 [ 1539.895589][T28607] ? bpf_prog_query+0x230/0x230 [ 1539.900476][T28607] ? selinux_bpf+0xce/0xf0 [ 1539.905050][T28607] ? security_bpf+0x82/0xa0 [ 1539.910027][T28607] __sys_bpf+0x590/0x7d0 [ 1539.914480][T28607] ? bpf_link_show_fdinfo+0x330/0x330 [ 1539.919888][T28607] ? debug_smp_processor_id+0x17/0x20 [ 1539.925293][T28607] __x64_sys_bpf+0x7c/0x90 [ 1539.930047][T28607] x64_sys_call+0x4b9/0x9a0 [ 1539.934730][T28607] do_syscall_64+0x4c/0xa0 [ 1539.939198][T28607] ? clear_bhb_loop+0x50/0xa0 [ 1539.944162][T28607] ? clear_bhb_loop+0x50/0xa0 [ 1539.948990][T28607] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1539.954949][T28607] RIP: 0033:0x7fd302158cb9 [ 1539.959386][T28607] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1539.979145][T28607] RSP: 002b:00007fd300bb5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1539.987588][T28607] RAX: ffffffffffffffda RBX: 00007fd3023d3fa0 RCX: 00007fd302158cb9 [ 1539.996686][T28607] RDX: 000000000000000c RSI: 0000200000000400 RDI: 000000000000000a [ 1540.004684][T28607] RBP: 00007fd300bb5090 R08: 0000000000000000 R09: 0000000000000000 [ 1540.012841][T28607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1540.021027][T28607] R13: 00007fd3023d4038 R14: 00007fd3023d3fa0 R15: 00007ffdf3cc0468 [ 1540.029136][T28607] [ 1540.034496][T28599] CPU: 1 PID: 28599 Comm: syz.4.9410 Tainted: G W syzkaller #0 [ 1540.043923][T28599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1540.054088][T28599] Call Trace: [ 1540.057401][T28599] [ 1540.060370][T28599] __dump_stack+0x21/0x30 [ 1540.064808][T28599] dump_stack_lvl+0x110/0x170 [ 1540.069503][T28599] ? show_regs_print_info+0x20/0x20 [ 1540.074725][T28599] ? __kasan_slab_alloc+0xcf/0xf0 [ 1540.079776][T28599] ? slab_post_alloc_hook+0x4f/0x2b0 [ 1540.085186][T28599] ? kmem_cache_alloc+0xf7/0x260 [ 1540.090247][T28599] ? security_inode_alloc+0x33/0x110 [ 1540.095652][T28599] ? new_inode_pseudo+0x91/0x210 [ 1540.100919][T28599] dump_stack+0x15/0x20 [ 1540.105101][T28599] should_fail+0x3c1/0x510 [ 1540.109545][T28599] __should_failslab+0xa4/0xe0 [ 1540.114337][T28599] should_failslab+0x9/0x20 [ 1540.119077][T28599] slab_pre_alloc_hook+0x3b/0xe0 [ 1540.124064][T28599] ? __alloc_skb+0xe0/0x740 [ 1540.128600][T28599] kmem_cache_alloc+0x44/0x260 [ 1540.133398][T28599] ? avc_denied+0x1b0/0x1b0 [ 1540.137922][T28599] __alloc_skb+0xe0/0x740 [ 1540.142272][T28599] alloc_skb_with_frags+0xa8/0x620 [ 1540.147402][T28599] ? memcpy+0x56/0x70 [ 1540.151410][T28599] sock_alloc_send_pskb+0x87f/0x9a0 [ 1540.156823][T28599] ? sock_kzfree_s+0x60/0x60 [ 1540.161431][T28599] ? __kasan_check_write+0x14/0x20 [ 1540.166556][T28599] ? _raw_spin_lock+0x94/0xf0 [ 1540.171255][T28599] ? _raw_spin_trylock_bh+0x150/0x150 [ 1540.176645][T28599] unix_dgram_sendmsg+0x5f7/0x1890 [ 1540.182194][T28599] ? selinux_socket_sendmsg+0x22f/0x340 [ 1540.187867][T28599] ? unix_dgram_poll+0x6c0/0x6c0 [ 1540.192918][T28599] ? kasan_set_track+0x5b/0x70 [ 1540.197727][T28599] ? kasan_set_track+0x4a/0x70 [ 1540.202510][T28599] ? security_socket_sendmsg+0x82/0xa0 [ 1540.207984][T28599] ? unix_dgram_poll+0x6c0/0x6c0 [ 1540.212963][T28599] ____sys_sendmsg+0x5b7/0x8f0 [ 1540.217746][T28599] ? __sys_sendmsg_sock+0x40/0x40 [ 1540.222790][T28599] ? kstrtouint_from_user+0x1c4/0x220 [ 1540.228185][T28599] ? import_iovec+0x7c/0xb0 [ 1540.232708][T28599] ___sys_sendmsg+0x236/0x2e0 [ 1540.237403][T28599] ? __sys_sendmsg+0x280/0x280 [ 1540.242186][T28599] ? __fdget+0x1a1/0x230 [ 1540.246452][T28599] __x64_sys_sendmsg+0x206/0x2f0 [ 1540.251409][T28599] ? ___sys_sendmsg+0x2e0/0x2e0 [ 1540.256272][T28599] ? ksys_write+0x1f4/0x250 [ 1540.260791][T28599] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 1540.267148][T28599] x64_sys_call+0x4b/0x9a0 [ 1540.271586][T28599] do_syscall_64+0x4c/0xa0 [ 1540.276042][T28599] ? clear_bhb_loop+0x50/0xa0 [ 1540.280732][T28599] ? clear_bhb_loop+0x50/0xa0 [ 1540.285423][T28599] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1540.291331][T28599] RIP: 0033:0x7f4b84397cb9 [ 1540.295776][T28599] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1540.315521][T28599] RSP: 002b:00007f4b82df4028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1540.323960][T28599] RAX: ffffffffffffffda RBX: 00007f4b84612fa0 RCX: 00007f4b84397cb9 [ 1540.331953][T28599] RDX: 0000000020000000 RSI: 0000200000000100 RDI: 0000000000000005 [ 1540.339943][T28599] RBP: 00007f4b82df4090 R08: 0000000000000000 R09: 0000000000000000 [ 1540.348038][T28599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1540.356030][T28599] R13: 00007f4b84613038 R14: 00007f4b84612fa0 R15: 00007ffe568ddcc8 [ 1540.364124][T28599] [ 1540.376362][T28609] CPU: 0 PID: 28609 Comm: syz.3.9415 Tainted: G W syzkaller #0 [ 1540.385398][T28609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1540.395753][T28609] Call Trace: [ 1540.399066][T28609] [ 1540.402111][T28609] __dump_stack+0x21/0x30 [ 1540.406482][T28609] dump_stack_lvl+0x110/0x170 [ 1540.411205][T28609] ? show_regs_print_info+0x20/0x20 [ 1540.416442][T28609] dump_stack+0x15/0x20 [ 1540.420627][T28609] should_fail+0x3c1/0x510 [ 1540.425074][T28609] should_fail_usercopy+0x1a/0x20 [ 1540.430136][T28609] strncpy_from_user+0x24/0x2e0 [ 1540.435042][T28609] bpf_prog_load+0x1fb/0x1640 [ 1540.439750][T28609] ? proc_fail_nth_write+0x180/0x200 [ 1540.445075][T28609] ? map_freeze+0x360/0x360 [ 1540.449609][T28609] ? selinux_bpf+0xc7/0xf0 [ 1540.454052][T28609] ? security_bpf+0x82/0xa0 [ 1540.458606][T28609] __sys_bpf+0x51d/0x7d0 [ 1540.462958][T28609] ? bpf_link_show_fdinfo+0x330/0x330 [ 1540.468353][T28609] ? debug_smp_processor_id+0x17/0x20 [ 1540.473747][T28609] __x64_sys_bpf+0x7c/0x90 [ 1540.478175][T28609] x64_sys_call+0x4b9/0x9a0 [ 1540.482694][T28609] do_syscall_64+0x4c/0xa0 [ 1540.487129][T28609] ? clear_bhb_loop+0x50/0xa0 [ 1540.491819][T28609] ? clear_bhb_loop+0x50/0xa0 [ 1540.496522][T28609] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1540.502440][T28609] RIP: 0033:0x7f1d30c19cb9 [ 1540.506876][T28609] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1540.526623][T28609] RSP: 002b:00007f1d2f676028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1540.535320][T28609] RAX: ffffffffffffffda RBX: 00007f1d30e94fa0 RCX: 00007f1d30c19cb9 [ 1540.543397][T28609] RDX: 0000000000000048 RSI: 00002000000054c0 RDI: 0000000000000005 [ 1540.551381][T28609] RBP: 00007f1d2f676090 R08: 0000000000000000 R09: 0000000000000000 [ 1540.559631][T28609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1540.567622][T28609] R13: 00007f1d30e95038 R14: 00007f1d30e94fa0 R15: 00007fff9028e4a8 [ 1540.575793][T28609] [ 1540.630136][T28616] FAULT_INJECTION: forcing a failure. [ 1540.630136][T28616] name failslab, interval 1, probability 0, space 0, times 0 [ 1540.663072][T28616] CPU: 1 PID: 28616 Comm: syz.0.9418 Tainted: G W syzkaller #0 [ 1540.672082][T28616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1540.682348][T28616] Call Trace: [ 1540.685854][T28616] [ 1540.688817][T28616] __dump_stack+0x21/0x30 [ 1540.693273][T28616] dump_stack_lvl+0x110/0x170 [ 1540.698210][T28616] ? show_regs_print_info+0x20/0x20 [ 1540.703579][T28616] dump_stack+0x15/0x20 [ 1540.707773][T28616] should_fail+0x3c1/0x510 [ 1540.712222][T28616] __should_failslab+0xa4/0xe0 [ 1540.717016][T28616] should_failslab+0x9/0x20 [ 1540.721554][T28616] slab_pre_alloc_hook+0x3b/0xe0 [ 1540.726549][T28616] __kmalloc+0x6d/0x2c0 [ 1540.730760][T28616] ? bpf_test_init+0x100/0x1c0 [ 1540.735611][T28616] bpf_test_init+0x100/0x1c0 [ 1540.740239][T28616] bpf_prog_test_run_xdp+0x1cb/0x910 [ 1540.745560][T28616] ? __kasan_check_write+0x14/0x20 [ 1540.750713][T28616] ? dev_put+0x80/0x80 [ 1540.754818][T28616] ? __fget_files+0x2c4/0x320 [ 1540.759546][T28616] ? fput_many+0x15a/0x1a0 [ 1540.763996][T28616] ? dev_put+0x80/0x80 [ 1540.768104][T28616] bpf_prog_test_run+0x3d5/0x630 [ 1540.773079][T28616] ? bpf_prog_query+0x230/0x230 [ 1540.777974][T28616] ? selinux_bpf+0xce/0xf0 [ 1540.782434][T28616] ? security_bpf+0x82/0xa0 [ 1540.786978][T28616] __sys_bpf+0x590/0x7d0 [ 1540.791272][T28616] ? bpf_link_show_fdinfo+0x330/0x330 [ 1540.796694][T28616] ? debug_smp_processor_id+0x17/0x20 [ 1540.802147][T28616] __x64_sys_bpf+0x7c/0x90 [ 