last executing test programs: 7.626128366s ago: executing program 3 (id=2682): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x7, 0x4, 0x100, 0x1, 0x28}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b000000b700000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x18) close(r1) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) 7.604316726s ago: executing program 3 (id=2684): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x4, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x6, 0xb}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000080)='syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup(r5, &(0x7f00000000c0)='syz1\x00', 0x1ff) openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_netprio_ifpriomap(r5, &(0x7f0000000200), 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 6.33342221s ago: executing program 0 (id=2695): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x79, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB='0\x00'/12, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/25], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000faffffffffffffff00"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB="000000000500000000000000000000000000000052f1aa95953efe033daf7caf079cfa7f3490cb291f34a555ade27f732b0ac665d806a2eb7580ded7e23524f5961ee161fcd4265a", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) r10 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r9}, 0x8) write$cgroup_int(r10, &(0x7f00000001c0), 0xfffffdef) 4.420170996s ago: executing program 3 (id=2704): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x7, 0x4, 0x100, 0x1, 0x28}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) close(r1) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) 4.391135917s ago: executing program 3 (id=2705): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x45bd}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r2}, 0x0, &(0x7f0000000400)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r2}, &(0x7f0000000880), &(0x7f00000008c0)=r1}, 0x20) 4.335053008s ago: executing program 3 (id=2706): bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x4, 0xe, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000004000000410000000000000001000000", @ANYRES32=0x1, @ANYBLOB="00edffffffffffffff00955c0a94c6005100009f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="024000000100"], 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r5) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000080)) 3.926550355s ago: executing program 2 (id=2708): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000006000000080000000800000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000e8ffffff00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000005000000008000000100000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000821b400000000"], 0x50) socketpair(0x10, 0x0, 0x14, &(0x7f0000000400)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1f, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143}, 0x80) close(0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791048000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) close(r2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[], 0x0, 0x28, 0x2c, 0x0, 0x1}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0e00000004", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1900000004000000040000000600000000000000", @ANYRES32=0x1, @ANYBLOB="000000000000000000000000000000000000000028e81ab3cdfcb9441ccd91565d641bd469648de6f53b3090", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000800000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000080), &(0x7f0000000180)=r6}, 0x20) ioctl$SIOCSIFHWADDR(r4, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000080), 0x8000, r0}, 0x38) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x8c00) recvmsg(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000009c0)=""/211, 0xd3}], 0x1}, 0x61) 3.926258315s ago: executing program 3 (id=2709): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f0000050000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000001300000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x6f4, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000600), 0x5, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd6000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 3.276265728s ago: executing program 1 (id=2716): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x45bd}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r2}, 0x0, &(0x7f0000000400)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r2}, &(0x7f0000000880), &(0x7f00000008c0)=r1}, 0x20) 3.058533652s ago: executing program 1 (id=2717): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0b41, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd"], 0xfdef) 2.905280735s ago: executing program 1 (id=2718): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000006c0)='ns/uts\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="16000000840000e4fe000000b2fa0000000000000000", @ANYRESDEC=r2, @ANYRES16=r1, @ANYRES32=0x0, @ANYRESOCT=r1, @ANYRESHEX=r2], 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x75, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x83}, 0x105004, 0xc8, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r2, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, &(0x7f0000000540), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffff4a) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x10}, 0x18) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200), 0x801, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r5 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.cpu_exclusive\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1ff, 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e408"], 0xfdef) 2.60409017s ago: executing program 2 (id=2719): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000800000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000001c0)='kmem_cache_free\x00', r1, 0x0, 0xfffffffffffffffc}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7e, 0x1, 0xfd, 0x0, 0x0, 0x1, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x1, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000400)=ANY=[@ANYRES16=r5, @ANYRES16=r4, @ANYRESDEC=r3, @ANYRES64=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 2.427328614s ago: executing program 0 (id=2720): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="000000000000000000000073a4f4c5b0000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000200)='btrfs_add_block_group\x00'}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000880)={0x1b, 0x0, 0x0, 0xc3f, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x2}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x13, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b400}, [@btf_id={0x18, 0x17, 0x3, 0x0, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf5}}, @ldst={0x1, 0x3, 0x2, 0x1, 0xb, 0x3585ab36a51a5a51, 0x8}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xff8}, @generic={0x4, 0x1, 0x9, 0x8, 0x400}, @exit]}, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[r4, r0], 0x0, 0x10, 0x5}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='GPL\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0104000000000000000000000000000000000000826e7821aeb10f3f8a5694c3bb0fa4137ad7c792", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) 2.242029517s ago: executing program 1 (id=2721): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 2.238192737s ago: executing program 4 (id=2722): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001f80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0xffbf) 2.151479279s ago: executing program 2 (id=2723): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0xa0b41, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd"], 0xfdef) 2.09017599s ago: executing program 1 (id=2724): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xcd62b1ab) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b702000007750000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x2}, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r2, 0x0, &(0x7f0000000000)=""/6, 0x2}, 0x20) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000200)=ANY=[@ANYBLOB]) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000800)={r2, &(0x7f0000000780)}, 0x20) r4 = perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r1}, 0x10) unlink(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x0, 0x8, 0x9b, 0x0, 0x0, 0x8, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) 2.034724162s ago: executing program 2 (id=2725): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000800000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000001c0)='kmem_cache_free\x00', r1, 0x0, 0xfffffffffffffffc}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7e, 0x1, 0xfd, 0x0, 0x0, 0x1, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x1, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x18) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 1.891647054s ago: executing program 4 (id=2726): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x7, 0x4, 0x100, 0x1, 0x28}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) close(r1) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) 1.830454876s ago: executing program 2 (id=2727): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x8, 0xc8, 0x9, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1200000000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r2, 0x0, 0x0) gettid() close(0x3) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b70800000045c1c90000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB="00000000000000bdf37d85000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r5, &(0x7f0000000ac0)="a701da01d3"}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x50) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) close(r7) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 1.785396836s ago: executing program 4 (id=2728): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x45bd}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r2}, &(0x7f0000000a00), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r2}, &(0x7f0000000880), &(0x7f00000008c0)=r1}, 0x20) 773.943405ms ago: executing program 4 (id=2729): bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000002e00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@base={0x3, 0x15, 0x3, 0x4a, 0x1002, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x2}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000001}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000980)={r2, 0x0, 0xdc, 0x7c, &(0x7f0000000300)="4cffcd51a6010982fdea8d13d022df72367b3fe7d253922c2b4f6df35290aa56d5fdc17e49bc69dbf93507974752432d199dfb1b1f962912562d6379af2fd8f15346ef76f5eec1863c632d896d4a3d7b4eac3aa2519bbfe624904ab21e0d75bf7ed8c819cb2c59e59c9da91d13a74b6420123e661168c0aa8020e8b9f320436715c5675a30b2b64b74e60b6c56b28d935ba4039ce192b7a094a094936f3fafcdf5cb0795244c52e07b45e7b9098b6ebbef3fe7cf9441417267efdd2508046479c9b24a503537e8b9676ee912064e45173c31345f9e09014a39494aff", &(0x7f0000000640)=""/124, 0x6, 0x0, 0x79, 0x7a, &(0x7f0000000780)="070c8a8cdb9aea2b778c5ecf2b14a465481f04b3fd4e950c4c0357601f0794bbbcdf8c6c55516021c294c32f143ebe76422aff65b91564fdc0d3c7c02109ee88bb467ce3ff1cb404e48528b7ea35246c7914f61e17dc0897668f783ffce680b063ba9e221621fed100e6c92fd2fff8e9edc5c333007a6d25bb", &(0x7f0000000900)="a7ecadd515a34fefd73c0ad52d2d63ef945ca5f4d1b908991b0ac6c4df73a9aa4a66c4125b5f8ff1c6b3c8f6cf86ddf9d4993d3884f35a5094f8dbde67755c301bbcd3e9bb9584a85f5ae15184856b0d66cf177be25549841bc730692b924138b2afcd89988608b8a76a5ba9ff0a8f816ed7523d3afc15b19751", 0x4, 0x0, 0x2}, 0x50) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000cc0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x16, 0x1c, &(0x7f0000000e00)=ANY=[@ANYBLOB="1800000000000000000000000300000085100000faffffff183200000100000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000080000008500000006000000b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000008000000182300c8ece3b222c80400", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a500000085200000030000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x8, 0xb2, &(0x7f0000000b80)=""/178, 0x40f00, 0x10, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000c40)={0x5, 0xf, 0x3, 0x6}, 0x10, 0x0, r3, 0x0, 0x0, &(0x7f0000000d00), 0x10, 0x8000}, 0x94) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="5c492868f90ddbfe9ab068ddf91f6194277330e5", @ANYRES64=r0, @ANYRESHEX=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x926f7b2dbd35226e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000400)=@framed={{}, [@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfbfffffe}, {0x85, 0x0, 0x0, 0x2d}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000120000002400000008000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x18) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) write$cgroup_subtree(r7, &(0x7f0000000100)=ANY=[], 0x2a) 535.18615ms ago: executing program 0 (id=2730): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0b41, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd"], 0xfdef) 534.09782ms ago: executing program 1 (id=2731): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffffffffffff, 0x2}, 0x0, 0x0, 0xfffffffd, 0xd, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd501783f73268f41, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x1, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42"], 0xfdef) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4891, 0x0, @perf_bp={0x0, 0x7}, 0xc00, 0xc8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) 309.664864ms ago: executing program 2 (id=2732): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x4, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000", @ANYBLOB="0000000000000000b708000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x6, 0xb}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000080)='syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup(r5, &(0x7f00000000c0)='syz1\x00', 0x1ff) openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_netprio_ifpriomap(r5, &(0x7f0000000200), 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 265.280905ms ago: executing program 4 (id=2733): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000feffffff00000000000000001801000020646c2500000000002020207b1af8ff04000000950000000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000002300003ff268b900000000007f062923efab162929073c9f585e3706d9bf75b3b1fa323d5fc301c517de920c35489d1d621dba9c947042fbc89e82971d3935525edcea0b19a43cc8744eeeed1f3227c60e01aa645ba3aac386b387cdc8c77000c44d7856dd216b9e0d5977226a39d69da0e20cc8540e22d86d02c0b9d4f98e0e93f944"], 0x0, 0xfffffffe, 0x4e, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x35, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000200)='percpu_free_percpu\x00', r4}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000840)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000070000000000000000000000000000000000000000000000466756d757f84bbc58d3b7ea7d4efc5c9cbcc957abfbb1d45c54fb1c07ec875709e13967595e912d9e76466d7a3d05de83fc6f2ee872841272b67603e5632259cfcec741a13752e4dd0d8b36096ac5f9adaabf10b08e7707d41717700c82507faecf16f1ebbaba7b0a27b8ee34ad07ca319a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000800)='fib6_table_lookup\x00', r5}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r9}, 0x10) sendmsg$tipc(r8, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r8, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x0) close(r8) sendmsg$tipc(r7, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) 186.585836ms ago: executing program 0 (id=2734): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 59.135509ms ago: executing program 0 (id=2735): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0b41, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd"], 0xfdef) 300.29µs ago: executing program 4 (id=2736): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x1c1842, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a000000040000000400000012"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r5, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="1100ffc30002"}) 0s ago: executing program 0 (id=2737): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001f80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0xffbf) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.142' (ED25519) to the list of known hosts. [ 25.075898][ T30] audit: type=1400 audit(1756839421.680:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.077341][ T273] cgroup: Unknown subsys name 'net' [ 25.098695][ T30] audit: type=1400 audit(1756839421.680:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.125947][ T30] audit: type=1400 audit(1756839421.710:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.126176][ T273] cgroup: Unknown subsys name 'devices' [ 25.302038][ T273] cgroup: Unknown subsys name 'hugetlb' [ 25.307651][ T273] cgroup: Unknown subsys name 'rlimit' [ 25.478362][ T30] audit: type=1400 audit(1756839422.080:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.501543][ T30] audit: type=1400 audit(1756839422.080:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.526527][ T30] audit: type=1400 audit(1756839422.080:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.570994][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.579940][ T30] audit: type=1400 audit(1756839422.180:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 25.605390][ T30] audit: type=1400 audit(1756839422.190:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.639083][ T30] audit: type=1400 audit(1756839422.240:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.639639][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.664741][ T30] audit: type=1400 audit(1756839422.240:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.511046][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.518114][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.525893][ T281] device bridge_slave_0 entered promiscuous mode [ 26.533963][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.541065][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.548426][ T281] device bridge_slave_1 entered promiscuous mode [ 26.616246][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.623422][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.631172][ T283] device bridge_slave_0 entered promiscuous mode [ 26.647890][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.655010][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.662467][ T283] device bridge_slave_1 entered promiscuous mode [ 26.676982][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.684162][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.691793][ T282] device bridge_slave_0 entered promiscuous mode [ 26.711032][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.718096][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.725761][ T282] device bridge_slave_1 entered promiscuous mode [ 26.796364][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.803489][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.810936][ T284] device bridge_slave_0 entered promiscuous mode [ 26.819036][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.826121][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.833578][ T284] device bridge_slave_1 entered promiscuous mode [ 26.840106][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.847151][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.855355][ T285] device bridge_slave_0 entered promiscuous mode [ 26.869876][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.876936][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.884454][ T285] device bridge_slave_1 entered promiscuous mode [ 26.935650][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.942739][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.950069][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.957104][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.023452][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.030642][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.037926][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.044978][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.099117][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.106551][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.114351][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.122198][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.129343][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.171170][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.179427][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.186497][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.194093][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.202595][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.209622][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.221398][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.228941][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.257452][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.265632][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.273905][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.280965][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.288504][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.296887][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.304050][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.311515][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.319518][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.327797][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.334861][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.342393][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.366132][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.374200][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.382305][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.391466][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.399570][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.406624][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.436950][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.445625][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.454052][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.462224][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.469641][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.478044][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.486557][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.494569][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.502421][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.510157][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.519676][ T282] device veth0_vlan entered promiscuous mode [ 27.526763][ T281] device veth0_vlan entered promiscuous mode [ 27.538933][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 27.547400][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.555719][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.562767][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.570356][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.578387][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.586607][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.597946][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.605485][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.616692][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.625234][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.635809][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.644093][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.658314][ T283] device veth0_vlan entered promiscuous mode [ 27.670802][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.679215][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.687628][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.694733][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.702242][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 27.711019][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.719174][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.726225][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.733887][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.741971][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.750163][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.758482][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.766773][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.773820][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.781543][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.789338][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.796909][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.807271][ T281] device veth1_macvtap entered promiscuous mode [ 27.814591][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.822466][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.831154][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.842273][ T282] device veth1_macvtap entered promiscuous mode [ 27.851876][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.860518][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.868637][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.881336][ T283] device veth1_macvtap entered promiscuous mode [ 27.896925][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.904612][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.912959][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.921600][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.929930][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.938315][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.946612][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.954683][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.962956][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.971419][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.979600][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.988056][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.996169][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.007149][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.015445][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.035478][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.044049][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.052664][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.052963][ T281] request_module fs-gadgetfs succeeded, but still no fs? [ 28.061501][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.076366][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.084656][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.099203][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.107838][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.133971][ T285] device veth0_vlan entered promiscuous mode [ 28.149800][ C1] hrtimer: interrupt took 26775 ns [ 28.160391][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.168373][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.176639][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.185736][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.194531][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.202406][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.216175][ T284] device veth0_vlan entered promiscuous mode [ 28.233695][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.250193][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.258963][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.268698][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.287542][ T284] device veth1_macvtap entered promiscuous mode [ 28.294743][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.309985][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.318219][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.326256][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.334675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.344541][ T285] device veth1_macvtap entered promiscuous mode [ 28.374183][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.383074][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.391754][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.400372][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.408726][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.417453][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.426121][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.454206][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.462860][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.698787][ T360] device syzkaller0 entered promiscuous mode [ 29.916738][ T359] syz.4.7 (359) used greatest stack depth: 21184 bytes left [ 30.273661][ T385] device veth0_vlan left promiscuous mode [ 30.296437][ T385] device veth0_vlan entered promiscuous mode [ 30.476863][ T394] device pim6reg1 entered promiscuous mode [ 31.274364][ T399] device syzkaller0 entered promiscuous mode [ 31.369268][ T409] device syzkaller0 entered promiscuous mode [ 31.440118][ T30] kauditd_printk_skb: 39 callbacks suppressed [ 31.440135][ T30] audit: type=1400 audit(1756839428.040:113): avc: denied { cpu } for pid=415 comm="syz.2.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.546359][ T30] audit: type=1400 audit(1756839428.050:114): avc: denied { write } for pid=415 comm="syz.2.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.587621][ T412] device syzkaller0 entered promiscuous mode [ 31.918384][ T431] device syzkaller0 entered promiscuous mode [ 33.269850][ T458] device syzkaller0 entered promiscuous mode [ 33.347938][ T465] device syzkaller0 entered promiscuous mode [ 35.382386][ T486] syz.1.43[486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.382462][ T486] syz.1.43[486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.223733][ T529] device syzkaller0 entered promiscuous mode [ 38.330994][ T532] device syzkaller0 entered promiscuous mode [ 39.831985][ T30] audit: type=1400 audit(1756839436.440:115): avc: denied { read } for pid=564 comm="syz.4.67" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 39.982835][ T30] audit: type=1400 audit(1756839436.500:116): avc: denied { ioctl } for pid=564 comm="syz.4.67" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x9436 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 40.448525][ C0] Illegal XDP return value 16128, expect packet loss! [ 40.500211][ T577] device syzkaller0 entered promiscuous mode [ 45.868029][ T688] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.875338][ T688] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.987031][ T688] device bridge_slave_1 left promiscuous mode [ 46.040241][ T688] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.065376][ T688] device bridge_slave_0 left promiscuous mode [ 46.122152][ T688] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.503710][ T30] audit: type=1400 audit(1756839443.110:117): avc: denied { create } for pid=702 comm="syz.3.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 47.824604][ T722] device wg2 entered promiscuous mode [ 51.395762][ T759] device syzkaller0 entered promiscuous mode [ 53.696191][ T824] device syzkaller0 entered promiscuous mode [ 55.988835][ T875] device syzkaller0 entered promiscuous mode [ 57.784410][ T921] device syzkaller0 entered promiscuous mode [ 59.476679][ T993] device syzkaller0 entered promiscuous mode [ 61.325350][ T1057] device syzkaller0 entered promiscuous mode [ 63.061833][ T1099] device syzkaller0 entered promiscuous mode [ 64.704940][ T1158] device syzkaller0 entered promiscuous mode [ 66.101408][ T1210] device syzkaller0 entered promiscuous mode [ 67.225395][ T1261] device syzkaller0 entered promiscuous mode [ 68.636908][ T1299] device syzkaller0 entered promiscuous mode [ 70.065833][ T1343] device syzkaller0 entered promiscuous mode [ 71.318861][ T1398] device syzkaller0 entered promiscuous mode [ 73.273388][ T1438] device syzkaller0 entered promiscuous mode [ 74.231781][ T1479] device syzkaller0 entered promiscuous mode [ 76.018217][ T1524] device syzkaller0 entered promiscuous mode [ 77.745653][ T1566] device syzkaller0 entered promiscuous mode [ 81.413885][ T1691] device pim6reg1 entered promiscuous mode [ 82.813669][ T1724] device pim6reg1 entered promiscuous mode [ 84.494823][ T1777] device pim6reg1 entered promiscuous mode [ 85.626844][ T1792] device syzkaller0 entered promiscuous mode [ 87.649225][ T1818] device syzkaller0 entered promiscuous mode [ 89.918166][ T1878] device syzkaller0 entered promiscuous mode [ 90.462120][ T1899] device pim6reg1 entered promiscuous mode [ 91.263918][ T1920] device syzkaller0 entered promiscuous mode [ 92.287471][ T1961] device syzkaller0 entered promiscuous mode [ 92.637651][ T1979] device pim6reg1 entered promiscuous mode [ 93.628423][ T2023] device pim6reg1 entered promiscuous mode [ 94.694618][ T2066] device pim6reg1 entered promiscuous mode [ 95.549803][ T2106] device pim6reg1 entered promiscuous mode [ 96.480698][ T2139] device syzkaller0 entered promiscuous mode [ 96.761681][ T2147] device pim6reg1 entered promiscuous mode [ 97.143968][ T2145] device syzkaller0 entered promiscuous mode [ 97.661440][ T2172] device syzkaller0 entered promiscuous mode [ 97.797665][ T2183] device pim6reg1 entered promiscuous mode [ 98.891411][ T2222] device syzkaller0 entered promiscuous mode [ 98.926986][ T2221] device pim6reg1 entered promiscuous mode [ 99.000699][ T2223] device syzkaller0 entered promiscuous mode [ 100.155869][ T2262] device syzkaller0 entered promiscuous mode [ 101.493203][ T2315] device syzkaller0 entered promiscuous mode [ 101.638004][ T2318] device pim6reg1 entered promiscuous mode [ 102.438629][ T2351] device syzkaller0 entered promiscuous mode [ 102.510127][ T2358] device pim6reg1 entered promiscuous mode [ 103.991370][ T2397] device syzkaller0 entered promiscuous mode [ 105.407134][ T2453] device syzkaller0 entered promiscuous mode [ 105.443776][ T2461] device syzkaller0 entered promiscuous mode [ 105.838525][ T2489] device pim6reg1 entered promiscuous mode [ 106.541941][ T2503] device syzkaller0 entered promiscuous mode [ 107.570981][ T2551] device pim6reg1 entered promiscuous mode [ 107.767924][ T2547] device syzkaller0 entered promiscuous mode [ 108.775396][ T2578] device pim6reg1 entered promiscuous mode [ 109.271804][ T2584] device syzkaller0 entered promiscuous mode [ 110.575813][ T2637] device syzkaller0 entered promiscuous mode [ 112.029133][ T2679] device syzkaller0 entered promiscuous mode [ 112.831897][ T2711] device syzkaller0 entered promiscuous mode [ 114.364801][ T2760] device syzkaller0 entered promiscuous mode [ 116.256936][ T2800] device syzkaller0 entered promiscuous mode [ 118.480837][ T2872] device syzkaller0 entered promiscuous mode [ 120.039368][ T2926] device syzkaller0 entered promiscuous mode [ 120.911471][ T2942] device syzkaller0 entered promiscuous mode [ 122.283865][ T2964] device syzkaller0 entered promiscuous mode [ 123.736151][ T3018] device syzkaller0 entered promiscuous mode [ 125.155352][ T3069] device syzkaller0 entered promiscuous mode [ 126.364678][ T3106] device syzkaller0 entered promiscuous mode [ 127.821632][ T3157] device syzkaller0 entered promiscuous mode [ 129.624643][ T30] audit: type=1400 audit(1756839526.230:118): avc: denied { relabelfrom } for pid=3207 comm="syz.1.1004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 129.692803][ T30] audit: type=1400 audit(1756839526.250:119): avc: denied { relabelto } for pid=3207 comm="syz.1.1004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 130.005183][ T3217] device syzkaller0 entered promiscuous mode [ 130.081940][ T3221] device pim6reg1 entered promiscuous mode [ 130.770264][ T3245] FAULT_INJECTION: forcing a failure. [ 130.770264][ T3245] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 130.997244][ T3245] CPU: 1 PID: 3245 Comm: syz.2.1017 Not tainted syzkaller #0 [ 131.004674][ T3245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 131.014784][ T3245] Call Trace: [ 131.018092][ T3245] [ 131.021042][ T3245] __dump_stack+0x21/0x30 [ 131.025410][ T3245] dump_stack_lvl+0xee/0x150 [ 131.030016][ T3245] ? show_regs_print_info+0x20/0x20 [ 131.035227][ T3245] dump_stack+0x15/0x20 [ 131.039401][ T3245] should_fail+0x3c1/0x510 [ 131.043834][ T3245] should_fail_usercopy+0x1a/0x20 [ 131.048939][ T3245] _copy_from_user+0x20/0xd0 [ 131.053554][ T3245] iovec_from_user+0x1bc/0x2f0 [ 131.058346][ T3245] __import_iovec+0x71/0x400 [ 131.062946][ T3245] ? kstrtol_from_user+0x260/0x260 [ 131.068161][ T3245] import_iovec+0x7c/0xb0 [ 131.072505][ T3245] ___sys_recvmsg+0x420/0x4f0 [ 131.077197][ T3245] ? __sys_recvmsg+0x250/0x250 [ 131.081962][ T3245] ? vfs_write+0xc17/0xf70 [ 131.086387][ T3245] ? __fdget+0x1a1/0x230 [ 131.090632][ T3245] __x64_sys_recvmsg+0x1df/0x2a0 [ 131.095666][ T3245] ? ___sys_recvmsg+0x4f0/0x4f0 [ 131.100515][ T3245] ? ksys_write+0x1eb/0x240 [ 131.105029][ T3245] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 131.111100][ T3245] x64_sys_call+0x705/0x9a0 [ 131.115700][ T3245] do_syscall_64+0x4c/0xa0 [ 131.120121][ T3245] ? clear_bhb_loop+0x50/0xa0 [ 131.124804][ T3245] ? clear_bhb_loop+0x50/0xa0 [ 131.129606][ T3245] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 131.135519][ T3245] RIP: 0033:0x7f3e87e0dbe9 [ 131.140201][ T3245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.159835][ T3245] RSP: 002b:00007f3e86855038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 131.168268][ T3245] RAX: ffffffffffffffda RBX: 00007f3e88045090 RCX: 00007f3e87e0dbe9 [ 131.176346][ T3245] RDX: 0000000040000100 RSI: 0000200000001140 RDI: 0000000000000004 [ 131.184316][ T3245] RBP: 00007f3e86855090 R08: 0000000000000000 R09: 0000000000000000 [ 131.192286][ T3245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 131.200344][ T3245] R13: 00007f3e88045128 R14: 00007f3e88045090 R15: 00007ffcbff74778 [ 131.208320][ T3245] [ 131.748570][ T3252] device syzkaller0 entered promiscuous mode [ 131.835262][ T3267] device pim6reg1 entered promiscuous mode [ 132.843966][ T3309] device syzkaller0 entered promiscuous mode [ 132.897713][ T3315] device pim6reg1 entered promiscuous mode [ 134.343671][ T3370] device syzkaller0 entered promiscuous mode [ 134.455045][ T3388] device pim6reg1 entered promiscuous mode [ 136.195253][ T3421] device syzkaller0 entered promiscuous mode [ 137.602749][ T3467] device syzkaller0 entered promiscuous mode [ 138.017177][ T3488] device sit0 entered promiscuous mode [ 138.637753][ T3505] device syzkaller0 entered promiscuous mode [ 139.338428][ T3529] device syzkaller0 entered promiscuous mode [ 139.506951][ T3538] device syzkaller0 entered promiscuous mode [ 139.853691][ T3545] device syzkaller0 entered promiscuous mode [ 140.999182][ T3575] device syzkaller0 entered promiscuous mode [ 141.660361][ T3588] FAULT_INJECTION: forcing a failure. [ 141.660361][ T3588] name failslab, interval 1, probability 0, space 0, times 1 [ 141.673359][ T3588] CPU: 1 PID: 3588 Comm: syz.2.1148 Not tainted syzkaller #0 [ 141.680755][ T3588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 141.690834][ T3588] Call Trace: [ 141.694138][ T3588] [ 141.697081][ T3588] __dump_stack+0x21/0x30 [ 141.701529][ T3588] dump_stack_lvl+0xee/0x150 [ 141.706148][ T3588] ? show_regs_print_info+0x20/0x20 [ 141.711376][ T3588] dump_stack+0x15/0x20 [ 141.715547][ T3588] should_fail+0x3c1/0x510 [ 141.720005][ T3588] ? alloc_skb_with_frags+0xa8/0x620 [ 141.725316][ T3588] __should_failslab+0xa4/0xe0 [ 141.730101][ T3588] should_failslab+0x9/0x20 [ 141.734631][ T3588] slab_pre_alloc_hook+0x3b/0xe0 [ 141.739593][ T3588] ? alloc_skb_with_frags+0xa8/0x620 [ 141.744903][ T3588] ? alloc_skb_with_frags+0xa8/0x620 [ 141.750213][ T3588] __kmalloc_track_caller+0x6c/0x2c0 [ 141.755514][ T3588] ? alloc_skb_with_frags+0xa8/0x620 [ 141.760812][ T3588] ? alloc_skb_with_frags+0xa8/0x620 [ 141.766220][ T3588] __alloc_skb+0x21a/0x740 [ 141.770659][ T3588] alloc_skb_with_frags+0xa8/0x620 [ 141.775789][ T3588] ? fib6_lookup+0x2a0/0x2a0 [ 141.780403][ T3588] sock_alloc_send_pskb+0x853/0x980 [ 141.785632][ T3588] ? sock_kzfree_s+0x60/0x60 [ 141.790239][ T3588] ? irqentry_exit+0x37/0x40 [ 141.794850][ T3588] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 141.800686][ T3588] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 141.806874][ T3588] sock_alloc_send_skb+0x32/0x40 [ 141.811834][ T3588] __ip6_append_data+0x252e/0x37e0 [ 141.816975][ T3588] ? icmpv6_route_lookup+0x457/0x4e0 [ 141.822286][ T3588] ? ip6_setup_cork+0x1290/0x1290 [ 141.827334][ T3588] ? __kasan_check_read+0x11/0x20 [ 141.832377][ T3588] ? ip6_setup_cork+0xd10/0x1290 [ 141.837331][ T3588] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 141.843158][ T3588] ip6_append_data+0x1d0/0x330 [ 141.848033][ T3588] ? icmpv6_route_lookup+0x4e0/0x4e0 [ 141.853337][ T3588] ? icmpv6_route_lookup+0x4e0/0x4e0 [ 141.858637][ T3588] icmp6_send+0xeb8/0x14c0 [ 141.863079][ T3588] ? icmpv6_push_pending_frames+0x440/0x440 [ 141.868990][ T3588] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 141.875162][ T3588] ? __skb_flow_dissect+0x520c/0x5930 [ 141.880554][ T3588] icmpv6_param_prob+0x2f/0x40 [ 141.885337][ T3588] ip6_parse_tlv+0x1a4c/0x1ba0 [ 141.890132][ T3588] ? irqentry_exit+0x37/0x40 [ 141.894755][ T3588] ipv6_parse_hopopts+0x2a3/0x580 [ 141.899802][ T3588] ip6_rcv_core+0xca7/0x1390 [ 141.904417][ T3588] ipv6_rcv+0xca/0x210 [ 141.908508][ T3588] ? irqentry_exit+0x37/0x40 [ 141.913129][ T3588] ? ip6_rcv_finish+0x360/0x360 [ 141.918001][ T3588] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 141.924188][ T3588] ? __netif_receive_skb+0x30/0x280 [ 141.929521][ T3588] ? ip6_rcv_finish+0x360/0x360 [ 141.934395][ T3588] __netif_receive_skb+0xc8/0x280 [ 141.939427][ T3588] ? _copy_from_iter+0x4ae/0x1050 [ 141.944460][ T3588] ? __kasan_check_write+0x14/0x20 [ 141.949575][ T3588] netif_receive_skb+0x98/0x3d0 [ 141.954431][ T3588] ? netif_receive_skb_core+0x100/0x100 [ 141.959985][ T3588] ? __kernel_text_address+0xa0/0x100 [ 141.965363][ T3588] ? virtio_net_hdr_to_skb+0x9df/0x11c0 [ 141.970914][ T3588] tun_rx_batched+0x5e8/0x710 [ 141.975610][ T3588] ? local_bh_enable+0x30/0x30 [ 141.980382][ T3588] tun_get_user+0x279c/0x33c0 [ 141.985065][ T3588] ? __x64_sys_openat+0x136/0x160 [ 141.990097][ T3588] ? x64_sys_call+0x219/0x9a0 [ 141.994901][ T3588] ? tun_do_read+0x1c40/0x1c40 [ 141.999672][ T3588] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 142.005523][ T3588] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 142.011688][ T3588] tun_chr_write_iter+0x1eb/0x2e0 [ 142.016719][ T3588] vfs_write+0x802/0xf70 [ 142.020974][ T3588] ? file_end_write+0x1b0/0x1b0 [ 142.025831][ T3588] ? __fget_files+0x2c4/0x320 [ 142.030509][ T3588] ? __fdget_pos+0x1f7/0x380 [ 142.035101][ T3588] ? ksys_write+0x71/0x240 [ 142.039519][ T3588] ksys_write+0x140/0x240 [ 142.043846][ T3588] ? __ia32_sys_read+0x90/0x90 [ 142.048609][ T3588] ? sched_clock_cpu+0x18/0x3c0 [ 142.053459][ T3588] __x64_sys_write+0x7b/0x90 [ 142.058052][ T3588] x64_sys_call+0x8ef/0x9a0 [ 142.062563][ T3588] do_syscall_64+0x4c/0xa0 [ 142.066981][ T3588] ? clear_bhb_loop+0x50/0xa0 [ 142.071659][ T3588] ? clear_bhb_loop+0x50/0xa0 [ 142.076336][ T3588] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 142.082229][ T3588] RIP: 0033:0x7f3e87e0dbe9 [ 142.086646][ T3588] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 142.106248][ T3588] RSP: 002b:00007f3e86876038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 142.114663][ T3588] RAX: ffffffffffffffda RBX: 00007f3e88044fa0 RCX: 00007f3e87e0dbe9 [ 142.122636][ T3588] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 142.130604][ T3588] RBP: 00007f3e86876090 R08: 0000000000000000 R09: 0000000000000000 [ 142.138575][ T3588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.146541][ T3588] R13: 00007f3e88045038 R14: 00007f3e88044fa0 R15: 00007ffcbff74778 [ 142.154519][ T3588] [ 142.197918][ T30] audit: type=1400 audit(1756839538.800:120): avc: denied { create } for pid=3585 comm="syz.0.1146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 143.706558][ T3625] 7’ç÷ï: renamed from syzkaller0 [ 145.799742][ C0] sched: RT throttling activated [ 146.878884][ T3640] device syzkaller0 entered promiscuous mode [ 147.617576][ T3701] FAULT_INJECTION: forcing a failure. [ 147.617576][ T3701] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 147.656116][ T3701] CPU: 1 PID: 3701 Comm: syz.3.1190 Not tainted syzkaller #0 [ 147.663543][ T3701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 147.673614][ T3701] Call Trace: [ 147.676906][ T3701] [ 147.679848][ T3701] __dump_stack+0x21/0x30 [ 147.684291][ T3701] dump_stack_lvl+0xee/0x150 [ 147.688930][ T3701] ? show_regs_print_info+0x20/0x20 [ 147.694160][ T3701] ? irqentry_exit+0x37/0x40 [ 147.698779][ T3701] dump_stack+0x15/0x20 [ 147.702967][ T3701] should_fail+0x3c1/0x510 [ 147.707407][ T3701] should_fail_usercopy+0x1a/0x20 [ 147.712459][ T3701] _copy_from_user+0x20/0xd0 [ 147.717081][ T3701] __copy_msghdr_from_user+0xaf/0x5e0 [ 147.722476][ T3701] ? _kstrtoull+0x3c0/0x4d0 [ 147.727000][ T3701] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 147.732306][ T3701] ? kstrtouint_from_user+0x1a0/0x200 [ 147.737706][ T3701] ___sys_sendmsg+0x156/0x260 [ 147.742407][ T3701] ? __sys_sendmsg+0x250/0x250 [ 147.747208][ T3701] ? __fdget+0x1a1/0x230 [ 147.751494][ T3701] __x64_sys_sendmsg+0x1e2/0x2a0 [ 147.756465][ T3701] ? ___sys_sendmsg+0x260/0x260 [ 147.761341][ T3701] x64_sys_call+0x4b/0x9a0 [ 147.765773][ T3701] do_syscall_64+0x4c/0xa0 [ 147.770207][ T3701] ? clear_bhb_loop+0x50/0xa0 [ 147.774910][ T3701] ? clear_bhb_loop+0x50/0xa0 [ 147.779608][ T3701] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 147.785524][ T3701] RIP: 0033:0x7f1773cc9be9 [ 147.789963][ T3701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 147.809675][ T3701] RSP: 002b:00007f1772732038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 147.818154][ T3701] RAX: ffffffffffffffda RBX: 00007f1773f00fa0 RCX: 00007f1773cc9be9 [ 147.826159][ T3701] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 000000000000000a [ 147.834149][ T3701] RBP: 00007f1772732090 R08: 0000000000000000 R09: 0000000000000000 [ 147.842147][ T3701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 147.850146][ T3701] R13: 00007f1773f01038 R14: 00007f1773f00fa0 R15: 00007fffa65da888 [ 147.858142][ T3701] [ 150.965426][ T3710] ªªªªªª: renamed from vlan0 [ 151.244623][ T3739] ªªªªªª: renamed from vlan0 [ 151.410856][ T3740] ªªªªªª: renamed from vlan0 [ 151.887345][ T3758] device syzkaller0 entered promiscuous mode [ 151.984282][ T3771] device syzkaller0 entered promiscuous mode [ 153.151535][ T3808] device syzkaller0 entered promiscuous mode [ 153.410691][ T3824] FAULT_INJECTION: forcing a failure. [ 153.410691][ T3824] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 153.434028][ T3824] CPU: 1 PID: 3824 Comm: syz.3.1230 Not tainted syzkaller #0 [ 153.441463][ T3824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 153.451559][ T3824] Call Trace: [ 153.454855][ T3824] [ 153.457801][ T3824] __dump_stack+0x21/0x30 [ 153.462157][ T3824] dump_stack_lvl+0xee/0x150 [ 153.466772][ T3824] ? show_regs_print_info+0x20/0x20 [ 153.472003][ T3824] dump_stack+0x15/0x20 [ 153.476203][ T3824] should_fail+0x3c1/0x510 [ 153.480650][ T3824] should_fail_usercopy+0x1a/0x20 [ 153.485696][ T3824] _copy_to_user+0x20/0x90 [ 153.490188][ T3824] simple_read_from_buffer+0xe9/0x160 [ 153.495589][ T3824] proc_fail_nth_read+0x19a/0x210 [ 153.500644][ T3824] ? proc_fault_inject_write+0x2f0/0x2f0 [ 153.506307][ T3824] ? security_file_permission+0x83/0xa0 [ 153.511886][ T3824] ? proc_fault_inject_write+0x2f0/0x2f0 [ 153.517554][ T3824] vfs_read+0x282/0xbe0 [ 153.521738][ T3824] ? kernel_read+0x1f0/0x1f0 [ 153.526353][ T3824] ? __kasan_check_write+0x14/0x20 [ 153.531482][ T3824] ? mutex_lock+0x95/0x1a0 [ 153.536087][ T3824] ? wait_for_completion_killable_timeout+0x10/0x10 [ 153.542676][ T3824] ? __fget_files+0x2c4/0x320 [ 153.547368][ T3824] ? __fdget_pos+0x2d2/0x380 [ 153.551964][ T3824] ? ksys_read+0x71/0x240 [ 153.556387][ T3824] ksys_read+0x140/0x240 [ 153.560647][ T3824] ? vfs_write+0xf70/0xf70 [ 153.565069][ T3824] ? debug_smp_processor_id+0x17/0x20 [ 153.570465][ T3824] __x64_sys_read+0x7b/0x90 [ 153.574965][ T3824] x64_sys_call+0x96d/0x9a0 [ 153.579473][ T3824] do_syscall_64+0x4c/0xa0 [ 153.583891][ T3824] ? clear_bhb_loop+0x50/0xa0 [ 153.588568][ T3824] ? clear_bhb_loop+0x50/0xa0 [ 153.593255][ T3824] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 153.599156][ T3824] RIP: 0033:0x7f1773cc85fc [ 153.603572][ T3824] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 153.623176][ T3824] RSP: 002b:00007f1772711030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 153.631594][ T3824] RAX: ffffffffffffffda RBX: 00007f1773f01090 RCX: 00007f1773cc85fc [ 153.639564][ T3824] RDX: 000000000000000f RSI: 00007f17727110a0 RDI: 000000000000000a [ 153.647533][ T3824] RBP: 00007f1772711090 R08: 0000000000000000 R09: 0000000000000000 [ 153.655505][ T3824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 153.663478][ T3824] R13: 00007f1773f01128 R14: 00007f1773f01090 R15: 00007fffa65da888 [ 153.671468][ T3824] [ 155.019386][ T3851] device syzkaller0 entered promiscuous mode [ 156.003523][ T3894] FAULT_INJECTION: forcing a failure. [ 156.003523][ T3894] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 156.029464][ T3894] CPU: 0 PID: 3894 Comm: syz.2.1251 Not tainted syzkaller #0 [ 156.036918][ T3894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 156.046995][ T3894] Call Trace: [ 156.050295][ T3894] [ 156.053241][ T3894] __dump_stack+0x21/0x30 [ 156.057593][ T3894] dump_stack_lvl+0xee/0x150 [ 156.062210][ T3894] ? show_regs_print_info+0x20/0x20 [ 156.067436][ T3894] ? migrate_enable+0x192/0x260 [ 156.072323][ T3894] ? migrate_disable+0x180/0x180 [ 156.077283][ T3894] dump_stack+0x15/0x20 [ 156.081465][ T3894] should_fail+0x3c1/0x510 [ 156.086020][ T3894] should_fail_usercopy+0x1a/0x20 [ 156.091080][ T3894] _copy_from_user+0x20/0xd0 [ 156.095711][ T3894] generic_map_update_batch+0x4a3/0x740 [ 156.101291][ T3894] ? generic_map_delete_batch+0x510/0x510 [ 156.107044][ T3894] ? __fdget+0x1a1/0x230 [ 156.111315][ T3894] ? generic_map_delete_batch+0x510/0x510 [ 156.117053][ T3894] bpf_map_do_batch+0x463/0x5f0 [ 156.121929][ T3894] __sys_bpf+0x5e3/0x730 [ 156.126193][ T3894] ? bpf_link_show_fdinfo+0x310/0x310 [ 156.131609][ T3894] ? debug_smp_processor_id+0x17/0x20 [ 156.137012][ T3894] __x64_sys_bpf+0x7c/0x90 [ 156.141458][ T3894] x64_sys_call+0x4b9/0x9a0 [ 156.145978][ T3894] do_syscall_64+0x4c/0xa0 [ 156.150413][ T3894] ? clear_bhb_loop+0x50/0xa0 [ 156.155108][ T3894] ? clear_bhb_loop+0x50/0xa0 [ 156.159812][ T3894] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 156.165730][ T3894] RIP: 0033:0x7f3e87e0dbe9 [ 156.170261][ T3894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.185171][ T30] audit: type=1400 audit(1756839552.790:121): avc: denied { create } for pid=3895 comm="syz.1.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 156.189912][ T3894] RSP: 002b:00007f3e86876038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 156.189943][ T3894] RAX: ffffffffffffffda RBX: 00007f3e88044fa0 RCX: 00007f3e87e0dbe9 [ 156.189962][ T3894] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 156.233855][ T3894] RBP: 00007f3e86876090 R08: 0000000000000000 R09: 0000000000000000 [ 156.241839][ T3894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.249817][ T3894] R13: 00007f3e88045038 R14: 00007f3e88044fa0 R15: 00007ffcbff74778 [ 156.257800][ T3894] [ 156.615770][ T3902] device syzkaller0 entered promiscuous mode [ 156.662871][ T3910] device syzkaller0 entered promiscuous mode [ 156.825625][ T3922] syz.2.1260[3922] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.825705][ T3922] syz.2.1260[3922] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.728867][ T30] audit: type=1400 audit(1756839555.330:122): avc: denied { tracepoint } for pid=3964 comm="syz.2.1274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 158.772703][ T3969] FAULT_INJECTION: forcing a failure. [ 158.772703][ T3969] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 158.786579][ T3969] CPU: 0 PID: 3969 Comm: syz.3.1271 Not tainted syzkaller #0 [ 158.794156][ T3969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 158.804222][ T3969] Call Trace: [ 158.807519][ T3969] [ 158.810452][ T3969] __dump_stack+0x21/0x30 [ 158.814834][ T3969] dump_stack_lvl+0xee/0x150 [ 158.819515][ T3969] ? show_regs_print_info+0x20/0x20 [ 158.824755][ T3969] ? 