1540.806594][T28616] x64_sys_call+0x4b9/0x9a0 [ 1540.811215][T28616] do_syscall_64+0x4c/0xa0 [ 1540.815665][T28616] ? clear_bhb_loop+0x50/0xa0 [ 1540.820382][T28616] ? clear_bhb_loop+0x50/0xa0 [ 1540.825390][T28616] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1540.831497][T28616] RIP: 0033:0x7fd302158cb9 [ 1540.836051][T28616] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1540.855729][T28616] RSP: 002b:00007fd300bb5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1540.864191][T28616] RAX: ffffffffffffffda RBX: 00007fd3023d3fa0 RCX: 00007fd302158cb9 [ 1540.872199][T28616] RDX: 000000000000000c RSI: 00002000000003c0 RDI: 000000000000000a [ 1540.880450][T28616] RBP: 00007fd300bb5090 R08: 0000000000000000 R09: 0000000000000000 [ 1540.888479][T28616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1540.896487][T28616] R13: 00007fd3023d4038 R14: 00007fd3023d3fa0 R15: 00007ffdf3cc0468 [ 1540.904721][T28616] [ 1541.122058][T28630] device veth0_vlan left promiscuous mode [ 1541.134439][T28630] device veth0_vlan entered promiscuous mode [ 1541.154917][T18687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1541.183163][T18687] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1541.197249][T18687] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1541.272505][T28639] FAULT_INJECTION: forcing a failure. [ 1541.272505][T28639] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1541.355828][T28639] CPU: 1 PID: 28639 Comm: syz.0.9425 Tainted: G W syzkaller #0 [ 1541.364754][T28639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1541.374848][T28639] Call Trace: [ 1541.378158][T28639] [ 1541.381120][T28639] __dump_stack+0x21/0x30 [ 1541.385577][T28639] dump_stack_lvl+0x110/0x170 [ 1541.390287][T28639] ? show_regs_print_info+0x20/0x20 [ 1541.395522][T28639] dump_stack+0x15/0x20 [ 1541.399829][T28639] should_fail+0x3c1/0x510 [ 1541.404294][T28639] should_fail_usercopy+0x1a/0x20 [ 1541.409360][T28639] _copy_from_user+0x20/0xd0 [ 1541.413988][T28639] vti6_siocdevprivate+0x3a9/0xd80 [ 1541.419399][T28639] ? vti6_tnl_xmit+0x1900/0x1900 [ 1541.424380][T28639] ? full_name_hash+0xbd/0xf0 [ 1541.429107][T28639] dev_ifsioc+0xc12/0xf90 [ 1541.433474][T28639] ? security_file_permission+0x79/0xa0 [ 1541.439345][T28639] ? dev_ioctl+0xd10/0xd10 [ 1541.443795][T28639] ? __kasan_check_write+0x14/0x20 [ 1541.448937][T28639] ? mutex_lock+0x9b/0x1c0 [ 1541.453381][T28639] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1541.460198][T28639] ? dev_get_by_name_rcu+0xc8/0xf0 [ 1541.465479][T28639] dev_ioctl+0x5fd/0xd10 [ 1541.469786][T28639] sock_ioctl+0x66d/0x6f0 [ 1541.474158][T28639] ? sock_poll+0x3f0/0x3f0 [ 1541.478617][T28639] ? security_file_ioctl+0x84/0xa0 [ 1541.483774][T28639] ? sock_poll+0x3f0/0x3f0 [ 1541.488220][T28639] __se_sys_ioctl+0x121/0x1a0 [ 1541.492932][T28639] __x64_sys_ioctl+0x7b/0x90 [ 1541.497688][T28639] x64_sys_call+0x2f/0x9a0 [ 1541.502261][T28639] do_syscall_64+0x4c/0xa0 [ 1541.506724][T28639] ? clear_bhb_loop+0x50/0xa0 [ 1541.511449][T28639] ? clear_bhb_loop+0x50/0xa0 [ 1541.516315][T28639] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1541.522260][T28639] RIP: 0033:0x7fd302158cb9 [ 1541.526731][T28639] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1541.546388][T28639] RSP: 002b:00007fd300bb5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1541.554851][T28639] RAX: ffffffffffffffda RBX: 00007fd3023d3fa0 RCX: 00007fd302158cb9 [ 1541.562964][T28639] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000004 [ 1541.570979][T28639] RBP: 00007fd300bb5090 R08: 0000000000000000 R09: 0000000000000000 [ 1541.578985][T28639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1541.586987][T28639] R13: 00007fd3023d4038 R14: 00007fd3023d3fa0 R15: 00007ffdf3cc0468 [ 1541.594998][T28639] [ 1541.650481][T28648] FAULT_INJECTION: forcing a failure. [ 1541.650481][T28648] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1541.787655][T28648] CPU: 0 PID: 28648 Comm: syz.1.9429 Tainted: G W syzkaller #0 [ 1541.796628][T28648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1541.806816][T28648] Call Trace: [ 1541.810149][T28648] [ 1541.813107][T28648] __dump_stack+0x21/0x30 [ 1541.817482][T28648] dump_stack_lvl+0x110/0x170 [ 1541.822193][T28648] ? show_regs_print_info+0x20/0x20 [ 1541.827438][T28648] dump_stack+0x15/0x20 [ 1541.831631][T28648] should_fail+0x3c1/0x510 [ 1541.836089][T28648] should_fail_usercopy+0x1a/0x20 [ 1541.841417][T28648] strncpy_from_user+0x24/0x2e0 [ 1541.846397][T28648] bpf_prog_load+0x1fb/0x1640 [ 1541.851279][T28648] ? proc_fail_nth_write+0x180/0x200 [ 1541.856647][T28648] ? map_freeze+0x360/0x360 [ 1541.861191][T28648] ? selinux_bpf+0xc7/0xf0 [ 1541.865723][T28648] ? security_bpf+0x82/0xa0 [ 1541.870271][T28648] __sys_bpf+0x51d/0x7d0 [ 1541.874676][T28648] ? bpf_link_show_fdinfo+0x330/0x330 [ 1541.880090][T28648] ? debug_smp_processor_id+0x17/0x20 [ 1541.885503][T28648] __x64_sys_bpf+0x7c/0x90 [ 1541.889957][T28648] x64_sys_call+0x4b9/0x9a0 [ 1541.894645][T28648] do_syscall_64+0x4c/0xa0 [ 1541.899105][T28648] ? clear_bhb_loop+0x50/0xa0 [ 1541.903815][T28648] ? clear_bhb_loop+0x50/0xa0 [ 1541.908525][T28648] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1541.914583][T28648] RIP: 0033:0x7fa08433dcb9 [ 1541.919068][T28648] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1541.938929][T28648] RSP: 002b:00007fa082d9a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1541.947392][T28648] RAX: ffffffffffffffda RBX: 00007fa0845b8fa0 RCX: 00007fa08433dcb9 [ 1541.955405][T28648] RDX: 0000000000000094 RSI: 0000200000000140 RDI: 0000000000000005 [ 1541.963405][T28648] RBP: 00007fa082d9a090 R08: 0000000000000000 R09: 0000000000000000 [ 1541.971408][T28648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1541.979546][T28648] R13: 00007fa0845b9038 R14: 00007fa0845b8fa0 R15: 00007ffcd1b1eda8 [ 1541.987659][T28648] [ 1542.092147][T28664] FAULT_INJECTION: forcing a failure. [ 1542.092147][T28664] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1542.117447][T28664] CPU: 1 PID: 28664 Comm: syz.4.9434 Tainted: G W syzkaller #0 [ 1542.126373][T28664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1542.136709][T28664] Call Trace: [ 1542.140122][T28664] [ 1542.143091][T28664] __dump_stack+0x21/0x30 [ 1542.147757][T28664] dump_stack_lvl+0x110/0x170 [ 1542.152588][T28664] ? show_regs_print_info+0x20/0x20 [ 1542.157938][T28664] dump_stack+0x15/0x20 [ 1542.162147][T28664] should_fail+0x3c1/0x510 [ 1542.166616][T28664] should_fail_usercopy+0x1a/0x20 [ 1542.171694][T28664] strncpy_from_user+0x24/0x2e0 [ 1542.176601][T28664] bpf_prog_load+0x1fb/0x1640 [ 1542.181324][T28664] ? proc_fail_nth_write+0x180/0x200 [ 1542.186660][T28664] ? map_freeze+0x360/0x360 [ 1542.191202][T28664] ? selinux_bpf+0xc7/0xf0 [ 1542.195727][T28664] ? security_bpf+0x82/0xa0 [ 1542.200256][T28664] __sys_bpf+0x51d/0x7d0 [ 1542.204573][T28664] ? bpf_link_show_fdinfo+0x330/0x330 [ 1542.209971][T28664] ? debug_smp_processor_id+0x17/0x20 [ 1542.215386][T28664] __x64_sys_bpf+0x7c/0x90 [ 1542.219937][T28664] x64_sys_call+0x4b9/0x9a0 [ 1542.224719][T28664] do_syscall_64+0x4c/0xa0 [ 1542.229183][T28664] ? clear_bhb_loop+0x50/0xa0 [ 1542.234150][T28664] ? clear_bhb_loop+0x50/0xa0 [ 1542.238882][T28664] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1542.244837][T28664] RIP: 0033:0x7f4b84397cb9 [ 1542.249303][T28664] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1542.269135][T28664] RSP: 002b:00007f4b82df4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1542.277598][T28664] RAX: ffffffffffffffda RBX: 00007f4b84612fa0 RCX: 00007f4b84397cb9 [ 1542.285602][T28664] RDX: 0000000000000048 RSI: 00002000000054c0 RDI: 0000000000000005 [ 1542.293638][T28664] RBP: 00007f4b82df4090 R08: 0000000000000000 R09: 0000000000000000 [ 1542.301773][T28664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1542.309771][T28664] R13: 00007f4b84613038 R14: 00007f4b84612fa0 R15: 00007ffe568ddcc8 [ 1542.317772][T28664] [ 1542.396325][T28677] FAULT_INJECTION: forcing a failure. [ 1542.396325][T28677] name failslab, interval 1, probability 0, space 0, times 0 [ 1542.429674][T28677] CPU: 0 PID: 28677 Comm: syz.3.9439 Tainted: G W syzkaller #0 [ 1542.438866][T28677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1542.449506][T28677] Call Trace: [ 1542.453020][T28677] [ 1542.456006][T28677] __dump_stack+0x21/0x30 [ 1542.460405][T28677] dump_stack_lvl+0x110/0x170 [ 1542.465124][T28677] ? show_regs_print_info+0x20/0x20 [ 1542.470358][T28677] ? kasan_set_track+0x5b/0x70 [ 1542.475140][T28677] ? kasan_set_track+0x4a/0x70 [ 1542.479930][T28677] dump_stack+0x15/0x20 [ 1542.484209][T28677] should_fail+0x3c1/0x510 [ 1542.488653][T28677] __should_failslab+0xa4/0xe0 [ 1542.493443][T28677] should_failslab+0x9/0x20 [ 1542.497981][T28677] slab_pre_alloc_hook+0x3b/0xe0 [ 1542.503042][T28677] __kmalloc+0x6d/0x2c0 [ 1542.507310][T28677] ? bpf_prog_test_run_flow_dissector+0x2b3/0x620 [ 1542.513759][T28677] bpf_prog_test_run_flow_dissector+0x2b3/0x620 [ 1542.520208][T28677] ? xdp_convert_buff_to_md+0x1e0/0x1e0 [ 1542.525786][T28677] ? __fget_files+0x2c4/0x320 [ 1542.530513][T28677] ? fput_many+0x15a/0x1a0 [ 1542.535049][T28677] ? xdp_convert_buff_to_md+0x1e0/0x1e0 [ 1542.540797][T28677] bpf_prog_test_run+0x3d5/0x630 [ 1542.545923][T28677] ? bpf_prog_query+0x230/0x230 [ 1542.550828][T28677] ? selinux_bpf+0xce/0xf0 [ 1542.555364][T28677] ? security_bpf+0x82/0xa0 [ 1542.559898][T28677] __sys_bpf+0x590/0x7d0 [ 1542.564177][T28677] ? bpf_link_show_fdinfo+0x330/0x330 [ 1542.569582][T28677] ? debug_smp_processor_id+0x17/0x20 [ 1542.575009][T28677] __x64_sys_bpf+0x7c/0x90 [ 1542.579451][T28677] x64_sys_call+0x4b9/0x9a0 [ 1542.583996][T28677] do_syscall_64+0x4c/0xa0 [ 1542.588441][T28677] ? clear_bhb_loop+0x50/0xa0 [ 1542.593273][T28677] ? clear_bhb_loop+0x50/0xa0 [ 1542.598085][T28677] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1542.604036][T28677] RIP: 0033:0x7f1d30c19cb9 [ 1542.608497][T28677] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1542.628154][T28677] RSP: 002b:00007f1d2f676028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1542.636607][T28677] RAX: ffffffffffffffda RBX: 00007f1d30e94fa0 RCX: 00007f1d30c19cb9 [ 1542.644600][T28677] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 1542.652763][T28677] RBP: 00007f1d2f676090 R08: 0000000000000000 R09: 0000000000000000 [ 1542.660835][T28677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1542.669011][T28677] R13: 00007f1d30e95038 R14: 00007f1d30e94fa0 R15: 00007fff9028e4a8 [ 1542.677026][T28677] [ 1542.910595][T28698] FAULT_INJECTION: forcing a failure. [ 1542.910595][T28698] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1543.016641][T28698] CPU: 0 PID: 28698 Comm: syz.0.9447 Tainted: G W syzkaller #0 [ 1543.025688][T28698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1543.035908][T28698] Call Trace: [ 1543.039225][T28698] [ 1543.042184][T28698] __dump_stack+0x21/0x30 [ 1543.046567][T28698] dump_stack_lvl+0x110/0x170 [ 1543.051281][T28698] ? show_regs_print_info+0x20/0x20 [ 1543.056529][T28698] ? preempt_schedule_common+0xbe/0xf0 [ 1543.062029][T28698] dump_stack+0x15/0x20 [ 1543.066399][T28698] should_fail+0x3c1/0x510 [ 1543.070873][T28698] should_fail_usercopy+0x1a/0x20 [ 1543.075945][T28698] _copy_to_user+0x20/0x90 [ 1543.080400][T28698] bpf_prog_test_run_raw_tp+0x500/0x680 [ 1543.086001][T28698] ? bpf_prog_test_run_tracing+0x500/0x500 [ 1543.091937][T28698] ? fput_many+0x15a/0x1a0 [ 1543.096398][T28698] ? bpf_prog_test_run_tracing+0x500/0x500 [ 1543.102253][T28698] bpf_prog_test_run+0x3d5/0x630 [ 1543.107315][T28698] ? bpf_prog_query+0x230/0x230 [ 1543.112208][T28698] ? selinux_bpf+0xce/0xf0 [ 1543.116711][T28698] ? security_bpf+0x82/0xa0 [ 1543.121259][T28698] __sys_bpf+0x590/0x7d0 [ 1543.125545][T28698] ? bpf_link_show_fdinfo+0x330/0x330 [ 1543.130962][T28698] ? debug_smp_processor_id+0x17/0x20 [ 1543.136386][T28698] __x64_sys_bpf+0x7c/0x90 [ 1543.140856][T28698] x64_sys_call+0x4b9/0x9a0 [ 1543.145405][T28698] do_syscall_64+0x4c/0xa0 [ 1543.149883][T28698] ? clear_bhb_loop+0x50/0xa0 [ 1543.154704][T28698] ? clear_bhb_loop+0x50/0xa0 [ 1543.159428][T28698] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1543.165432][T28698] RIP: 0033:0x7fd302158cb9 [ 1543.169900][T28698] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1543.189647][T28698] RSP: 002b:00007fd300bb5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1543.198111][T28698] RAX: ffffffffffffffda RBX: 00007fd3023d3fa0 RCX: 00007fd302158cb9 [ 1543.206127][T28698] RDX: 000000000000000c RSI: 0000200000000840 RDI: 000000000000000a [ 1543.214141][T28698] RBP: 00007fd300bb5090 R08: 0000000000000000 R09: 0000000000000000 [ 1543.222156][T28698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1543.230164][T28698] R13: 00007fd3023d4038 R14: 00007fd3023d3fa0 R15: 00007ffdf3cc0468 [ 1543.238260][T28698] [ 1543.368021][T28722] FAULT_INJECTION: forcing a failure. [ 1543.368021][T28722] name failslab, interval 1, probability 0, space 0, times 0 [ 1543.397983][T28722] CPU: 0 PID: 28722 Comm: syz.3.9456 Tainted: G W syzkaller #0 [ 1543.406918][T28722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1543.417026][T28722] Call Trace: [ 1543.420374][T28722] [ 1543.423354][T28722] __dump_stack+0x21/0x30 [ 1543.427739][T28722] dump_stack_lvl+0x110/0x170 [ 1543.432447][T28722] ? show_regs_print_info+0x20/0x20 [ 1543.437856][T28722] dump_stack+0x15/0x20 [ 1543.442242][T28722] should_fail+0x3c1/0x510 [ 1543.446688][T28722] __should_failslab+0xa4/0xe0 [ 1543.451493][T28722] should_failslab+0x9/0x20 [ 1543.456133][T28722] slab_pre_alloc_hook+0x3b/0xe0 [ 1543.461134][T28722] __kmalloc+0x6d/0x2c0 [ 1543.465424][T28722] ? bpf_test_init+0x100/0x1c0 [ 1543.470397][T28722] bpf_test_init+0x100/0x1c0 [ 1543.475046][T28722] bpf_prog_test_run_xdp+0x1cb/0x910 [ 1543.480486][T28722] ? __kasan_check_write+0x14/0x20 [ 1543.485653][T28722] ? dev_put+0x80/0x80 [ 1543.490077][T28722] ? __fget_files+0x2c4/0x320 [ 1543.494803][T28722] ? fput_many+0x15a/0x1a0 [ 1543.499257][T28722] ? dev_put+0x80/0x80 [ 1543.503462][T28722] bpf_prog_test_run+0x3d5/0x630 [ 1543.508443][T28722] ? bpf_prog_query+0x230/0x230 [ 1543.513329][T28722] ? selinux_bpf+0xce/0xf0 [ 1543.517770][T28722] ? security_bpf+0x82/0xa0 [ 1543.522300][T28722] __sys_bpf+0x590/0x7d0 [ 1543.526663][T28722] ? bpf_link_show_fdinfo+0x330/0x330 [ 1543.532064][T28722] ? debug_smp_processor_id+0x17/0x20 [ 1543.537681][T28722] __x64_sys_bpf+0x7c/0x90 [ 1543.542248][T28722] x64_sys_call+0x4b9/0x9a0 [ 1543.546782][T28722] do_syscall_64+0x4c/0xa0 [ 1543.551591][T28722] ? clear_bhb_loop+0x50/0xa0 [ 1543.556333][T28722] ? clear_bhb_loop+0x50/0xa0 [ 1543.561124][T28722] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1543.567492][T28722] RIP: 0033:0x7f1d30c19cb9 [ 1543.571951][T28722] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1543.592729][T28722] RSP: 002b:00007f1d2f676028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1543.602084][T28722] RAX: ffffffffffffffda RBX: 00007f1d30e94fa0 RCX: 00007f1d30c19cb9 [ 1543.610391][T28722] RDX: 000000000000000c RSI: 00002000000004c0 RDI: 000000000000000a [ 1543.618507][T28722] RBP: 00007f1d2f676090 R08: 0000000000000000 R09: 0000000000000000 [ 1543.626527][T28722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1543.634540][T28722] R13: 00007f1d30e95038 R14: 00007f1d30e94fa0 R15: 00007fff9028e4a8 [ 1543.642678][T28722] [ 1543.728791][T28729] FAULT_INJECTION: forcing a failure. [ 1543.728791][T28729] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1543.780046][T28729] CPU: 1 PID: 28729 Comm: syz.1.9460 Tainted: G W syzkaller #0 [ 1543.789164][T28729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1543.799253][T28729] Call Trace: [ 1543.802939][T28729] [ 1543.806088][T28729] __dump_stack+0x21/0x30 [ 1543.810735][T28729] dump_stack_lvl+0x110/0x170 [ 1543.815883][T28729] ? show_regs_print_info+0x20/0x20 [ 1543.821305][T28729] dump_stack+0x15/0x20 [ 1543.825712][T28729] should_fail+0x3c1/0x510 [ 1543.830257][T28729] should_fail_usercopy+0x1a/0x20 [ 1543.835406][T28729] _copy_to_user+0x20/0x90 [ 1543.839868][T28729] bpf_prog_test_run_raw_tp+0x500/0x680 [ 1543.845448][T28729] ? bpf_prog_test_run_tracing+0x500/0x500 [ 1543.851404][T28729] ? fput_many+0x15a/0x1a0 [ 1543.855973][T28729] ? bpf_prog_test_run_tracing+0x500/0x500 [ 1543.861828][T28729] bpf_prog_test_run+0x3d5/0x630 [ 1543.867097][T28729] ? bpf_prog_query+0x230/0x230 [ 1543.871969][T28729] ? selinux_bpf+0xce/0xf0 [ 1543.876411][T28729] ? security_bpf+0x82/0xa0 [ 1543.881030][T28729] __sys_bpf+0x590/0x7d0 [ 1543.885290][T28729] ? bpf_link_show_fdinfo+0x330/0x330 [ 1543.890781][T28729] ? debug_smp_processor_id+0x17/0x20 [ 1543.896192][T28729] __x64_sys_bpf+0x7c/0x90 [ 1543.900646][T28729] x64_sys_call+0x4b9/0x9a0 [ 1543.905409][T28729] do_syscall_64+0x4c/0xa0 [ 1543.909880][T28729] ? clear_bhb_loop+0x50/0xa0 [ 1543.914603][T28729] ? clear_bhb_loop+0x50/0xa0 [ 1543.919304][T28729] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1543.925265][T28729] RIP: 0033:0x7fa08433dcb9 [ 1543.929993][T28729] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1543.949722][T28729] RSP: 002b:00007fa082d9a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1543.958178][T28729] RAX: ffffffffffffffda RBX: 00007fa0845b8fa0 RCX: 00007fa08433dcb9 [ 1543.966171][T28729] RDX: 000000000000000c RSI: 00002000000004c0 RDI: 000000000000000a [ 1543.974172][T28729] RBP: 00007fa082d9a090 R08: 0000000000000000 R09: 0000000000000000 [ 1543.982258][T28729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1543.990341][T28729] R13: 00007fa0845b9038 R14: 00007fa0845b8fa0 R15: 00007ffcd1b1eda8 [ 1543.998429][T28729] [ 1544.117885][T28740] device syzkaller0 entered promiscuous mode [ 1544.583753][T28761] FAULT_INJECTION: forcing a failure. [ 1544.583753][T28761] name failslab, interval 1, probability 0, space 0, times 0 [ 1544.599257][T28761] CPU: 0 PID: 28761 Comm: syz.3.9471 Tainted: G W syzkaller #0 [ 1544.608193][T28761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1544.618398][T28761] Call Trace: [ 1544.621725][T28761] [ 1544.624728][T28761] __dump_stack+0x21/0x30 [ 1544.629137][T28761] dump_stack_lvl+0x110/0x170 [ 1544.634080][T28761] ? show_regs_print_info+0x20/0x20 [ 1544.639352][T28761] dump_stack+0x15/0x20 [ 1544.643571][T28761] should_fail+0x3c1/0x510 [ 1544.648047][T28761] __should_failslab+0xa4/0xe0 [ 1544.652876][T28761] should_failslab+0x9/0x20 [ 1544.657448][T28761] slab_pre_alloc_hook+0x3b/0xe0 [ 1544.662593][T28761] __kmalloc+0x6d/0x2c0 [ 1544.666799][T28761] ? bpf_test_init+0x100/0x1c0 [ 1544.671729][T28761] bpf_test_init+0x100/0x1c0 [ 1544.676389][T28761] bpf_prog_test_run_xdp+0x1cb/0x910 [ 1544.681845][T28761] ? __kasan_check_write+0x14/0x20 [ 1544.687187][T28761] ? dev_put+0x80/0x80 [ 1544.691318][T28761] ? __fget_files+0x2c4/0x320 [ 1544.696058][T28761] ? fput_many+0x15a/0x1a0 [ 1544.700535][T28761] ? dev_put+0x80/0x80 [ 1544.704669][T28761] bpf_prog_test_run+0x3d5/0x630 [ 1544.709748][T28761] ? bpf_prog_query+0x230/0x230 [ 1544.714665][T28761] ? selinux_bpf+0xce/0xf0 [ 1544.719144][T28761] ? security_bpf+0x82/0xa0 [ 1544.723709][T28761] __sys_bpf+0x590/0x7d0 [ 1544.728211][T28761] ? bpf_link_show_fdinfo+0x330/0x330 [ 1544.733637][T28761] ? debug_smp_processor_id+0x17/0x20 [ 1544.739270][T28761] __x64_sys_bpf+0x7c/0x90 [ 1544.743970][T28761] x64_sys_call+0x4b9/0x9a0 [ 1544.748539][T28761] do_syscall_64+0x4c/0xa0 [ 1544.753019][T28761] ? clear_bhb_loop+0x50/0xa0 [ 1544.757766][T28761] ? clear_bhb_loop+0x50/0xa0 [ 1544.762681][T28761] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1544.768633][T28761] RIP: 0033:0x7f1d30c19cb9 [ 1544.773120][T28761] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1544.793515][T28761] RSP: 002b:00007f1d2f676028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1544.801978][T28761] RAX: ffffffffffffffda RBX: 00007f1d30e94fa0 RCX: 00007f1d30c19cb9 [ 1544.810913][T28761] RDX: 000000000000000c RSI: 00002000000004c0 RDI: 000000000000000a [ 1544.819337][T28761] RBP: 00007f1d2f676090 R08: 0000000000000000 R09: 0000000000000000 [ 1544.827519][T28761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1544.835838][T28761] R13: 00007f1d30e95038 R14: 00007f1d30e94fa0 R15: 00007fff9028e4a8 [ 1544.844120][T28761] [ 1545.318341][T28783] FAULT_INJECTION: forcing a failure. [ 1545.318341][T28783] name failslab, interval 1, probability 0, space 0, times 0 [ 1545.371310][T28783] CPU: 1 PID: 28783 Comm: syz.0.9477 Tainted: G W syzkaller #0 [ 1545.380619][T28783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1545.390718][T28783] Call Trace: [ 1545.394035][T28783] [ 1545.396995][T28783] __dump_stack+0x21/0x30 [ 1545.401371][T28783] dump_stack_lvl+0x110/0x170 [ 1545.406181][T28783] ? show_regs_print_info+0x20/0x20 [ 1545.411428][T28783] ? selinux_capable+0x2b6/0x3b0 [ 1545.416505][T28783] dump_stack+0x15/0x20 [ 1545.420704][T28783] should_fail+0x3c1/0x510 [ 1545.425353][T28783] __should_failslab+0xa4/0xe0 [ 1545.430168][T28783] should_failslab+0x9/0x20 [ 1545.434840][T28783] slab_pre_alloc_hook+0x3b/0xe0 [ 1545.439834][T28783] kmem_cache_alloc_trace+0x48/0x270 [ 1545.445172][T28783] ? dev_map_alloc+0x66/0x560 [ 1545.449993][T28783] dev_map_alloc+0x66/0x560 [ 1545.454601][T28783] map_create+0x455/0x21b0 [ 1545.459075][T28783] __sys_bpf+0x2ff/0x7d0 [ 1545.463456][T28783] ? bpf_link_show_fdinfo+0x330/0x330 [ 1545.468881][T28783] ? perf_trace_sys_enter+0x130/0x150 [ 1545.474494][T28783] __x64_sys_bpf+0x7c/0x90 [ 1545.479209][T28783] x64_sys_call+0x4b9/0x9a0 [ 1545.483838][T28783] do_syscall_64+0x4c/0xa0 [ 1545.488373][T28783] ? clear_bhb_loop+0x50/0xa0 [ 1545.493084][T28783] ? clear_bhb_loop+0x50/0xa0 [ 1545.497795][T28783] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1545.503740][T28783] RIP: 0033:0x7fd302158cb9 [ 1545.508711][T28783] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1545.528351][T28783] RSP: 002b:00007fd300bb5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1545.536898][T28783] RAX: ffffffffffffffda RBX: 00007fd3023d3fa0 RCX: 00007fd302158cb9 [ 1545.544979][T28783] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 1545.552971][T28783] RBP: 00007fd300bb5090 R08: 0000000000000000 R09: 0000000000000000 [ 1545.561047][T28783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1545.569134][T28783] R13: 00007fd3023d4038 R14: 00007fd3023d3fa0 R15: 00007ffdf3cc0468 [ 1545.577511][T28783] [ 1545.591577][T28790] FAULT_INJECTION: forcing a failure. [ 1545.591577][T28790] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1545.634832][T28790] CPU: 0 PID: 28790 Comm: syz.1.9481 Tainted: G W syzkaller #0 [ 1545.643761][T28790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1545.653861][T28790] Call Trace: [ 1545.657409][T28790] [ 1545.660371][T28790] __dump_stack+0x21/0x30 [ 1545.664847][T28790] dump_stack_lvl+0x110/0x170 [ 1545.669696][T28790] ? show_regs_print_info+0x20/0x20 [ 1545.674948][T28790] ? bpf_get_current_task+0x9/0x20 [ 1545.680159][T28790] dump_stack+0x15/0x20 [ 1545.684362][T28790] should_fail+0x3c1/0x510 [ 1545.688797][T28790] should_fail_usercopy+0x1a/0x20 [ 1545.693867][T28790] _copy_to_user+0x20/0x90 [ 1545.698324][T28790] bpf_prog_test_run_raw_tp+0x500/0x680 [ 1545.703895][T28790] ? bpf_prog_test_run_tracing+0x500/0x500 [ 1545.709742][T28790] ? fput_many+0x15a/0x1a0 [ 1545.714176][T28790] ? bpf_prog_test_run_tracing+0x500/0x500 [ 1545.720008][T28790] bpf_prog_test_run+0x3d5/0x630 [ 1545.724981][T28790] ? bpf_prog_query+0x230/0x230 [ 1545.729877][T28790] ? selinux_bpf+0xce/0xf0 [ 1545.734340][T28790] ? security_bpf+0x82/0xa0 [ 1545.739083][T28790] __sys_bpf+0x590/0x7d0 [ 1545.743464][T28790] ? bpf_link_show_fdinfo+0x330/0x330 [ 1545.748963][T28790] ? debug_smp_processor_id+0x17/0x20 [ 1545.754356][T28790] ? perf_trace_sys_enter+0x30/0x150 [ 1545.759667][T28790] __x64_sys_bpf+0x7c/0x90 [ 1545.764285][T28790] x64_sys_call+0x4b9/0x9a0 [ 1545.768811][T28790] do_syscall_64+0x4c/0xa0 [ 1545.773529][T28790] ? clear_bhb_loop+0x50/0xa0 [ 1545.778248][T28790] ? clear_bhb_loop+0x50/0xa0 [ 1545.782952][T28790] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1545.789039][T28790] RIP: 0033:0x7fa08433dcb9 [ 1545.793497][T28790] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1545.813821][T28790] RSP: 002b:00007fa082d9a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1545.822282][T28790] RAX: ffffffffffffffda RBX: 00007fa0845b8fa0 RCX: 00007fa08433dcb9 [ 1545.830308][T28790] RDX: 000000000000000c RSI: 0000200000001a00 RDI: 000000000000000a [ 1545.838402][T28790] RBP: 00007fa082d9a090 R08: 0000000000000000 R09: 0000000000000000 [ 1545.846650][T28790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1545.854931][T28790] R13: 00007fa0845b9038 R14: 00007fa0845b8fa0 R15: 00007ffcd1b1eda8 [ 1545.863030][T28790] [ 1546.054194][T28804] FAULT_INJECTION: forcing a failure. [ 1546.054194][T28804] name failslab, interval 1, probability 0, space 0, times 0 [ 1546.074151][T28804] CPU: 1 PID: 28804 Comm: syz.2.9487 Tainted: G W syzkaller #0 [ 1546.083285][T28804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1546.093484][T28804] Call Trace: [ 1546.096800][T28804] [ 1546.099753][T28804] __dump_stack+0x21/0x30 [ 1546.104119][T28804] dump_stack_lvl+0x110/0x170 [ 1546.108823][T28804] ? show_regs_print_info+0x20/0x20 [ 1546.114057][T28804] dump_stack+0x15/0x20 [ 1546.118237][T28804] should_fail+0x3c1/0x510 [ 1546.122670][T28804] __should_failslab+0xa4/0xe0 [ 1546.127467][T28804] should_failslab+0x9/0x20 [ 1546.131992][T28804] slab_pre_alloc_hook+0x3b/0xe0 [ 1546.136959][T28804] kmem_cache_alloc_trace+0x48/0x270 [ 1546.142262][T28804] ? btf_new_fd+0x115/0x920 [ 1546.146787][T28804] btf_new_fd+0x115/0x920 [ 1546.151137][T28804] ? security_capable+0x87/0xb0 [ 1546.156012][T28804] bpf_btf_load+0x6f/0x90 [ 1546.160362][T28804] __sys_bpf+0x577/0x7d0 [ 1546.164617][T28804] ? bpf_link_show_fdinfo+0x330/0x330 [ 1546.170008][T28804] ? debug_smp_processor_id+0x17/0x20 [ 1546.175491][T28804] ? perf_trace_sys_enter+0x30/0x150 [ 1546.180794][T28804] __x64_sys_bpf+0x7c/0x90 [ 1546.185232][T28804] x64_sys_call+0x4b9/0x9a0 [ 1546.189783][T28804] do_syscall_64+0x4c/0xa0 [ 1546.194218][T28804] ? clear_bhb_loop+0x50/0xa0 [ 1546.198912][T28804] ? clear_bhb_loop+0x50/0xa0 [ 1546.203627][T28804] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1546.209539][T28804] RIP: 0033:0x7fcf8d457cb9 [ 1546.214058][T28804] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1546.233767][T28804] RSP: 002b:00007fcf8beb4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1546.242203][T28804] RAX: ffffffffffffffda RBX: 00007fcf8d6d2fa0 RCX: 00007fcf8d457cb9 [ 1546.250368][T28804] RDX: 0000000000000028 RSI: 0000200000000000 RDI: 0000000000000012 [ 1546.258385][T28804] RBP: 00007fcf8beb4090 R08: 0000000000000000 R09: 0000000000000000 [ 1546.266369][T28804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1546.274357][T28804] R13: 00007fcf8d6d3038 R14: 00007fcf8d6d2fa0 R15: 00007ffd4b1754c8 [ 1546.282345][T28804] [ 1546.358201][T28811] device syzkaller0 entered promiscuous mode [ 1546.501311][ T30] audit: type=1400 audit(1769209266.452:151): avc: denied { create } for pid=28819 comm="syz.1.9491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1546.627152][T28828] device syzkaller0 entered promiscuous mode [ 1546.650812][T28829] device sit0 entered promiscuous mode [ 1547.380786][T28872] FAULT_INJECTION: forcing a failure. [ 1547.380786][T28872] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1547.517552][T28872] CPU: 0 PID: 28872 Comm: syz.2.9511 Tainted: G W syzkaller #0 [ 1547.527113][T28872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1547.537496][T28872] Call Trace: [ 1547.541333][T28872] [ 1547.544312][T28872] __dump_stack+0x21/0x30 [ 1547.548695][T28872] dump_stack_lvl+0x110/0x170 [ 1547.553516][T28872] ? show_regs_print_info+0x20/0x20 [ 1547.558846][T28872] dump_stack+0x15/0x20 [ 1547.563145][T28872] should_fail+0x3c1/0x510 [ 1547.567707][T28872] should_fail_usercopy+0x1a/0x20 [ 1547.572764][T28872] strncpy_from_user+0x24/0x2e0 [ 1547.577657][T28872] bpf_prog_load+0x1fb/0x1640 [ 1547.582593][T28872] ? proc_fail_nth_write+0x180/0x200 [ 1547.587927][T28872] ? map_freeze+0x360/0x360 [ 1547.592474][T28872] ? selinux_bpf+0xc7/0xf0 [ 1547.596923][T28872] ? security_bpf+0x82/0xa0 [ 1547.601592][T28872] __sys_bpf+0x51d/0x7d0 [ 1547.605887][T28872] ? bpf_link_show_fdinfo+0x330/0x330 [ 1547.611413][T28872] ? debug_smp_processor_id+0x17/0x20 [ 1547.616824][T28872] __x64_sys_bpf+0x7c/0x90 [ 1547.621402][T28872] x64_sys_call+0x4b9/0x9a0 [ 1547.625940][T28872] do_syscall_64+0x4c/0xa0 [ 1547.630470][T28872] ? clear_bhb_loop+0x50/0xa0 [ 1547.635172][T28872] ? clear_bhb_loop+0x50/0xa0 [ 1547.640294][T28872] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1547.646507][T28872] RIP: 0033:0x7fcf8d457cb9 [ 1547.650958][T28872] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1547.671017][T28872] RSP: 002b:00007fcf8beb4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1547.679661][T28872] RAX: ffffffffffffffda RBX: 00007fcf8d6d2fa0 RCX: 00007fcf8d457cb9 [ 1547.687653][T28872] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 1547.695647][T28872] RBP: 00007fcf8beb4090 R08: 0000000000000000 R09: 0000000000000000 [ 1547.703982][T28872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1547.711992][T28872] R13: 00007fcf8d6d3038 R14: 00007fcf8d6d2fa0 R15: 00007ffd4b1754c8 [ 1547.720098][T28872] [ 1547.927204][T28885] FAULT_INJECTION: forcing a failure. [ 1547.927204][T28885] name failslab, interval 1, probability 0, space 0, times 0 [ 1547.953691][T28885] CPU: 0 PID: 28885 Comm: syz.2.9515 Tainted: G W syzkaller #0 [ 1547.962752][T28885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1547.972964][T28885] Call Trace: [ 1547.976282][T28885] [ 1547.979425][T28885] __dump_stack+0x21/0x30 [ 1547.983810][T28885] dump_stack_lvl+0x110/0x170 [ 1547.988539][T28885] ? show_regs_print_info+0x20/0x20 [ 1547.993800][T28885] dump_stack+0x15/0x20 [ 1547.998140][T28885] should_fail+0x3c1/0x510 [ 1548.002610][T28885] __should_failslab+0xa4/0xe0 [ 1548.007474][T28885] should_failslab+0x9/0x20 [ 1548.012044][T28885] slab_pre_alloc_hook+0x3b/0xe0 [ 1548.017119][T28885] __kmalloc+0x6d/0x2c0 [ 1548.021454][T28885] ? bpf_test_init+0x100/0x1c0 [ 1548.026632][T28885] bpf_test_init+0x100/0x1c0 [ 1548.031364][T28885] bpf_prog_test_run_xdp+0x1cb/0x910 [ 1548.036868][T28885] ? __kasan_check_write+0x14/0x20 [ 1548.042080][T28885] ? dev_put+0x80/0x80 [ 1548.046285][T28885] ? __fget_files+0x2c4/0x320 [ 1548.051405][T28885] ? fput_many+0x15a/0x1a0 [ 1548.055959][T28885] ? dev_put+0x80/0x80 [ 1548.060113][T28885] bpf_prog_test_run+0x3d5/0x630 [ 1548.065111][T28885] ? bpf_prog_query+0x230/0x230 [ 1548.070018][T28885] ? selinux_bpf+0xce/0xf0 [ 1548.074479][T28885] ? security_bpf+0x82/0xa0 [ 1548.079058][T28885] __sys_bpf+0x590/0x7d0 [ 1548.083338][T28885] ? bpf_link_show_fdinfo+0x330/0x330 [ 1548.088840][T28885] ? debug_smp_processor_id+0x17/0x20 [ 1548.094339][T28885] __x64_sys_bpf+0x7c/0x90 [ 1548.098801][T28885] x64_sys_call+0x4b9/0x9a0 [ 1548.103446][T28885] do_syscall_64+0x4c/0xa0 [ 1548.107915][T28885] ? clear_bhb_loop+0x50/0xa0 [ 1548.112649][T28885] ? clear_bhb_loop+0x50/0xa0 [ 1548.117377][T28885] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1548.123318][T28885] RIP: 0033:0x7fcf8d457cb9 [ 1548.127791][T28885] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1548.148466][T28885] RSP: 002b:00007fcf8beb4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1548.156977][T28885] RAX: ffffffffffffffda RBX: 00007fcf8d6d2fa0 RCX: 00007fcf8d457cb9 [ 1548.165386][T28885] RDX: 000000000000000c RSI: 0000200000000080 RDI: 000000000000000a [ 1548.173408][T28885] RBP: 00007fcf8beb4090 R08: 0000000000000000 R09: 0000000000000000 [ 1548.181419][T28885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1548.189638][T28885] R13: 00007fcf8d6d3038 R14: 00007fcf8d6d2fa0 R15: 00007ffd4b1754c8 [ 1548.197811][T28885] [ 1548.528257][ T30] audit: type=1400 audit(1769209268.472:152): avc: denied { create } for pid=28911 comm="syz.0.9524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1548.603945][T28920] device syzkaller0 entered promiscuous mode [ 1548.620476][T28924] FAULT_INJECTION: forcing a failure. [ 1548.620476][T28924] name failslab, interval 1, probability 0, space 0, times 0 [ 1548.707480][T28924] CPU: 0 PID: 28924 Comm: syz.0.9528 Tainted: G W syzkaller #0 [ 1548.716504][T28924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1548.726603][T28924] Call Trace: [ 1548.729932][T28924] [ 1548.732900][T28924] __dump_stack+0x21/0x30 [ 1548.737281][T28924] dump_stack_lvl+0x110/0x170 [ 1548.741985][T28924] ? show_regs_print_info+0x20/0x20 [ 1548.747213][T28924] ? kasan_set_track+0x5b/0x70 [ 1548.752007][T28924] ? kasan_set_free_info+0x23/0x40 [ 1548.757234][T28924] ? ____kasan_slab_free+0x125/0x160 [ 1548.762549][T28924] ? __kasan_slab_free+0x11/0x20 [ 1548.767508][T28924] ? kmem_cache_free+0x100/0x320 [ 1548.772474][T28924] ? putname+0x111/0x160 [ 1548.776852][T28924] ? do_sys_openat2+0x6df/0x7f0 [ 1548.781736][T28924] ? __x64_sys_openat+0x136/0x160 [ 1548.786807][T28924] dump_stack+0x15/0x20 [ 1548.791002][T28924] should_fail+0x3c1/0x510 [ 1548.795449][T28924] __should_failslab+0xa4/0xe0 [ 1548.800323][T28924] should_failslab+0x9/0x20 [ 1548.804864][T28924] slab_pre_alloc_hook+0x3b/0xe0 [ 1548.809832][T28924] __kmalloc+0x6d/0x2c0 [ 1548.814013][T28924] ? bpf_test_init+0x100/0x1c0 [ 1548.818840][T28924] bpf_test_init+0x100/0x1c0 [ 1548.823646][T28924] bpf_prog_test_run_skb+0x193/0x1150 [ 1548.829198][T28924] ? __kasan_check_write+0x14/0x20 [ 1548.834358][T28924] ? fput_many+0x15a/0x1a0 [ 1548.838795][T28924] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 1548.844732][T28924] bpf_prog_test_run+0x3d5/0x630 [ 1548.849714][T28924] ? bpf_prog_query+0x230/0x230 [ 1548.854616][T28924] ? selinux_bpf+0xce/0xf0 [ 1548.859057][T28924] ? security_bpf+0x82/0xa0 [ 1548.863726][T28924] __sys_bpf+0x590/0x7d0 [ 1548.868209][T28924] ? bpf_link_show_fdinfo+0x330/0x330 [ 1548.873630][T28924] ? debug_smp_processor_id+0x17/0x20 [ 1548.879037][T28924] __x64_sys_bpf+0x7c/0x90 [ 1548.883491][T28924] x64_sys_call+0x4b9/0x9a0 [ 1548.888117][T28924] do_syscall_64+0x4c/0xa0 [ 1548.892568][T28924] ? clear_bhb_loop+0x50/0xa0 [ 1548.897283][T28924] ? clear_bhb_loop+0x50/0xa0 [ 1548.902083][T28924] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1548.908030][T28924] RIP: 0033:0x7fd302158cb9 [ 1548.912674][T28924] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1548.932331][T28924] RSP: 002b:00007fd300bb5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1548.940784][T28924] RAX: ffffffffffffffda RBX: 00007fd3023d3fa0 RCX: 00007fd302158cb9 [ 1548.948899][T28924] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 1548.956897][T28924] RBP: 00007fd300bb5090 R08: 0000000000000000 R09: 0000000000000000 [ 1548.964984][T28924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1548.973015][T28924] R13: 00007fd3023d4038 R14: 00007fd3023d3fa0 R15: 00007ffdf3cc0468 [ 1548.981025][T28924] [ 1549.628797][T28951] FAULT_INJECTION: forcing a failure. [ 1549.628797][T28951] name failslab, interval 1, probability 0, space 0, times 0 [ 1549.695642][T28951] CPU: 0 PID: 28951 Comm: syz.4.9539 Tainted: G W syzkaller #0 [ 1549.704843][T28951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1549.714945][T28951] Call Trace: [ 1549.718252][T28951] [ 1549.721299][T28951] __dump_stack+0x21/0x30 [ 1549.725671][T28951] dump_stack_lvl+0x110/0x170 [ 1549.730405][T28951] ? show_regs_print_info+0x20/0x20 [ 1549.735664][T28951] dump_stack+0x15/0x20 [ 1549.739894][T28951] should_fail+0x3c1/0x510 [ 1549.744445][T28951] __should_failslab+0xa4/0xe0 [ 1549.749336][T28951] should_failslab+0x9/0x20 [ 1549.753873][T28951] slab_pre_alloc_hook+0x3b/0xe0 [ 1549.758858][T28951] __kmalloc+0x6d/0x2c0 [ 1549.763540][T28951] ? kvmalloc_node+0x211/0x320 [ 1549.768428][T28951] kvmalloc_node+0x211/0x320 [ 1549.773061][T28951] ? irqentry_exit+0x37/0x40 [ 1549.777838][T28951] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 1549.783677][T28951] ? vm_mmap+0xb0/0xb0 [ 1549.787797][T28951] vmemdup_user+0x26/0xe0 [ 1549.792251][T28951] map_delete_elem+0x203/0x520 [ 1549.797052][T28951] ? security_bpf+0x82/0xa0 [ 1549.801884][T28951] __sys_bpf+0x483/0x7d0 [ 1549.806348][T28951] ? bpf_link_show_fdinfo+0x330/0x330 [ 1549.811846][T28951] __x64_sys_bpf+0x7c/0x90 [ 1549.816424][T28951] x64_sys_call+0x4b9/0x9a0 [ 1549.821146][T28951] do_syscall_64+0x4c/0xa0 [ 1549.825724][T28951] ? clear_bhb_loop+0x50/0xa0 [ 1549.830450][T28951] ? clear_bhb_loop+0x50/0xa0 [ 1549.835161][T28951] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1549.841105][T28951] RIP: 0033:0x7f4b84397cb9 [ 1549.845662][T28951] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1549.865419][T28951] RSP: 002b:00007f4b82df4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1549.873872][T28951] RAX: ffffffffffffffda RBX: 00007f4b84612fa0 RCX: 00007f4b84397cb9 [ 1549.882038][T28951] RDX: 0000000000000020 RSI: 0000200000000340 RDI: 0000000000000003 [ 1549.890063][T28951] RBP: 00007f4b82df4090 R08: 0000000000000000 R09: 0000000000000000 [ 1549.898104][T28951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1549.906130][T28951] R13: 00007f4b84613038 R14: 00007f4b84612fa0 R15: 00007ffe568ddcc8 [ 1549.914157][T28951] [ 1550.223214][T28967] device syzkaller0 entered promiscuous mode [ 1550.260785][ T30] audit: type=1400 audit(1769209270.212:153): avc: denied { create } for pid=28963 comm="syz.2.9543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 1551.278530][T29002] device syzkaller0 entered promiscuous mode [ 1552.223423][T29030] FAULT_INJECTION: forcing a failure. [ 1552.223423][T29030] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1552.328991][T29030] CPU: 1 PID: 29030 Comm: syz.3.9566 Tainted: G W syzkaller #0 [ 1552.338216][T29030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1552.348410][T29030] Call Trace: [ 1552.351728][T29030] [ 1552.354682][T29030] __dump_stack+0x21/0x30 [ 1552.359045][T29030] dump_stack_lvl+0x110/0x170 [ 1552.364116][T29030] ? show_regs_print_info+0x20/0x20 [ 1552.369472][T29030] ? vfs_write+0xc72/0xfd0 [ 1552.374110][T29030] dump_stack+0x15/0x20 [ 1552.378942][T29030] should_fail+0x3c1/0x510 [ 1552.383519][T29030] should_fail_usercopy+0x1a/0x20 [ 1552.389001][T29030] _copy_from_user+0x20/0xd0 [ 1552.393728][T29030] __sys_bpf+0x258/0x7d0 [ 1552.398282][T29030] ? bpf_link_show_fdinfo+0x330/0x330 [ 1552.404365][T29030] ? debug_smp_processor_id+0x17/0x20 [ 1552.410003][T29030] __x64_sys_bpf+0x7c/0x90 [ 1552.414481][T29030] x64_sys_call+0x4b9/0x9a0 [ 1552.419165][T29030] do_syscall_64+0x4c/0xa0 [ 1552.424146][T29030] ? clear_bhb_loop+0x50/0xa0 [ 1552.428874][T29030] ? clear_bhb_loop+0x50/0xa0 [ 1552.433600][T29030] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1552.439525][T29030] RIP: 0033:0x7f1d30c19cb9 [ 1552.444230][T29030] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1552.463889][T29030] RSP: 002b:00007f1d2f676028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1552.472424][T29030] RAX: ffffffffffffffda RBX: 00007f1d30e94fa0 RCX: 00007f1d30c19cb9 [ 1552.480418][T29030] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000005 [ 1552.488492][T29030] RBP: 00007f1d2f676090 R08: 0000000000000000 R09: 0000000000000000 [ 1552.496488][T29030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1552.504617][T29030] R13: 00007f1d30e95038 R14: 00007f1d30e94fa0 R15: 00007fff9028e4a8 [ 1552.512722][T29030] [ 1553.075247][T29046] device syzkaller0 entered promiscuous mode [ 1553.554718][T29076] device syzkaller0 entered promiscuous mode [ 1553.848033][T29105] device syzkaller0 entered promiscuous mode [ 1553.971266][T29113] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 1554.212707][T29135] device syzkaller0 entered promiscuous mode [ 1554.973105][T29153] device syzkaller0 entered promiscuous mode [ 1555.181920][T29162] device syzkaller0 entered promiscuous mode [ 1555.334268][T29171] FAULT_INJECTION: forcing a failure. [ 1555.334268][T29171] name failslab, interval 1, probability 0, space 0, times 0 [ 1555.387446][T29171] CPU: 1 PID: 29171 Comm: syz.2.9618 Tainted: G W syzkaller #0 [ 1555.396394][T29171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1555.406874][T29171] Call Trace: [ 1555.410189][T29171] [ 1555.413151][T29171] __dump_stack+0x21/0x30 [ 1555.417612][T29171] dump_stack_lvl+0x110/0x170 [ 1555.422541][T29171] ? show_regs_print_info+0x20/0x20 [ 1555.427810][T29171] ? __kernel_text_address+0xa0/0x100 [ 1555.433414][T29171] dump_stack+0x15/0x20 [ 1555.437719][T29171] should_fail+0x3c1/0x510 [ 1555.442342][T29171] __should_failslab+0xa4/0xe0 [ 1555.448337][T29171] should_failslab+0x9/0x20 [ 1555.452905][T29171] slab_pre_alloc_hook+0x3b/0xe0 [ 1555.457888][T29171] kmem_cache_alloc_trace+0x48/0x270 [ 1555.463218][T29171] ? __get_vm_area_node+0x11d/0x350 [ 1555.468701][T29171] __get_vm_area_node+0x11d/0x350 [ 1555.473889][T29171] __vmalloc_node_range+0xdf/0xaf0 [ 1555.479037][T29171] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 1555.484701][T29171] ? selinux_capset+0xf0/0xf0 [ 1555.489434][T29171] ? _kstrtoull+0x3c0/0x4d0 [ 1555.494087][T29171] ? avc_has_perm_noaudit+0x391/0x490 [ 1555.499516][T29171] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 1555.505106][T29171] __vmalloc+0x79/0x90 [ 1555.509220][T29171] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 1555.514804][T29171] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 1555.520215][T29171] bpf_prog_alloc+0x1f/0x1e0 [ 1555.524954][T29171] bpf_prog_load+0x822/0x1640 [ 1555.529880][T29171] ? map_freeze+0x360/0x360 [ 1555.534439][T29171] ? selinux_bpf+0xc7/0xf0 [ 1555.539066][T29171] ? security_bpf+0x82/0xa0 [ 1555.543734][T29171] __sys_bpf+0x51d/0x7d0 [ 1555.548194][T29171] ? bpf_link_show_fdinfo+0x330/0x330 [ 1555.553707][T29171] ? debug_smp_processor_id+0x17/0x20 [ 1555.559120][T29171] __x64_sys_bpf+0x7c/0x90 [ 1555.563860][T29171] x64_sys_call+0x4b9/0x9a0 [ 1555.568427][T29171] do_syscall_64+0x4c/0xa0 [ 1555.572886][T29171] ? clear_bhb_loop+0x50/0xa0 [ 1555.577699][T29171] ? clear_bhb_loop+0x50/0xa0 [ 1555.582521][T29171] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1555.588456][T29171] RIP: 0033:0x7fcf8d457cb9 [ 1555.592907][T29171] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1555.612547][T29171] RSP: 002b:00007fcf8beb4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1555.621010][T29171] RAX: ffffffffffffffda RBX: 00007fcf8d6d2fa0 RCX: 00007fcf8d457cb9 [ 1555.628997][T29171] RDX: 0000000000000094 RSI: 0000200000000d40 RDI: 0000000000000005 [ 1555.637068][T29171] RBP: 00007fcf8beb4090 R08: 0000000000000000 R09: 0000000000000000 [ 1555.645054][T29171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1555.653133][T29171] R13: 00007fcf8d6d3038 R14: 00007fcf8d6d2fa0 R15: 00007ffd4b1754c8 [ 1555.661143][T29171] [ 1555.847468][T29171] syz.2.9618: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 1555.972248][T29171] CPU: 1 PID: 29171 Comm: syz.2.9618 Tainted: G W syzkaller #0 [ 1555.981180][T29171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1555.991541][T29171] Call Trace: [ 1555.994860][T29171] [ 1555.997817][T29171] __dump_stack+0x21/0x30 [ 1556.002176][T29171] dump_stack_lvl+0x110/0x170 [ 1556.006884][T29171] ? show_regs_print_info+0x20/0x20 [ 1556.012107][T29171] ? pr_cont_kernfs_name+0xe3/0xf0 [ 1556.017258][T29171] dump_stack+0x15/0x20 [ 1556.021530][T29171] warn_alloc+0x1dc/0x200 [ 1556.025918][T29171] ? __should_failslab+0xa4/0xe0 [ 1556.031001][T29171] ? zone_watermark_ok_safe+0x270/0x270 [ 1556.036690][T29171] ? __get_vm_area_node+0x11d/0x350 [ 1556.042018][T29171] ? __get_vm_area_node+0x33e/0x350 [ 1556.047426][T29171] __vmalloc_node_range+0x152/0xaf0 [ 1556.052653][T29171] ? selinux_capset+0xf0/0xf0 [ 1556.057383][T29171] ? _kstrtoull+0x3c0/0x4d0 [ 1556.061922][T29171] ? avc_has_perm_noaudit+0x391/0x490 [ 1556.067330][T29171] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 1556.072922][T29171] __vmalloc+0x79/0x90 [ 1556.077028][T29171] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 1556.082615][T29171] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 1556.088195][T29171] bpf_prog_alloc+0x1f/0x1e0 [ 1556.092856][T29171] bpf_prog_load+0x822/0x1640 [ 1556.097998][T29171] ? map_freeze+0x360/0x360 [ 1556.102539][T29171] ? selinux_bpf+0xc7/0xf0 [ 1556.106982][T29171] ? security_bpf+0x82/0xa0 [ 1556.111504][T29171] __sys_bpf+0x51d/0x7d0 [ 1556.115759][T29171] ? bpf_link_show_fdinfo+0x330/0x330 [ 1556.121151][T29171] ? debug_smp_processor_id+0x17/0x20 [ 1556.126541][T29171] __x64_sys_bpf+0x7c/0x90 [ 1556.130987][T29171] x64_sys_call+0x4b9/0x9a0 [ 1556.135505][T29171] do_syscall_64+0x4c/0xa0 [ 1556.140020][T29171] ? clear_bhb_loop+0x50/0xa0 [ 1556.144714][T29171] ? clear_bhb_loop+0x50/0xa0 [ 1556.149403][T29171] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1556.155422][T29171] RIP: 0033:0x7fcf8d457cb9 [ 1556.159943][T29171] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1556.179682][T29171] RSP: 002b:00007fcf8beb4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1556.188139][T29171] RAX: ffffffffffffffda RBX: 00007fcf8d6d2fa0 RCX: 00007fcf8d457cb9 [ 1556.196136][T29171] RDX: 0000000000000094 RSI: 0000200000000d40 RDI: 0000000000000005 [ 1556.204146][T29171] RBP: 00007fcf8beb4090 R08: 0000000000000000 R09: 0000000000000000 [ 1556.212163][T29171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1556.220160][T29171] R13: 00007fcf8d6d3038 R14: 00007fcf8d6d2fa0 R15: 00007ffd4b1754c8 [ 1556.228170][T29171] [ 1556.477464][T29171] Mem-Info: [ 1556.480710][T29171] active_anon:40 inactive_anon:24509 isolated_anon:0 [ 1556.480710][T29171] active_file:26750 inactive_file:3067 isolated_file:0 [ 1556.480710][T29171] unevictable:0 dirty:811 writeback:0 [ 1556.480710][T29171] slab_reclaimable:7969 slab_unreclaimable:76169 [ 1556.480710][T29171] mapped:38564 shmem:8987 pagetables:631 bounce:0 [ 1556.480710][T29171] kernel_misc_reclaimable:0 [ 1556.480710][T29171] free:1522302 free_pcp:18695 free_cma:0 [ 1556.627846][T29171] Node 0 active_anon:160kB inactive_anon:100936kB active_file:107000kB inactive_file:12268kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:156956kB dirty:3244kB writeback:0kB shmem:38648kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5272kB pagetables:2624kB all_unreclaimable? no [ 1556.770947][T29192] device syzkaller0 entered promiscuous mode [ 1556.780596][T29171] DMA32 free:2978772kB min:62612kB low:78264kB high:93916kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2982772kB mlocked:0kB bounce:0kB free_pcp:4000kB local_pcp:4000kB free_cma:0kB [ 1557.072997][T29212] device syzkaller0 entered promiscuous mode [ 1557.087835][T29219] IPv6: : Disabled Multicast RS [ 1557.097487][T29171] lowmem_reserve[]: 0 3941 3941 [ 1557.102866][T29171] Normal free:3102396kB min:84840kB low:106048kB high:127256kB reserved_highatomic:0KB active_anon:160kB inactive_anon:111256kB active_file:107000kB inactive_file:12268kB unevictable:0kB writepending:3276kB present:5242880kB managed:4036096kB mlocked:0kB bounce:0kB free_pcp:53364kB local_pcp:8500kB free_cma:0kB [ 1557.137458][T29171] lowmem_reserve[]: 0 0 0 [ 1557.151942][T29171] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2978772kB [ 1557.169522][T29171] Normal: 2895*4kB (ME) 1444*8kB (ME) 2014*16kB (UME) 468*32kB (UME) 1256*64kB (UME) 758*128kB (UME) 207*256kB (UME) 48*512kB (UME) 16*1024kB (U) 6*2048kB (UE) 671*4096kB (UM) = 3102396kB [ 1557.208425][T29171] 42374 total pagecache pages [ 1557.213261][T29171] 0 pages in swap cache [ 1557.227654][T29171] Swap cache stats: add 0, delete 0, find 0/0 [ 1557.255128][T29171] Free swap = 124996kB [ 1557.286702][T29171] Total swap = 124996kB [ 1557.319340][T29171] 2097051 pages RAM [ 1557.347516][T29171] 0 pages HighMem/MovableOnly [ 1557.373301][T29171] 342334 pages reserved [ 1557.387573][T29171] 0 pages cma reserved [ 1557.483647][T29241] FAULT_INJECTION: forcing a failure. [ 1557.483647][T29241] name failslab, interval 1, probability 0, space 0, times 0 [ 1557.529154][T29241] CPU: 0 PID: 29241 Comm: syz.2.9641 Tainted: G W syzkaller #0 [ 1557.538152][T29241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1557.548281][T29241] Call Trace: [ 1557.551797][T29241] [ 1557.554852][T29241] __dump_stack+0x21/0x30 [ 1557.559221][T29241] dump_stack_lvl+0x110/0x170 [ 1557.563938][T29241] ? show_regs_print_info+0x20/0x20 [ 1557.569172][T29241] dump_stack+0x15/0x20 [ 1557.573450][T29241] should_fail+0x3c1/0x510 [ 1557.577987][T29241] ? alloc_skb_with_frags+0xa8/0x620 [ 1557.583392][T29241] __should_failslab+0xa4/0xe0 [ 1557.588198][T29241] should_failslab+0x9/0x20 [ 1557.592730][T29241] slab_pre_alloc_hook+0x3b/0xe0 [ 1557.597698][T29241] ? alloc_skb_with_frags+0xa8/0x620 [ 1557.603018][T29241] ? alloc_skb_with_frags+0xa8/0x620 [ 1557.608362][T29241] __kmalloc_track_caller+0x6c/0x2c0 [ 1557.613681][T29241] ? alloc_skb_with_frags+0xa8/0x620 [ 1557.619003][T29241] ? alloc_skb_with_frags+0xa8/0x620 [ 1557.624325][T29241] __alloc_skb+0x21a/0x740 [ 1557.628979][T29241] alloc_skb_with_frags+0xa8/0x620 [ 1557.634122][T29241] ? memcpy+0x56/0x70 [ 1557.638136][T29241] sock_alloc_send_pskb+0x87f/0x9a0 [ 1557.643374][T29241] ? sock_kzfree_s+0x60/0x60 [ 1557.647995][T29241] ? __kasan_check_write+0x14/0x20 [ 1557.653130][T29241] ? _raw_spin_lock+0x94/0xf0 [ 1557.657841][T29241] ? _raw_spin_trylock_bh+0x150/0x150 [ 1557.663248][T29241] unix_dgram_sendmsg+0x5f7/0x1890 [ 1557.668418][T29241] ? selinux_socket_sendmsg+0x22f/0x340 [ 1557.674062][T29241] ? unix_dgram_poll+0x6c0/0x6c0 [ 1557.679218][T29241] ? kasan_set_track+0x5b/0x70 [ 1557.684020][T29241] ? kasan_set_track+0x4a/0x70 [ 1557.688919][T29241] ? security_socket_sendmsg+0x82/0xa0 [ 1557.694437][T29241] ? unix_dgram_poll+0x6c0/0x6c0 [ 1557.699717][T29241] ____sys_sendmsg+0x5b7/0x8f0 [ 1557.704531][T29241] ? __sys_sendmsg_sock+0x40/0x40 [ 1557.709888][T29241] ? kstrtouint_from_user+0x1c4/0x220 [ 1557.715305][T29241] ? import_iovec+0x7c/0xb0 [ 1557.719860][T29241] ___sys_sendmsg+0x236/0x2e0 [ 1557.724572][T29241] ? __sys_sendmsg+0x280/0x280 [ 1557.729477][T29241] ? __fdget+0x1a1/0x230 [ 1557.733854][T29241] __x64_sys_sendmsg+0x206/0x2f0 [ 1557.738838][T29241] ? ___sys_sendmsg+0x2e0/0x2e0 [ 1557.743913][T29241] ? ksys_write+0x1f4/0x250 [ 1557.748470][T29241] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 1557.755515][T29241] x64_sys_call+0x4b/0x9a0 [ 1557.760060][T29241] do_syscall_64+0x4c/0xa0 [ 1557.764649][T29241] ? clear_bhb_loop+0x50/0xa0 [ 1557.769628][T29241] ? clear_bhb_loop+0x50/0xa0 [ 1557.774562][T29241] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1557.780513][T29241] RIP: 0033:0x7fcf8d457cb9 [ 1557.784963][T29241] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1557.805238][T29241] RSP: 002b:00007fcf8beb4028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1557.813775][T29241] RAX: ffffffffffffffda RBX: 00007fcf8d6d2fa0 RCX: 00007fcf8d457cb9 [ 1557.821901][T29241] RDX: 0000000020000000 RSI: 0000200000000100 RDI: 0000000000000005 [ 1557.830006][T29241] RBP: 00007fcf8beb4090 R08: 0000000000000000 R09: 0000000000000000 [ 1557.838030][T29241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1557.846044][T29241] R13: 00007fcf8d6d3038 R14: 00007fcf8d6d2fa0 R15: 00007ffd4b1754c8 [ 1557.854073][T29241] [ 1558.102446][T29251] device syzkaller0 entered promiscuous mode [ 1558.157764][T29234] general protection fault, probably for non-canonical address 0xdffffc0000000018: 0000 [#1] PREEMPT SMP KASAN [ 1558.169857][T29234] KASAN: null-ptr-deref in range [0x00000000000000c0-0x00000000000000c7] [ 1558.178667][T29234] CPU: 1 PID: 29234 Comm: syz.4.9640 Tainted: G W syzkaller #0 [ 1558.187659][T29234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1558.197935][T29234] RIP: 0010:sk_psock_verdict_data_ready+0x143/0x1d0 [ 1558.204593][T29234] Code: 24 50 48 c7 44 24 48 01 00 00 00 43 80 3c 2e 00 74 08 4c 89 ff e8 1d 1b d1 fd 41 bc c0 00 00 00 4d 03 27 4c 89 e0 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 e7 e8 fe 1a d1 fd 48 8b 7c 24 18 48 8d [ 1558.224256][T29234] RSP: 0018:ffffc90000a377e0 EFLAGS: 00010206 [ 1558.230387][T29234] RAX: 0000000000000018 RBX: 1ffff92000146f00 RCX: 0000000000080000 [ 1558.238746][T29234] RDX: ffffc90002b41000 RSI: 0000000000019570 RDI: 0000000000019571 [ 1558.246860][T29234] RBP: ffffc90000a378b0 R08: ffffc90000a3783f R09: ffffc90000a37820 [ 1558.254973][T29234] R10: dffffc0000000000 R11: fffff52000146f08 R12: 00000000000000c0 [ 1558.263013][T29234] R13: dffffc0000000000 R14: 1ffff11022374604 R15: ffff888111ba3020 [ 1558.271416][T29234] FS: 00007f4b82df46c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 1558.280758][T29234] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1558.287474][T29234] CR2: 00007ffe568de028 CR3: 000000014d7d5000 CR4: 00000000003506a0 [ 1558.295517][T29234] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 1558.303886][T29234] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1558.311902][T29234] Call Trace: [ 1558.315302][T29234] [ 1558.318281][T29234] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 1558.324218][T29234] ? sk_psock_start_verdict+0xc0/0xc0 [ 1558.329722][T29234] unix_stream_sendmsg+0x7d1/0xc90 [ 1558.334871][T29234] ? unix_stream_sendmsg+0x721/0xc90 [ 1558.340194][T29234] ? unix_show_fdinfo+0xa0/0xa0 [ 1558.345082][T29234] ? irqentry_exit+0x37/0x40 [ 1558.349691][T29234] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 1558.355666][T29234] ? security_socket_sendmsg+0x82/0xa0 [ 1558.361170][T29234] ? unix_show_fdinfo+0xa0/0xa0 [ 1558.366077][T29234] ____sys_sendmsg+0x5b7/0x8f0 [ 1558.370905][T29234] ? __sys_sendmsg_sock+0x40/0x40 [ 1558.375983][T29234] ? ___sys_sendmsg+0x21b/0x2e0 [ 1558.380882][T29234] ___sys_sendmsg+0x236/0x2e0 [ 1558.385603][T29234] ? __sys_sendmsg+0x280/0x280 [ 1558.390500][T29234] ? __x64_sys_sendmsg+0x129/0x2f0 [ 1558.395635][T29234] __x64_sys_sendmsg+0x206/0x2f0 [ 1558.400599][T29234] ? ___sys_sendmsg+0x2e0/0x2e0 [ 1558.405515][T29234] ? __kasan_check_write+0x14/0x20 [ 1558.410650][T29234] ? switch_fpu_return+0x15d/0x2c0 [ 1558.415787][T29234] x64_sys_call+0x4b/0x9a0 [ 1558.420310][T29234] do_syscall_64+0x4c/0xa0 [ 1558.424859][T29234] ? clear_bhb_loop+0x50/0xa0 [ 1558.429555][T29234] ? clear_bhb_loop+0x50/0xa0 [ 1558.434372][T29234] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1558.440307][T29234] RIP: 0033:0x7f4b84397cb9 [ 1558.444748][T29234] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1558.464384][T29234] RSP: 002b:00007f4b82df4028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1558.472836][T29234] RAX: ffffffffffffffda RBX: 00007f4b84612fa0 RCX: 00007f4b84397cb9 [ 1558.480828][T29234] RDX: 0000000000000020 RSI: 0000200000000980 RDI: 0000000000000004 [ 1558.489089][T29234] RBP: 00007f4b84405bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1558.497193][T29234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1558.505289][T29234] R13: 00007f4b84613038 R14: 00007f4b84612fa0 R15: 00007ffe568ddcc8 [ 1558.513332][T29234] [ 1558.516488][T29234] Modules linked in: [ 1558.523636][ T30] audit: type=1400 audit(1769209278.472:154): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1558.550190][ T30] audit: type=1400 audit(1769209278.472:155): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1558.581313][ T30] audit: type=1400 audit(1769209278.472:156): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1558.606651][T29234] ---[ end trace 70616d9f160c6dc8 ]--- [ 1558.614175][ T30] audit: type=1400 audit(1769209278.472:157): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1558.643634][T29234] RIP: 0010:sk_psock_verdict_data_ready+0x143/0x1d0 [ 1558.657448][T29234] Code: 24 50 48 c7 44 24 48 01 00 00 00 43 80 3c 2e 00 74 08 4c 89 ff e8 1d 1b d1 fd 41 bc c0 00 00 00 4d 03 27 4c 89 e0 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 e7 e8 fe 1a d1 fd 48 8b 7c 24 18 48 8d [ 1558.660977][ T30] audit: type=1400 audit(1769209278.472:158): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1558.695384][T29234] RSP: 0018:ffffc90000a377e0 EFLAGS: 00010206 [ 1558.699169][ T30] audit: type=1400 audit(1769209278.472:159): avc: denied { append open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1558.703678][T29234] [ 1558.705640][ T30] audit: type=1400 audit(1769209278.472:160): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1558.769841][T29234] RAX: 0000000000000018 RBX: 1ffff92000146f00 RCX: 0000000000080000 [ 1558.788557][T29234] RDX: ffffc90002b41000 RSI: 0000000000019570 RDI: 0000000000019571 [ 1558.817449][T29234] RBP: ffffc90000a378b0 R08: ffffc90000a3783f R09: ffffc90000a37820 [ 1558.825775][T29234] R10: dffffc0000000000 R11: fffff52000146f08 R12: 00000000000000c0 [ 1558.834327][T29234] R13: dffffc0000000000 R14: 1ffff11022374604 R15: ffff888111ba3020 [ 1558.842904][T29234] FS: 00007f4b82df46c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 1558.852434][T29234] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1558.859675][T29234] CR2: 00007fd30239f198 CR3: 000000014d7d5000 CR4: 00000000003506b0 [ 1558.868108][T29234] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000200000000300 [ 1558.876892][T29234] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1558.885522][T29234] Kernel panic - not syncing: Fatal exception [ 1558.892043][T29234] Kernel Offset: disabled [ 1558.896410][T29234] Rebooting in 86400 seconds..