0xffffffffa002a700 [ 158.828922][ T3969] dump_stack+0x15/0x20 [ 158.833087][ T3969] should_fail+0x3c1/0x510 [ 158.837511][ T3969] should_fail_alloc_page+0x55/0x80 [ 158.842712][ T3969] prepare_alloc_pages+0x156/0x600 [ 158.847825][ T3969] ? __alloc_pages_bulk+0xab0/0xab0 [ 158.853025][ T3969] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 158.858667][ T3969] __alloc_pages+0x10a/0x440 [ 158.863260][ T3969] ? prep_new_page+0x110/0x110 [ 158.868031][ T3969] pcpu_populate_chunk+0x184/0xcb0 [ 158.873143][ T3969] ? _find_next_bit+0x106/0x200 [ 158.877996][ T3969] pcpu_alloc+0xc4d/0x1660 [ 158.882416][ T3969] __alloc_percpu_gfp+0x25/0x30 [ 158.887273][ T3969] bpf_map_alloc_percpu+0xc5/0x150 [ 158.892395][ T3969] array_map_alloc+0x39a/0x6d0 [ 158.897164][ T3969] map_create+0x455/0x21b0 [ 158.901589][ T3969] __sys_bpf+0x2cf/0x730 [ 158.905836][ T3969] ? bpf_link_show_fdinfo+0x310/0x310 [ 158.911215][ T3969] ? debug_smp_processor_id+0x17/0x20 [ 158.916604][ T3969] __x64_sys_bpf+0x7c/0x90 [ 158.921289][ T3969] x64_sys_call+0x4b9/0x9a0 [ 158.925797][ T3969] do_syscall_64+0x4c/0xa0 [ 158.930213][ T3969] ? clear_bhb_loop+0x50/0xa0 [ 158.934896][ T3969] ? clear_bhb_loop+0x50/0xa0 [ 158.939573][ T3969] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 158.945466][ T3969] RIP: 0033:0x7f1773cc9be9 [ 158.949893][ T3969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 158.969536][ T3969] RSP: 002b:00007f1772711038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 158.977962][ T3969] RAX: ffffffffffffffda RBX: 00007f1773f01090 RCX: 00007f1773cc9be9 [ 158.985943][ T3969] RDX: 0000000000000048 RSI: 0000200000000b00 RDI: 2000000000000000 [ 158.993916][ T3969] RBP: 00007f1772711090 R08: 0000000000000000 R09: 0000000000000000 [ 159.001889][ T3969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 159.009863][ T3969] R13: 00007f1773f01128 R14: 00007f1773f01090 R15: 00007fffa65da888 [ 159.017937][ T3969] [ 159.101904][ T3951] device syzkaller0 entered promiscuous mode [ 159.282855][ T30] audit: type=1400 audit(1756839555.890:123): avc: denied { create } for pid=3984 comm="syz.3.1279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 159.735873][ T4011] device syzkaller0 entered promiscuous mode [ 160.014176][ T4037] device veth1_macvtap left promiscuous mode [ 160.043156][ T4037] device veth1_macvtap entered promiscuous mode [ 160.054247][ T4037] device macsec0 entered promiscuous mode [ 160.215219][ T4045] device syzkaller0 entered promiscuous mode [ 161.606764][ T4088] device syzkaller0 entered promiscuous mode [ 162.813528][ T4122] device syzkaller0 entered promiscuous mode [ 164.189175][ T4160] device syzkaller0 entered promiscuous mode [ 164.845241][ T4177] device syzkaller0 entered promiscuous mode [ 165.541890][ T4184] device syzkaller0 entered promiscuous mode [ 166.031325][ T4202] device syzkaller0 entered promiscuous mode [ 166.164038][ T4198] device syzkaller0 entered promiscuous mode [ 166.955552][ T4217] device syzkaller0 entered promiscuous mode [ 167.923687][ T4237] device syzkaller0 entered promiscuous mode [ 168.283641][ T4261] FAULT_INJECTION: forcing a failure. [ 168.283641][ T4261] name failslab, interval 1, probability 0, space 0, times 0 [ 168.308410][ T4261] CPU: 1 PID: 4261 Comm: syz.1.1378 Not tainted syzkaller #0 [ 168.315838][ T4261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 168.325913][ T4261] Call Trace: [ 168.329219][ T4261] [ 168.332167][ T4261] __dump_stack+0x21/0x30 [ 168.336520][ T4261] dump_stack_lvl+0xee/0x150 [ 168.341141][ T4261] ? show_regs_print_info+0x20/0x20 [ 168.346365][ T4261] dump_stack+0x15/0x20 [ 168.350539][ T4261] should_fail+0x3c1/0x510 [ 168.354976][ T4261] __should_failslab+0xa4/0xe0 [ 168.359759][ T4261] should_failslab+0x9/0x20 [ 168.364317][ T4261] slab_pre_alloc_hook+0x3b/0xe0 [ 168.369287][ T4261] kmem_cache_alloc_trace+0x48/0x270 [ 168.374596][ T4261] ? bpf_tracing_prog_attach+0x326/0xea0 [ 168.380264][ T4261] bpf_tracing_prog_attach+0x326/0xea0 [ 168.385748][ T4261] ? do_kern_addr_fault+0x80/0x80 [ 168.390809][ T4261] ? bpf_insn_prepare_dump+0x830/0x830 [ 168.396287][ T4261] ? __fget_files+0x2c4/0x320 [ 168.400987][ T4261] bpf_raw_tracepoint_open+0x667/0x960 [ 168.406464][ T4261] ? bpf_obj_get_info_by_fd+0x2990/0x2990 [ 168.412204][ T4261] ? asm_exc_page_fault+0x27/0x30 [ 168.417249][ T4261] ? selinux_bpf+0xce/0xf0 [ 168.421696][ T4261] ? security_bpf+0x82/0xa0 [ 168.426215][ T4261] __sys_bpf+0x490/0x730 [ 168.430472][ T4261] ? bpf_link_show_fdinfo+0x310/0x310 [ 168.435865][ T4261] ? bpf_trace_run2+0xb5/0x1b0 [ 168.440736][ T4261] ? debug_smp_processor_id+0x17/0x20 [ 168.446219][ T4261] ? perf_trace_sys_enter+0x30/0x150 [ 168.451527][ T4261] __x64_sys_bpf+0x7c/0x90 [ 168.455981][ T4261] x64_sys_call+0x4b9/0x9a0 [ 168.460505][ T4261] do_syscall_64+0x4c/0xa0 [ 168.464955][ T4261] ? clear_bhb_loop+0x50/0xa0 [ 168.469676][ T4261] ? clear_bhb_loop+0x50/0xa0 [ 168.474364][ T4261] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 168.480262][ T4261] RIP: 0033:0x7f84f835cbe9 [ 168.484705][ T4261] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 168.504416][ T4261] RSP: 002b:00007f84f6dc5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 168.512852][ T4261] RAX: ffffffffffffffda RBX: 00007f84f8593fa0 RCX: 00007f84f835cbe9 [ 168.520837][ T4261] RDX: 0000000000000010 RSI: 0000200000000000 RDI: 0000000000000011 [ 168.528823][ T4261] RBP: 00007f84f6dc5090 R08: 0000000000000000 R09: 0000000000000000 [ 168.536819][ T4261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 168.544806][ T4261] R13: 00007f84f8594038 R14: 00007f84f8593fa0 R15: 00007ffcd29d5058 [ 168.552794][ T4261] [ 168.970528][ T4289] device syzkaller0 entered promiscuous mode [ 170.125158][ T30] audit: type=1400 audit(1756839566.730:124): avc: denied { create } for pid=4335 comm="syz.4.1403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 170.171413][ T4332] device syzkaller0 entered promiscuous mode [ 172.284445][ T4366] FAULT_INJECTION: forcing a failure. [ 172.284445][ T4366] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 172.355231][ T4366] CPU: 0 PID: 4366 Comm: syz.0.1412 Not tainted syzkaller #0 [ 172.362756][ T4366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 172.372825][ T4366] Call Trace: [ 172.376114][ T4366] [ 172.379055][ T4366] __dump_stack+0x21/0x30 [ 172.383411][ T4366] dump_stack_lvl+0xee/0x150 [ 172.388031][ T4366] ? show_regs_print_info+0x20/0x20 [ 172.393253][ T4366] ? 0xffffffffa0028cf4 [ 172.397427][ T4366] dump_stack+0x15/0x20 [ 172.401600][ T4366] should_fail+0x3c1/0x510 [ 172.406049][ T4366] should_fail_alloc_page+0x55/0x80 [ 172.411272][ T4366] prepare_alloc_pages+0x156/0x600 [ 172.416404][ T4366] ? __alloc_pages_bulk+0xab0/0xab0 [ 172.421708][ T4366] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 172.427367][ T4366] __alloc_pages+0x10a/0x440 [ 172.431985][ T4366] ? prep_new_page+0x110/0x110 [ 172.436784][ T4366] pcpu_populate_chunk+0x184/0xcb0 [ 172.441922][ T4366] ? _find_next_bit+0x1b5/0x200 [ 172.446800][ T4366] pcpu_alloc+0xc4d/0x1660 [ 172.451372][ T4366] __alloc_percpu_gfp+0x25/0x30 [ 172.456253][ T4366] bpf_map_alloc_percpu+0xc5/0x150 [ 172.461385][ T4366] array_map_alloc+0x39a/0x6d0 [ 172.466173][ T4366] map_create+0x455/0x21b0 [ 172.470609][ T4366] __sys_bpf+0x2cf/0x730 [ 172.474877][ T4366] ? bpf_link_show_fdinfo+0x310/0x310 [ 172.480268][ T4366] ? bpf_trace_run2+0xb5/0x1b0 [ 172.485061][ T4366] ? __bpf_trace_sys_enter+0x62/0x70 [ 172.490367][ T4366] __x64_sys_bpf+0x7c/0x90 [ 172.494802][ T4366] x64_sys_call+0x4b9/0x9a0 [ 172.499322][ T4366] do_syscall_64+0x4c/0xa0 [ 172.503840][ T4366] ? clear_bhb_loop+0x50/0xa0 [ 172.508543][ T4366] ? clear_bhb_loop+0x50/0xa0 [ 172.513249][ T4366] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 172.519169][ T4366] RIP: 0033:0x7f0b432ddbe9 [ 172.523608][ T4366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 172.543240][ T4366] RSP: 002b:00007f0b41d46038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 172.551682][ T4366] RAX: ffffffffffffffda RBX: 00007f0b43514fa0 RCX: 00007f0b432ddbe9 [ 172.559679][ T4366] RDX: 0000000000000048 RSI: 0000200000000d00 RDI: 2000000000000000 [ 172.567677][ T4366] RBP: 00007f0b41d46090 R08: 0000000000000000 R09: 0000000000000000 [ 172.575777][ T4366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 172.583784][ T4366] R13: 00007f0b43515038 R14: 00007f0b43514fa0 R15: 00007ffd65df4008 [ 172.591795][ T4366] [ 173.202158][ T4390] device syzkaller0 entered promiscuous mode [ 174.066749][ T4433] device syzkaller0 entered promiscuous mode [ 174.081595][ T30] audit: type=1400 audit(1756839570.690:125): avc: denied { create } for pid=4441 comm="syz.1.1438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 174.150168][ T30] audit: type=1400 audit(1756839570.740:126): avc: denied { append } for pid=4445 comm="syz.2.1440" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 175.271222][ T4485] FAULT_INJECTION: forcing a failure. [ 175.271222][ T4485] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 175.332198][ T4485] CPU: 1 PID: 4485 Comm: syz.3.1452 Not tainted syzkaller #0 [ 175.339629][ T4485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 175.349710][ T4485] Call Trace: [ 175.353006][ T4485] [ 175.355956][ T4485] __dump_stack+0x21/0x30 [ 175.360322][ T4485] dump_stack_lvl+0xee/0x150 [ 175.364942][ T4485] ? show_regs_print_info+0x20/0x20 [ 175.370172][ T4485] ? __kasan_kmalloc+0xec/0x110 [ 175.375103][ T4485] ? bpf_map_area_alloc+0x49/0xe0 [ 175.380164][ T4485] ? bpf_ringbuf_alloc+0x37/0x470 [ 175.385225][ T4485] dump_stack+0x15/0x20 [ 175.389414][ T4485] should_fail+0x3c1/0x510 [ 175.393906][ T4485] should_fail_alloc_page+0x55/0x80 [ 175.399138][ T4485] prepare_alloc_pages+0x156/0x600 [ 175.404280][ T4485] ? __alloc_pages_bulk+0xab0/0xab0 [ 175.409511][ T4485] __alloc_pages+0x10a/0x440 [ 175.414125][ T4485] ? prep_new_page+0x110/0x110 [ 175.418917][ T4485] ? bpf_map_area_alloc+0x49/0xe0 [ 175.423948][ T4485] bpf_ringbuf_alloc+0x1b5/0x470 [ 175.429001][ T4485] ringbuf_map_alloc+0x1f6/0x320 [ 175.433965][ T4485] map_create+0x455/0x21b0 [ 175.438391][ T4485] __sys_bpf+0x2cf/0x730 [ 175.442645][ T4485] ? bpf_link_show_fdinfo+0x310/0x310 [ 175.448034][ T4485] __x64_sys_bpf+0x7c/0x90 [ 175.452454][ T4485] x64_sys_call+0x4b9/0x9a0 [ 175.456961][ T4485] do_syscall_64+0x4c/0xa0 [ 175.461380][ T4485] ? clear_bhb_loop+0x50/0xa0 [ 175.466062][ T4485] ? clear_bhb_loop+0x50/0xa0 [ 175.470749][ T4485] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 175.476647][ T4485] RIP: 0033:0x7f1773cc9be9 [ 175.481062][ T4485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.500671][ T4485] RSP: 002b:00007f1772732038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 175.509085][ T4485] RAX: ffffffffffffffda RBX: 00007f1773f00fa0 RCX: 00007f1773cc9be9 [ 175.517089][ T4485] RDX: 0000000000000050 RSI: 00002000000007c0 RDI: 0000000000000000 [ 175.525067][ T4485] RBP: 00007f1772732090 R08: 0000000000000000 R09: 0000000000000000 [ 175.533040][ T4485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 175.541009][ T4485] R13: 00007f1773f01038 R14: 00007f1773f00fa0 R15: 00007fffa65da888 [ 175.548985][ T4485] [ 177.092425][ T4542] device pim6reg1 entered promiscuous mode [ 177.458897][ T4552] device sit0 left promiscuous mode [ 177.691781][ T30] audit: type=1400 audit(1756839574.300:127): avc: denied { create } for pid=4558 comm="syz.1.1476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 177.812675][ T4562] FAULT_INJECTION: forcing a failure. [ 177.812675][ T4562] name failslab, interval 1, probability 0, space 0, times 0 [ 177.825886][ T4562] CPU: 1 PID: 4562 Comm: syz.4.1477 Not tainted syzkaller #0 [ 177.833300][ T4562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 177.843374][ T4562] Call Trace: [ 177.846673][ T4562] [ 177.849619][ T4562] __dump_stack+0x21/0x30 [ 177.853974][ T4562] dump_stack_lvl+0xee/0x150 [ 177.858585][ T4562] ? show_regs_print_info+0x20/0x20 [ 177.863807][ T4562] dump_stack+0x15/0x20 [ 177.867989][ T4562] should_fail+0x3c1/0x510 [ 177.872425][ T4562] __should_failslab+0xa4/0xe0 [ 177.877211][ T4562] should_failslab+0x9/0x20 [ 177.881731][ T4562] slab_pre_alloc_hook+0x3b/0xe0 [ 177.886696][ T4562] ? vm_area_dup+0x26/0x210 [ 177.891218][ T4562] kmem_cache_alloc+0x44/0x260 [ 177.896009][ T4562] vm_area_dup+0x26/0x210 [ 177.900396][ T4562] copy_mm+0x93a/0x1390 [ 177.904572][ T4562] ? copy_signal+0x600/0x600 [ 177.909176][ T4562] ? __init_rwsem+0xfc/0x1d0 [ 177.913788][ T4562] ? copy_signal+0x4cb/0x600 [ 177.918410][ T4562] copy_process+0x115c/0x3210 [ 177.923116][ T4562] ? __kasan_check_write+0x14/0x20 [ 177.928251][ T4562] ? __pidfd_prepare+0x150/0x150 [ 177.933207][ T4562] ? security_file_permission+0x83/0xa0 [ 177.938778][ T4562] kernel_clone+0x23f/0x940 [ 177.943309][ T4562] ? create_io_thread+0x130/0x130 [ 177.948354][ T4562] ? __kasan_check_write+0x14/0x20 [ 177.953484][ T4562] ? mutex_unlock+0x89/0x220 [ 177.958101][ T4562] __x64_sys_clone+0x176/0x1d0 [ 177.963325][ T4562] ? __kasan_check_write+0x14/0x20 [ 177.968492][ T4562] ? __ia32_sys_vfork+0xf0/0xf0 [ 177.973373][ T4562] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 177.979467][ T4562] x64_sys_call+0x41f/0x9a0 [ 177.983988][ T4562] do_syscall_64+0x4c/0xa0 [ 177.988423][ T4562] ? clear_bhb_loop+0x50/0xa0 [ 177.993123][ T4562] ? clear_bhb_loop+0x50/0xa0 [ 177.997822][ T4562] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 178.003739][ T4562] RIP: 0033:0x7f3579db8be9 [ 178.008170][ T4562] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 178.027947][ T4562] RSP: 002b:00007f3578820fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 178.036386][ T4562] RAX: ffffffffffffffda RBX: 00007f3579feffa0 RCX: 00007f3579db8be9 [ 178.044379][ T4562] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000108011 [ 178.052370][ T4562] RBP: 00007f3578821090 R08: 0000000000000000 R09: 0000000000000000 [ 178.060359][ T4562] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 178.068342][ T4562] R13: 00007f3579ff0038 R14: 00007f3579feffa0 R15: 00007ffe465c3888 [ 178.076513][ T4562] [ 178.564800][ T4569] device syzkaller0 entered promiscuous mode [ 179.644250][ T30] audit: type=1400 audit(1756839576.250:128): avc: denied { create } for pid=4591 comm="syz.2.1489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 179.743350][ T4598] device pim6reg1 entered promiscuous mode [ 179.762174][ T4598] FAULT_INJECTION: forcing a failure. [ 179.762174][ T4598] name failslab, interval 1, probability 0, space 0, times 0 [ 179.774873][ T4598] CPU: 0 PID: 4598 Comm: syz.2.1490 Not tainted syzkaller #0 [ 179.782265][ T4598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 179.792518][ T4598] Call Trace: [ 179.795811][ T4598] [ 179.798756][ T4598] __dump_stack+0x21/0x30 [ 179.803105][ T4598] dump_stack_lvl+0xee/0x150 [ 179.807717][ T4598] ? show_regs_print_info+0x20/0x20 [ 179.813018][ T4598] ? pcpu_alloc+0x1126/0x1660 [ 179.817718][ T4598] dump_stack+0x15/0x20 [ 179.821886][ T4598] should_fail+0x3c1/0x510 [ 179.826320][ T4598] __should_failslab+0xa4/0xe0 [ 179.831100][ T4598] should_failslab+0x9/0x20 [ 179.835615][ T4598] slab_pre_alloc_hook+0x3b/0xe0 [ 179.840573][ T4598] ? __alloc_skb+0xe0/0x740 [ 179.845092][ T4598] kmem_cache_alloc+0x44/0x260 [ 179.849870][ T4598] __alloc_skb+0xe0/0x740 [ 179.854213][ T4598] inet6_rt_notify+0x287/0x470 [ 179.858987][ T4598] ? __se_sys_ioctl+0x121/0x1a0 [ 179.863856][ T4598] ? __x64_sys_ioctl+0x7b/0x90 [ 179.868640][ T4598] ? rt6_nh_dump_exceptions+0x690/0x690 [ 179.874213][ T4598] fib6_add+0x2279/0x3d10 [ 179.878566][ T4598] ? fib6_update_sernum_stub+0x190/0x190 [ 179.884218][ T4598] ? __kasan_check_write+0x14/0x20 [ 179.889354][ T4598] ? _raw_spin_lock_bh+0x8e/0xe0 [ 179.894309][ T4598] ? _raw_spin_lock_irq+0xe0/0xe0 [ 179.899351][ T4598] ip6_route_add+0x89/0x130 [ 179.903872][ T4598] addrconf_add_linklocal+0x3cf/0x620 [ 179.909264][ T4598] ? inet6_addr_del+0x540/0x540 [ 179.914131][ T4598] ? memcpy+0x56/0x70 [ 179.918124][ T4598] ? ipv6_generate_eui64+0x797/0x10b0 [ 179.923517][ T4598] addrconf_addr_gen+0x48b/0x5b0 [ 179.928467][ T4598] ? ip6_route_add+0x104/0x130 [ 179.933247][ T4598] ? addrconf_sysctl_register+0x1a0/0x1a0 [ 179.939095][ T4598] ? addrconf_add_dev+0x329/0x430 [ 179.944144][ T4598] ? local_bh_enable+0x30/0x30 [ 179.948932][ T4598] ? __local_bh_enable_ip+0x58/0x80 [ 179.954150][ T4598] ? addrconf_permanent_addr+0x867/0x8c0 [ 179.959802][ T4598] ? __kasan_check_read+0x11/0x20 [ 179.964846][ T4598] addrconf_init_auto_addrs+0x842/0xb90 [ 179.970396][ T4598] ? addrconf_dad_run+0x5a0/0x5a0 [ 179.975423][ T4598] ? igmpv3_del_delrec+0x700/0x700 [ 179.980534][ T4598] ? __local_bh_enable_ip+0x58/0x80 [ 179.985734][ T4598] ? _raw_spin_unlock_bh+0x51/0x60 [ 179.990853][ T4598] ? __kasan_check_write+0x14/0x20 [ 179.995972][ T4598] ? tun_sock_write_space+0x13b/0x1b0 [ 180.001353][ T4598] ? __kasan_check_write+0x14/0x20 [ 180.006481][ T4598] ? mutex_unlock+0x89/0x220 [ 180.011082][ T4598] ? __mutex_lock_slowpath+0x10/0x10 [ 180.016365][ T4598] ? macsec_notify+0xff/0x490 [ 180.021043][ T4598] ? addrconf_link_ready+0x134/0x190 [ 180.026331][ T4598] addrconf_notify+0x95d/0xde0 [ 180.031117][ T4598] raw_notifier_call_chain+0x90/0x100 [ 180.036494][ T4598] __dev_notify_flags+0x28f/0x500 [ 180.041527][ T4598] ? __dev_change_flags+0x6a0/0x6a0 [ 180.046730][ T4598] ? __dev_change_flags+0x510/0x6a0 [ 180.051934][ T4598] ? dev_get_flags+0x1e0/0x1e0 [ 180.056699][ T4598] ? __kasan_slab_free+0x11/0x20 [ 180.061655][ T4598] dev_change_flags+0xe8/0x1a0 [ 180.066418][ T4598] dev_ifsioc+0x147/0xe70 [ 180.070758][ T4598] ? dev_ioctl+0xd10/0xd10 [ 180.075179][ T4598] ? __kasan_check_write+0x14/0x20 [ 180.080287][ T4598] ? mutex_lock+0x95/0x1a0 [ 180.084717][ T4598] ? wait_for_completion_killable_timeout+0x10/0x10 [ 180.091324][ T4598] ? dev_get_by_name_rcu+0xc8/0xf0 [ 180.096440][ T4598] dev_ioctl+0x560/0xd10 [ 180.100685][ T4598] sock_do_ioctl+0x22e/0x300 [ 180.105283][ T4598] ? sock_show_fdinfo+0xa0/0xa0 [ 180.110144][ T4598] ? selinux_file_ioctl+0x377/0x480 [ 180.115354][ T4598] sock_ioctl+0x4bc/0x6b0 [ 180.119703][ T4598] ? sock_poll+0x3d0/0x3d0 [ 180.124131][ T4598] ? __fget_files+0x2c4/0x320 [ 180.128898][ T4598] ? security_file_ioctl+0x84/0xa0 [ 180.134011][ T4598] ? sock_poll+0x3d0/0x3d0 [ 180.138429][ T4598] __se_sys_ioctl+0x121/0x1a0 [ 180.143109][ T4598] __x64_sys_ioctl+0x7b/0x90 [ 180.147696][ T4598] x64_sys_call+0x2f/0x9a0 [ 180.152116][ T4598] do_syscall_64+0x4c/0xa0 [ 180.156529][ T4598] ? clear_bhb_loop+0x50/0xa0 [ 180.161203][ T4598] ? clear_bhb_loop+0x50/0xa0 [ 180.165910][ T4598] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 180.171802][ T4598] RIP: 0033:0x7f3e87e0dbe9 [ 180.176214][ T4598] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 180.195815][ T4598] RSP: 002b:00007f3e86876038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 180.204231][ T4598] RAX: ffffffffffffffda RBX: 00007f3e88044fa0 RCX: 00007f3e87e0dbe9 [ 180.212202][ T4598] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 180.220172][ T4598] RBP: 00007f3e86876090 R08: 0000000000000000 R09: 0000000000000000 [ 180.228142][ T4598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 180.236112][ T4598] R13: 00007f3e88045038 R14: 00007f3e88044fa0 R15: 00007ffcbff74778 [ 180.244094][ T4598] [ 180.531627][ T4601] device syzkaller0 entered promiscuous mode [ 182.903952][ T4627] device pim6reg1 entered promiscuous mode [ 182.952242][ T4630] device pim6reg1 entered promiscuous mode [ 183.946106][ T4671] device pim6reg1 entered promiscuous mode [ 185.015793][ T4710] device syzkaller0 entered promiscuous mode [ 185.030631][ T30] audit: type=1400 audit(1756839581.640:129): avc: denied { create } for pid=4709 comm="syz.0.1528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 188.292230][ T4772] FAULT_INJECTION: forcing a failure. [ 188.292230][ T4772] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 188.323710][ T4772] CPU: 0 PID: 4772 Comm: syz.1.1547 Not tainted syzkaller #0 [ 188.331135][ T4772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 188.341183][ T4772] Call Trace: [ 188.344454][ T4772] [ 188.347382][ T4772] __dump_stack+0x21/0x30 [ 188.351709][ T4772] dump_stack_lvl+0xee/0x150 [ 188.356289][ T4772] ? show_regs_print_info+0x20/0x20 [ 188.361488][ T4772] ? exc_page_fault+0x5e/0xb0 [ 188.366185][ T4772] dump_stack+0x15/0x20 [ 188.370334][ T4772] should_fail+0x3c1/0x510 [ 188.374885][ T4772] should_fail_usercopy+0x1a/0x20 [ 188.379921][ T4772] copy_page_from_iter+0x2f6/0x680 [ 188.385043][ T4772] pipe_write+0x914/0x18d0 [ 188.389461][ T4772] ? pipe_write+0xf1/0x18d0 [ 188.393965][ T4772] ? pipe_read+0xfe0/0xfe0 [ 188.398384][ T4772] ? selinux_file_permission+0x3f4/0x510 [ 188.404013][ T4772] ? memset+0x35/0x40 [ 188.408018][ T4772] ? iov_iter_init+0xbc/0x180 [ 188.412715][ T4772] vfs_write+0x802/0xf70 [ 188.416973][ T4772] ? file_end_write+0x1b0/0x1b0 [ 188.421833][ T4772] ? __fget_files+0x2c4/0x320 [ 188.426502][ T4772] ? __fdget_pos+0x1f7/0x380 [ 188.431084][ T4772] ? ksys_write+0x71/0x240 [ 188.435490][ T4772] ksys_write+0x140/0x240 [ 188.439827][ T4772] ? __ia32_sys_read+0x90/0x90 [ 188.444588][ T4772] ? debug_smp_processor_id+0x17/0x20 [ 188.449957][ T4772] __x64_sys_write+0x7b/0x90 [ 188.454538][ T4772] x64_sys_call+0x8ef/0x9a0 [ 188.459033][ T4772] do_syscall_64+0x4c/0xa0 [ 188.463446][ T4772] ? clear_bhb_loop+0x50/0xa0 [ 188.468137][ T4772] ? clear_bhb_loop+0x50/0xa0 [ 188.472821][ T4772] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 188.478728][ T4772] RIP: 0033:0x7f84f835cbe9 [ 188.483140][ T4772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 188.502768][ T4772] RSP: 002b:00007f84f6dc5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 188.511181][ T4772] RAX: ffffffffffffffda RBX: 00007f84f8593fa0 RCX: 00007f84f835cbe9 [ 188.519146][ T4772] RDX: 000000000000fdef RSI: 0000200000000580 RDI: 0000000000000000 [ 188.527136][ T4772] RBP: 00007f84f6dc5090 R08: 0000000000000000 R09: 0000000000000000 [ 188.535100][ T4772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 188.543075][ T4772] R13: 00007f84f8594038 R14: 00007f84f8593fa0 R15: 00007ffcd29d5058 [ 188.551046][ T4772] [ 188.991438][ T4807] device pim6reg1 entered promiscuous mode [ 189.528630][ T4852] device pim6reg1 entered promiscuous mode [ 190.159487][ T4864] FAULT_INJECTION: forcing a failure. [ 190.159487][ T4864] name failslab, interval 1, probability 0, space 0, times 0 [ 190.198517][ T4864] CPU: 1 PID: 4864 Comm: syz.0.1579 Not tainted syzkaller #0 [ 190.205947][ T4864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 190.216020][ T4864] Call Trace: [ 190.219312][ T4864] [ 190.222257][ T4864] __dump_stack+0x21/0x30 [ 190.226612][ T4864] dump_stack_lvl+0xee/0x150 [ 190.231216][ T4864] ? show_regs_print_info+0x20/0x20 [ 190.236432][ T4864] dump_stack+0x15/0x20 [ 190.240687][ T4864] should_fail+0x3c1/0x510 [ 190.245121][ T4864] __should_failslab+0xa4/0xe0 [ 190.249933][ T4864] should_failslab+0x9/0x20 [ 190.254439][ T4864] slab_pre_alloc_hook+0x3b/0xe0 [ 190.259374][ T4864] __kmalloc+0x6d/0x2c0 [ 190.263520][ T4864] ? bpf_map_area_alloc+0x49/0xe0 [ 190.268550][ T4864] bpf_map_area_alloc+0x49/0xe0 [ 190.273392][ T4864] prealloc_elems_and_freelist+0x8a/0x1e0 [ 190.279101][ T4864] stack_map_alloc+0x3d6/0x580 [ 190.283944][ T4864] map_create+0x455/0x21b0 [ 190.288364][ T4864] __sys_bpf+0x2cf/0x730 [ 190.292594][ T4864] ? bpf_link_show_fdinfo+0x310/0x310 [ 190.297970][ T4864] ? debug_smp_processor_id+0x17/0x20 [ 190.303347][ T4864] __x64_sys_bpf+0x7c/0x90 [ 190.307766][ T4864] x64_sys_call+0x4b9/0x9a0 [ 190.312264][ T4864] do_syscall_64+0x4c/0xa0 [ 190.316681][ T4864] ? clear_bhb_loop+0x50/0xa0 [ 190.321371][ T4864] ? clear_bhb_loop+0x50/0xa0 [ 190.326068][ T4864] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 190.331989][ T4864] RIP: 0033:0x7f0b432ddbe9 [ 190.336416][ T4864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 190.356019][ T4864] RSP: 002b:00007f0b41d46038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 190.364432][ T4864] RAX: ffffffffffffffda RBX: 00007f0b43514fa0 RCX: 00007f0b432ddbe9 [ 190.372417][ T4864] RDX: 0000000000000050 RSI: 0000200000000280 RDI: 0000000000000000 [ 190.380401][ T4864] RBP: 00007f0b41d46090 R08: 0000000000000000 R09: 0000000000000000 [ 190.388365][ T4864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 190.396349][ T4864] R13: 00007f0b43515038 R14: 00007f0b43514fa0 R15: 00007ffd65df4008 [ 190.404326][ T4864] [ 190.575778][ T4883] device pim6reg1 entered promiscuous mode [ 190.896660][ T4892] FAULT_INJECTION: forcing a failure. [ 190.896660][ T4892] name failslab, interval 1, probability 0, space 0, times 0 [ 190.917787][ T4892] CPU: 0 PID: 4892 Comm: syz.1.1592 Not tainted syzkaller #0 [ 190.925326][ T4892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 190.935576][ T4892] Call Trace: [ 190.938879][ T4892] [ 190.941836][ T4892] __dump_stack+0x21/0x30 [ 190.946206][ T4892] dump_stack_lvl+0xee/0x150 [ 190.950824][ T4892] ? show_regs_print_info+0x20/0x20 [ 190.956050][ T4892] ? kstrtouint_from_user+0x1a0/0x200 [ 190.961451][ T4892] dump_stack+0x15/0x20 [ 190.965631][ T4892] should_fail+0x3c1/0x510 [ 190.970076][ T4892] __should_failslab+0xa4/0xe0 [ 190.975129][ T4892] should_failslab+0x9/0x20 [ 190.979660][ T4892] slab_pre_alloc_hook+0x3b/0xe0 [ 190.984628][ T4892] __kmalloc+0x6d/0x2c0 [ 190.988811][ T4892] ? kvmalloc_node+0x206/0x300 [ 190.993602][ T4892] kvmalloc_node+0x206/0x300 [ 190.998213][ T4892] ? vm_mmap+0xb0/0xb0 [ 191.002412][ T4892] ? __fdget+0x1a1/0x230 [ 191.006690][ T4892] map_get_next_key+0x279/0x4c0 [ 191.011576][ T4892] __sys_bpf+0x390/0x730 [ 191.015851][ T4892] ? bpf_link_show_fdinfo+0x310/0x310 [ 191.021308][ T4892] ? debug_smp_processor_id+0x17/0x20 [ 191.026715][ T4892] __x64_sys_bpf+0x7c/0x90 [ 191.031167][ T4892] x64_sys_call+0x4b9/0x9a0 [ 191.035697][ T4892] do_syscall_64+0x4c/0xa0 [ 191.040141][ T4892] ? clear_bhb_loop+0x50/0xa0 [ 191.044863][ T4892] ? clear_bhb_loop+0x50/0xa0 [ 191.049572][ T4892] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 191.055495][ T4892] RIP: 0033:0x7f84f835cbe9 [ 191.059934][ T4892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 191.079600][ T4892] RSP: 002b:00007f84f6dc5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 191.088055][ T4892] RAX: ffffffffffffffda RBX: 00007f84f8593fa0 RCX: 00007f84f835cbe9 [ 191.096061][ T4892] RDX: 0000000000000020 RSI: 0000200000000f40 RDI: 0000000000000004 [ 191.104065][ T4892] RBP: 00007f84f6dc5090 R08: 0000000000000000 R09: 0000000000000000 [ 191.112068][ T4892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 191.120069][ T4892] R13: 00007f84f8594038 R14: 00007f84f8593fa0 R15: 00007ffcd29d5058 [ 191.128081][ T4892] [ 191.964253][ T4923] device pim6reg1 entered promiscuous mode [ 192.060757][ T4930] device sit0 entered promiscuous mode [ 192.387411][ T4951] device veth0_vlan left promiscuous mode [ 192.402634][ T4951] device veth0_vlan entered promiscuous mode [ 192.417311][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 192.426423][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 192.434840][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 192.516618][ T4963] device pim6reg1 entered promiscuous mode [ 192.576197][ T4969] device sit0 entered promiscuous mode [ 192.765659][ T4974] FAULT_INJECTION: forcing a failure. [ 192.765659][ T4974] name failslab, interval 1, probability 0, space 0, times 0 [ 192.778896][ T4974] CPU: 0 PID: 4974 Comm: syz.4.1620 Not tainted syzkaller #0 [ 192.786310][ T4974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 192.796389][ T4974] Call Trace: [ 192.799682][ T4974] [ 192.802628][ T4974] __dump_stack+0x21/0x30 [ 192.806988][ T4974] dump_stack_lvl+0xee/0x150 [ 192.811601][ T4974] ? show_regs_print_info+0x20/0x20 [ 192.816832][ T4974] dump_stack+0x15/0x20 [ 192.821016][ T4974] should_fail+0x3c1/0x510 [ 192.825458][ T4974] __should_failslab+0xa4/0xe0 [ 192.830243][ T4974] should_failslab+0x9/0x20 [ 192.834836][ T4974] slab_pre_alloc_hook+0x3b/0xe0 [ 192.839796][ T4974] __kmalloc+0x6d/0x2c0 [ 192.843969][ T4974] ? kvmalloc_node+0x206/0x300 [ 192.848760][ T4974] kvmalloc_node+0x206/0x300 [ 192.853374][ T4974] ? vm_mmap+0xb0/0xb0 [ 192.857471][ T4974] vmemdup_user+0x26/0xe0 [ 192.861818][ T4974] map_lookup_elem+0x2ad/0x630 [ 192.866604][ T4974] ? security_bpf+0x82/0xa0 [ 192.871128][ T4974] __sys_bpf+0x459/0x730 [ 192.875393][ T4974] ? bpf_link_show_fdinfo+0x310/0x310 [ 192.880794][ T4974] ? debug_smp_processor_id+0x17/0x20 [ 192.886190][ T4974] ? perf_trace_sys_enter+0x30/0x150 [ 192.891503][ T4974] __x64_sys_bpf+0x7c/0x90 [ 192.895947][ T4974] x64_sys_call+0x4b9/0x9a0 [ 192.900561][ T4974] do_syscall_64+0x4c/0xa0 [ 192.905008][ T4974] ? clear_bhb_loop+0x50/0xa0 [ 192.909708][ T4974] ? clear_bhb_loop+0x50/0xa0 [ 192.914422][ T4974] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 192.920346][ T4974] RIP: 0033:0x7f3579db8be9 [ 192.924779][ T4974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 192.944410][ T4974] RSP: 002b:00007f3578821038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 192.952865][ T4974] RAX: ffffffffffffffda RBX: 00007f3579feffa0 RCX: 00007f3579db8be9 [ 192.960879][ T4974] RDX: 0000000000000020 RSI: 00002000000001c0 RDI: 0000000000000001 [ 192.968880][ T4974] RBP: 00007f3578821090 R08: 0000000000000000 R09: 0000000000000000 [ 192.976882][ T4974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 192.984873][ T4974] R13: 00007f3579ff0038 R14: 00007f3579feffa0 R15: 00007ffe465c3888 [ 192.993006][ T4974] [ 194.031844][ T5008] device pim6reg1 entered promiscuous mode [ 194.722783][ T5033] device sit0 left promiscuous mode [ 194.824344][ T5033] device sit0 entered promiscuous mode [ 195.070109][ T5041] device pim6reg1 entered promiscuous mode [ 195.441872][ T5053] FAULT_INJECTION: forcing a failure. [ 195.441872][ T5053] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 195.529700][ T5053] CPU: 0 PID: 5053 Comm: syz.4.1648 Not tainted syzkaller #0 [ 195.537141][ T5053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 195.547224][ T5053] Call Trace: [ 195.550520][ T5053] [ 195.553460][ T5053] __dump_stack+0x21/0x30 [ 195.557815][ T5053] dump_stack_lvl+0xee/0x150 [ 195.562431][ T5053] ? show_regs_print_info+0x20/0x20 [ 195.567653][ T5053] dump_stack+0x15/0x20 [ 195.571833][ T5053] should_fail+0x3c1/0x510 [ 195.576276][ T5053] should_fail_usercopy+0x1a/0x20 [ 195.581317][ T5053] _copy_to_user+0x20/0x90 [ 195.585753][ T5053] bpf_test_finish+0x1ae/0x3b0 [ 195.590535][ T5053] ? memset+0x35/0x40 [ 195.594530][ T5053] ? convert_skb_to___skb+0x360/0x360 [ 195.599948][ T5053] ? ktime_get+0x12f/0x160 [ 195.604381][ T5053] ? bpf_test_timer_continue+0x155/0x4a0 [ 195.610028][ T5053] bpf_prog_test_run_flow_dissector+0x4c2/0x5e0 [ 195.616292][ T5053] ? xdp_convert_buff_to_md+0x1e0/0x1e0 [ 195.621944][ T5053] ? proc_fail_nth_write+0x17a/0x1f0 [ 195.627251][ T5053] ? __fget_files+0x2c4/0x320 [ 195.631950][ T5053] ? fput_many+0x15a/0x1a0 [ 195.636380][ T5053] ? xdp_convert_buff_to_md+0x1e0/0x1e0 [ 195.641945][ T5053] bpf_prog_test_run+0x3d5/0x620 [ 195.646903][ T5053] ? bpf_prog_query+0x230/0x230 [ 195.651767][ T5053] ? selinux_bpf+0xce/0xf0 [ 195.656207][ T5053] ? security_bpf+0x82/0xa0 [ 195.660726][ T5053] __sys_bpf+0x52c/0x730 [ 195.664985][ T5053] ? bpf_link_show_fdinfo+0x310/0x310 [ 195.670373][ T5053] ? debug_smp_processor_id+0x17/0x20 [ 195.675797][ T5053] __x64_sys_bpf+0x7c/0x90 [ 195.680240][ T5053] x64_sys_call+0x4b9/0x9a0 [ 195.684760][ T5053] do_syscall_64+0x4c/0xa0 [ 195.689193][ T5053] ? clear_bhb_loop+0x50/0xa0 [ 195.693885][ T5053] ? clear_bhb_loop+0x50/0xa0 [ 195.698579][ T5053] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 195.704518][ T5053] RIP: 0033:0x7f3579db8be9 [ 195.708953][ T5053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 195.728582][ T5053] RSP: 002b:00007f3578821038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 195.737015][ T5053] RAX: ffffffffffffffda RBX: 00007f3579feffa0 RCX: 00007f3579db8be9 [ 195.745009][ T5053] RDX: 0000000000000030 RSI: 0000200000000180 RDI: 000000000000000a [ 195.753130][ T5053] RBP: 00007f3578821090 R08: 0000000000000000 R09: 0000000000000000 [ 195.761128][ T5053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.769128][ T5053] R13: 00007f3579ff0038 R14: 00007f3579feffa0 R15: 00007ffe465c3888 [ 195.777119][ T5053] [ 195.879252][ T5058] device syzkaller0 entered promiscuous mode [ 196.495203][ T5075] device pim6reg1 entered promiscuous mode [ 201.960800][ T30] audit: type=1400 audit(1756839598.560:130): avc: denied { create } for pid=5097 comm="syz.3.1662" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 203.685084][ T5130] device wg2 left promiscuous mode [ 203.734802][ T5130] device wg2 entered promiscuous mode [ 204.280736][ T5152] device veth0_vlan left promiscuous mode [ 204.286807][ T5152] device veth0_vlan entered promiscuous mode [ 204.350604][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.380180][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 204.428613][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 204.982256][ T5178] FAULT_INJECTION: forcing a failure. [ 204.982256][ T5178] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 205.020593][ T5178] CPU: 1 PID: 5178 Comm: syz.4.1688 Not tainted syzkaller #0 [ 205.028026][ T5178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 205.038106][ T5178] Call Trace: [ 205.041454][ T5178] [ 205.044401][ T5178] __dump_stack+0x21/0x30 [ 205.048757][ T5178] dump_stack_lvl+0xee/0x150 [ 205.053375][ T5178] ? show_regs_print_info+0x20/0x20 [ 205.058603][ T5178] dump_stack+0x15/0x20 [ 205.062922][ T5178] should_fail+0x3c1/0x510 [ 205.067466][ T5178] should_fail_alloc_page+0x55/0x80 [ 205.072688][ T5178] prepare_alloc_pages+0x156/0x600 [ 205.077820][ T5178] ? __alloc_pages_bulk+0xab0/0xab0 [ 205.083048][ T5178] ? irqentry_exit+0x37/0x40 [ 205.087674][ T5178] ? exc_page_fault+0x5e/0xb0 [ 205.092386][ T5178] __alloc_pages+0x10a/0x440 [ 205.097059][ T5178] ? prep_new_page+0x110/0x110 [ 205.101853][ T5178] ? copy_user_enhanced_fast_string+0xe/0x40 [ 205.107866][ T5178] pipe_write+0x570/0x18d0 [ 205.112396][ T5178] ? pipe_write+0xf1/0x18d0 [ 205.116925][ T5178] ? pipe_read+0xfe0/0xfe0 [ 205.121381][ T5178] ? selinux_file_permission+0x3f4/0x510 [ 205.127229][ T5178] ? memset+0x35/0x40 [ 205.131239][ T5178] ? iov_iter_init+0xbc/0x180 [ 205.135944][ T5178] vfs_write+0x802/0xf70 [ 205.140222][ T5178] ? file_end_write+0x1b0/0x1b0 [ 205.145098][ T5178] ? __fget_files+0x2c4/0x320 [ 205.149802][ T5178] ? __fdget_pos+0x1f7/0x380 [ 205.154421][ T5178] ? ksys_write+0x71/0x240 [ 205.158862][ T5178] ksys_write+0x140/0x240 [ 205.163219][ T5178] ? __ia32_sys_read+0x90/0x90 [ 205.168021][ T5178] ? debug_smp_processor_id+0x17/0x20 [ 205.173426][ T5178] __x64_sys_write+0x7b/0x90 [ 205.178043][ T5178] x64_sys_call+0x8ef/0x9a0 [ 205.182571][ T5178] do_syscall_64+0x4c/0xa0 [ 205.187025][ T5178] ? clear_bhb_loop+0x50/0xa0 [ 205.191733][ T5178] ? clear_bhb_loop+0x50/0xa0 [ 205.196435][ T5178] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 205.202359][ T5178] RIP: 0033:0x7f3579db8be9 [ 205.206794][ T5178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 205.226424][ T5178] RSP: 002b:00007f3578821038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 205.234870][ T5178] RAX: ffffffffffffffda RBX: 00007f3579feffa0 RCX: 00007f3579db8be9 [ 205.242871][ T5178] RDX: 000000000000fdef RSI: 0000200000000580 RDI: 0000000000000000 [ 205.251002][ T5178] RBP: 00007f3578821090 R08: 0000000000000000 R09: 0000000000000000 [ 205.259020][ T5178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 205.267102][ T5178] R13: 00007f3579ff0038 R14: 00007f3579feffa0 R15: 00007ffe465c3888 [ 205.275339][ T5178] [ 205.362081][ T5188] device pim6reg1 entered promiscuous mode [ 205.696140][ T5204] device syzkaller0 entered promiscuous mode [ 205.805923][ T5206] device syzkaller0 entered promiscuous mode [ 205.906400][ T5208] device syzkaller0 entered promiscuous mode [ 209.048247][ T5218] device pim6reg1 entered promiscuous mode [ 209.055070][ T5227] device pim6reg1 entered promiscuous mode [ 209.402572][ T5246] device syzkaller0 entered promiscuous mode [ 210.884040][ T5249] device syzkaller0 entered promiscuous mode [ 210.972602][ T5257] device syzkaller0 entered promiscuous mode [ 211.151833][ T5262] device pim6reg1 entered promiscuous mode [ 211.375476][ T5270] device sit0 entered promiscuous mode [ 211.532494][ T5283] syz.2.1726[5283] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.532571][ T5283] syz.2.1726[5283] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.620739][ T5303] device syzkaller0 entered promiscuous mode [ 213.788425][ T5315] device syzkaller0 entered promiscuous mode [ 213.852940][ T5323] device syzkaller0 entered promiscuous mode [ 216.048532][ T5322] bond_slave_1: mtu less than device minimum [ 216.388934][ T5348] device pim6reg1 entered promiscuous mode [ 217.474115][ T5379] FAULT_INJECTION: forcing a failure. [ 217.474115][ T5379] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 217.493750][ T5379] CPU: 1 PID: 5379 Comm: syz.4.1761 Not tainted syzkaller #0 [ 217.501203][ T5379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 217.511449][ T5379] Call Trace: [ 217.514742][ T5379] [ 217.517694][ T5379] __dump_stack+0x21/0x30 [ 217.522055][ T5379] dump_stack_lvl+0xee/0x150 [ 217.526680][ T5379] ? show_regs_print_info+0x20/0x20 [ 217.531908][ T5379] ? avc_has_perm_noaudit+0x2f4/0x460 [ 217.537314][ T5379] dump_stack+0x15/0x20 [ 217.541493][ T5379] should_fail+0x3c1/0x510 [ 217.545933][ T5379] should_fail_usercopy+0x1a/0x20 [ 217.551081][ T5379] _copy_to_iter+0x21a/0x1070 [ 217.555790][ T5379] ? memcpy+0x56/0x70 [ 217.559795][ T5379] ? avc_has_perm_noaudit+0x2f4/0x460 [ 217.565197][ T5379] ? iov_iter_init+0x180/0x180 [ 217.569989][ T5379] ? __kasan_check_write+0x14/0x20 [ 217.575215][ T5379] ? _raw_spin_lock_bh+0x8e/0xe0 [ 217.580180][ T5379] ? check_stack_object+0x81/0x140 [ 217.585328][ T5379] ? __check_object_size+0x2f4/0x3c0 [ 217.590648][ T5379] simple_copy_to_iter+0x50/0x70 [ 217.595616][ T5379] __skb_datagram_iter+0xe0/0x710 [ 217.600666][ T5379] ? tsk_importance+0x150/0x150 [ 217.605540][ T5379] ? skb_copy_datagram_iter+0x150/0x150 [ 217.611115][ T5379] skb_copy_datagram_iter+0x40/0x150 [ 217.616427][ T5379] tipc_recvmsg+0x79b/0x13a0 [ 217.621044][ T5379] ? tipc_send_packet+0xa0/0xa0 [ 217.625929][ T5379] ? security_socket_recvmsg+0x87/0xb0 [ 217.631413][ T5379] ? tipc_send_packet+0xa0/0xa0 [ 217.636284][ T5379] ____sys_recvmsg+0x291/0x580 [ 217.639787][ T30] audit: type=1400 audit(1756839614.100:131): avc: denied { ioctl } for pid=5364 comm="syz.1.1756" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 217.641076][ T5379] ? __sys_recvmsg_sock+0x50/0x50 [ 217.670747][ T5379] ? memset+0x35/0x40 [ 217.674755][ T5379] ? import_iovec+0x7c/0xb0 [ 217.679285][ T5379] ___sys_recvmsg+0x1af/0x4f0 [ 217.683987][ T5379] ? __sys_recvmsg+0x250/0x250 [ 217.688782][ T5379] ? vfs_write+0xc17/0xf70 [ 217.693234][ T5379] ? __fdget+0x1a1/0x230 [ 217.697511][ T5379] __x64_sys_recvmsg+0x1df/0x2a0 [ 217.702479][ T5379] ? ___sys_recvmsg+0x4f0/0x4f0 [ 217.707441][ T5379] ? ksys_write+0x1eb/0x240 [ 217.711968][ T5379] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 217.718074][ T5379] x64_sys_call+0x705/0x9a0 [ 217.722602][ T5379] do_syscall_64+0x4c/0xa0 [ 217.727047][ T5379] ? clear_bhb_loop+0x50/0xa0 [ 217.731759][ T5379] ? clear_bhb_loop+0x50/0xa0 [ 217.736465][ T5379] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 217.742391][ T5379] RIP: 0033:0x7f3579db8be9 [ 217.746846][ T5379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 217.766475][ T5379] RSP: 002b:00007f3578821038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 217.774918][ T5379] RAX: ffffffffffffffda RBX: 00007f3579feffa0 RCX: 00007f3579db8be9 [ 217.782910][ T5379] RDX: 00000000000040fd RSI: 0000200000000b00 RDI: 0000000000000003 [ 217.790903][ T5379] RBP: 00007f3578821090 R08: 0000000000000000 R09: 0000000000000000 [ 217.798899][ T5379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 217.806895][ T5379] R13: 00007f3579ff0038 R14: 00007f3579feffa0 R15: 00007ffe465c3888 [ 217.814900][ T5379] [ 218.578465][ T5410] device pim6reg1 entered promiscuous mode [ 219.504787][ T5418] device syzkaller0 entered promiscuous mode [ 219.549489][ T5430] device veth0_vlan left promiscuous mode [ 219.555630][ T5430] device veth0_vlan entered promiscuous mode [ 219.652729][ T5435] device syzkaller0 entered promiscuous mode [ 219.750251][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.760054][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 219.767768][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 220.035857][ T5450] device syzkaller0 entered promiscuous mode [ 220.102354][ T5458] device pim6reg1 entered promiscuous mode [ 220.525861][ T5466] device syzkaller0 entered promiscuous mode [ 221.206641][ T5476] device syzkaller0 entered promiscuous mode [ 222.204505][ T5497] device pim6reg1 entered promiscuous mode [ 222.454748][ T5496] device syzkaller0 entered promiscuous mode [ 222.946603][ T5505] device syzkaller0 entered promiscuous mode [ 223.414576][ T5530] device syzkaller0 entered promiscuous mode [ 224.235326][ T30] audit: type=1400 audit(1756839620.840:132): avc: denied { create } for pid=5554 comm="syz.4.1820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 224.256163][ T5552] device syzkaller0 entered promiscuous mode [ 224.770360][ T5565] device syzkaller0 entered promiscuous mode [ 226.458686][ T5621] device syzkaller0 entered promiscuous mode [ 226.509747][ T5623] device veth0_vlan left promiscuous mode [ 226.522739][ T5623] device veth0_vlan entered promiscuous mode [ 226.578567][ T5627] device veth0_vlan left promiscuous mode [ 226.585648][ T5627] device veth0_vlan entered promiscuous mode [ 227.168942][ T5664] device syzkaller0 entered promiscuous mode [ 227.534271][ T5680] device pim6reg1 entered promiscuous mode [ 227.790696][ T5697] device pim6reg1 entered promiscuous mode [ 227.832495][ T5700] FAULT_INJECTION: forcing a failure. [ 227.832495][ T5700] name failslab, interval 1, probability 0, space 0, times 0 [ 227.845176][ T5700] CPU: 0 PID: 5700 Comm: syz.1.1876 Not tainted syzkaller #0 [ 227.852568][ T5700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 227.862638][ T5700] Call Trace: [ 227.865925][ T5700] [ 227.868869][ T5700] __dump_stack+0x21/0x30 [ 227.873223][ T5700] dump_stack_lvl+0xee/0x150 [ 227.877835][ T5700] ? show_regs_print_info+0x20/0x20 [ 227.883049][ T5700] ? __kernel_text_address+0xa0/0x100 [ 227.888529][ T5700] dump_stack+0x15/0x20 [ 227.892700][ T5700] should_fail+0x3c1/0x510 [ 227.897264][ T5700] __should_failslab+0xa4/0xe0 [ 227.902055][ T5700] should_failslab+0x9/0x20 [ 227.906571][ T5700] slab_pre_alloc_hook+0x3b/0xe0 [ 227.911526][ T5700] ? dst_alloc+0x15c/0x1d0 [ 227.915957][ T5700] kmem_cache_alloc+0x44/0x260 [ 227.920734][ T5700] dst_alloc+0x15c/0x1d0 [ 227.925025][ T5700] ip_route_output_key_hash_rcu+0x11db/0x2060 [ 227.931135][ T5700] ip_route_output_flow+0x123/0x2d0 [ 227.936505][ T5700] ? ipv4_sk_update_pmtu+0x1320/0x1320 [ 227.941990][ T5700] ip_tunnel_xmit+0x6c0/0x21c0 [ 227.946778][ T5700] ? ip_tunnel_xmit+0xd0/0x21c0 [ 227.951732][ T5700] ? unwind_get_return_address+0x4d/0x90 [ 227.957381][ T5700] ? ip4_dst_hoplimit+0x110/0x110 [ 227.962420][ T5700] ? skb_network_protocol+0x501/0x740 [ 227.967809][ T5700] ? gre_build_header+0x229/0x850 [ 227.972849][ T5700] ipgre_xmit+0x7c0/0xb30 [ 227.977195][ T5700] dev_hard_start_xmit+0x244/0x670 [ 227.982332][ T5700] __dev_queue_xmit+0x17bd/0x2d80 [ 227.987375][ T5700] ? dev_queue_xmit+0x20/0x20 [ 227.992066][ T5700] ? __kasan_check_write+0x14/0x20 [ 227.997192][ T5700] ? skb_release_data+0x1c6/0xa10 [ 228.002345][ T5700] ? __kasan_check_write+0x14/0x20 [ 228.007484][ T5700] ? pskb_expand_head+0xbe6/0x11d0 [ 228.012621][ T5700] dev_queue_xmit+0x17/0x20 [ 228.017138][ T5700] __bpf_redirect+0x68a/0xe60 [ 228.021843][ T5700] bpf_clone_redirect+0x242/0x380 [ 228.026894][ T5700] bpf_prog_208b094576c80b22+0x56/0xec [ 228.032367][ T5700] ? __kasan_slab_alloc+0xcf/0xf0 [ 228.037410][ T5700] ? __kasan_slab_alloc+0xbd/0xf0 [ 228.042447][ T5700] ? slab_post_alloc_hook+0x4f/0x2b0 [ 228.047747][ T5700] ? kmem_cache_alloc+0xf7/0x260 [ 228.052695][ T5700] ? __build_skb+0x2d/0x310 [ 228.057212][ T5700] ? build_skb+0x24/0x200 [ 228.061555][ T5700] ? bpf_prog_test_run_skb+0x279/0x1150 [ 228.067111][ T5700] ? bpf_prog_test_run+0x3d5/0x620 [ 228.072235][ T5700] ? __sys_bpf+0x52c/0x730 [ 228.076658][ T5700] ? __x64_sys_bpf+0x7c/0x90 [ 228.081258][ T5700] ? x64_sys_call+0x4b9/0x9a0 [ 228.085945][ T5700] ? do_syscall_64+0x4c/0xa0 [ 228.090557][ T5700] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 228.096646][ T5700] ? ktime_get+0x12f/0x160 [ 228.101076][ T5700] bpf_test_run+0x33d/0x8d0 [ 228.105602][ T5700] ? convert___skb_to_skb+0x4f0/0x4f0 [ 228.111066][ T5700] ? eth_get_headlen+0x1f0/0x1f0 [ 228.116063][ T5700] ? convert___skb_to_skb+0x41/0x4f0 [ 228.121391][ T5700] bpf_prog_test_run_skb+0x9ec/0x1150 [ 228.126810][ T5700] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 228.132736][ T5700] bpf_prog_test_run+0x3d5/0x620 [ 228.137712][ T5700] ? bpf_prog_query+0x230/0x230 [ 228.142589][ T5700] ? selinux_bpf+0xce/0xf0 [ 228.147032][ T5700] ? security_bpf+0x82/0xa0 [ 228.151563][ T5700] __sys_bpf+0x52c/0x730 [ 228.155833][ T5700] ? bpf_link_show_fdinfo+0x310/0x310 [ 228.161236][ T5700] ? debug_smp_processor_id+0x17/0x20 [ 228.166632][ T5700] __x64_sys_bpf+0x7c/0x90 [ 228.171069][ T5700] x64_sys_call+0x4b9/0x9a0 [ 228.175606][ T5700] do_syscall_64+0x4c/0xa0 [ 228.180137][ T5700] ? clear_bhb_loop+0x50/0xa0 [ 228.184836][ T5700] ? clear_bhb_loop+0x50/0xa0 [ 228.189535][ T5700] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 228.195450][ T5700] RIP: 0033:0x7f84f835cbe9 [ 228.199886][ T5700] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 228.219514][ T5700] RSP: 002b:00007f84f6dc5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 228.227957][ T5700] RAX: ffffffffffffffda RBX: 00007f84f8593fa0 RCX: 00007f84f835cbe9 [ 228.235954][ T5700] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 228.243976][ T5700] RBP: 00007f84f6dc5090 R08: 0000000000000000 R09: 0000000000000000 [ 228.251974][ T5700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 228.259976][ T5700] R13: 00007f84f8594038 R14: 00007f84f8593fa0 R15: 00007ffcd29d5058 [ 228.267996][ T5700] [ 228.470540][ T5703] device syzkaller0 entered promiscuous mode [ 228.566217][ T5713] device veth0_vlan left promiscuous mode [ 228.572693][ T5713] device veth0_vlan entered promiscuous mode [ 228.777976][ T5723] device pim6reg1 entered promiscuous mode [ 229.268852][ T5739] device pim6reg1 entered promiscuous mode [ 229.501991][ T5754] device veth0_vlan left promiscuous mode [ 229.522981][ T5754] device veth0_vlan entered promiscuous mode [ 229.722766][ T5749] device syzkaller0 entered promiscuous mode [ 229.778953][ T5759] device syzkaller0 entered promiscuous mode [ 230.118940][ T5779] ÿÿÿÿÿÿ: renamed from vlan1 [ 230.123678][ T5779] FAULT_INJECTION: forcing a failure. [ 230.123678][ T5779] name failslab, interval 1, probability 0, space 0, times 0 [ 230.136491][ T5779] CPU: 1 PID: 5779 Comm: syz.2.1902 Not tainted syzkaller #0 [ 230.143894][ T5779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 230.153964][ T5779] Call Trace: [ 230.157240][ T5779] [ 230.160183][ T5779] __dump_stack+0x21/0x30 [ 230.164535][ T5779] dump_stack_lvl+0xee/0x150 [ 230.169120][ T5779] ? show_regs_print_info+0x20/0x20 [ 230.174315][ T5779] dump_stack+0x15/0x20 [ 230.178481][ T5779] should_fail+0x3c1/0x510 [ 230.182898][ T5779] __should_failslab+0xa4/0xe0 [ 230.187660][ T5779] should_failslab+0x9/0x20 [ 230.192180][ T5779] slab_pre_alloc_hook+0x3b/0xe0 [ 230.197131][ T5779] __kmalloc+0x6d/0x2c0 [ 230.201286][ T5779] ? kobject_rename+0x1a8/0x4d0 [ 230.206133][ T5779] kobject_rename+0x1a8/0x4d0 [ 230.210844][ T5779] ? kobject_init_and_add+0x190/0x190 [ 230.216235][ T5779] ? sysfs_rename_link_ns+0x170/0x1a0 [ 230.221608][ T5779] device_rename+0x164/0x190 [ 230.226211][ T5779] dev_change_name+0x2df/0x8f0 [ 230.230998][ T5779] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 230.237762][ T5779] ? dev_alloc_name+0x130/0x130 [ 230.242622][ T5779] dev_ifsioc+0x3b9/0xe70 [ 230.246966][ T5779] ? dev_ioctl+0xd10/0xd10 [ 230.251378][ T5779] ? __mutex_lock_slowpath+0xe/0x10 [ 230.256574][ T5779] ? mutex_lock+0x100/0x1a0 [ 230.261092][ T5779] ? wait_for_completion_killable_timeout+0x10/0x10 [ 230.267682][ T5779] ? security_capable+0x87/0xb0 [ 230.272531][ T5779] dev_ioctl+0x345/0xd10 [ 230.276773][ T5779] sock_do_ioctl+0x22e/0x300 [ 230.281361][ T5779] ? sock_show_fdinfo+0xa0/0xa0 [ 230.286228][ T5779] ? selinux_file_ioctl+0x377/0x480 [ 230.291427][ T5779] sock_ioctl+0x4bc/0x6b0 [ 230.295765][ T5779] ? sock_poll+0x3d0/0x3d0 [ 230.300184][ T5779] ? __fget_files+0x2c4/0x320 [ 230.304992][ T5779] ? security_file_ioctl+0x84/0xa0 [ 230.310127][ T5779] ? sock_poll+0x3d0/0x3d0 [ 230.314543][ T5779] __se_sys_ioctl+0x121/0x1a0 [ 230.319237][ T5779] __x64_sys_ioctl+0x7b/0x90 [ 230.323842][ T5779] x64_sys_call+0x2f/0x9a0 [ 230.328263][ T5779] do_syscall_64+0x4c/0xa0 [ 230.332680][ T5779] ? clear_bhb_loop+0x50/0xa0 [ 230.337367][ T5779] ? clear_bhb_loop+0x50/0xa0 [ 230.342042][ T5779] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 230.347932][ T5779] RIP: 0033:0x7f3e87e0dbe9 [ 230.352342][ T5779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 230.372043][ T5779] RSP: 002b:00007f3e86855038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 230.380474][ T5779] RAX: ffffffffffffffda RBX: 00007f3e88045090 RCX: 00007f3e87e0dbe9 [ 230.388447][ T5779] RDX: 0000200000000000 RSI: 0000000000008923 RDI: 000000000000000a [ 230.396443][ T5779] RBP: 00007f3e86855090 R08: 0000000000000000 R09: 0000000000000000 [ 230.404411][ T5779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 230.412383][ T5779] R13: 00007f3e88045128 R14: 00007f3e88045090 R15: 00007ffcbff74778 [ 230.420371][ T5779] [ 230.947836][ T5793] device veth0_vlan left promiscuous mode [ 230.953895][ T5793] device veth0_vlan entered promiscuous mode [ 231.021448][ T3945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.040229][ T3945] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.052062][ T3945] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.502237][ T5808] device syzkaller0 entered promiscuous mode [ 232.175935][ T5819] FAULT_INJECTION: forcing a failure. [ 232.175935][ T5819] name failslab, interval 1, probability 0, space 0, times 0 [ 232.314525][ T5819] CPU: 1 PID: 5819 Comm: syz.2.1916 Not tainted syzkaller #0 [ 232.321963][ T5819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 232.332039][ T5819] Call Trace: [ 232.335445][ T5819] [ 232.338390][ T5819] __dump_stack+0x21/0x30 [ 232.342826][ T5819] dump_stack_lvl+0xee/0x150 [ 232.347448][ T5819] ? show_regs_print_info+0x20/0x20 [ 232.352689][ T5819] dump_stack+0x15/0x20 [ 232.356859][ T5819] should_fail+0x3c1/0x510 [ 232.361294][ T5819] __should_failslab+0xa4/0xe0 [ 232.366081][ T5819] should_failslab+0x9/0x20 [ 232.370610][ T5819] slab_pre_alloc_hook+0x3b/0xe0 [ 232.375587][ T5819] ? __request_module+0x28f/0x8a0 [ 232.380648][ T5819] __kmalloc_track_caller+0x6c/0x2c0 [ 232.385960][ T5819] ? __request_module+0x28f/0x8a0 [ 232.391010][ T5819] kstrdup+0x36/0x70 [ 232.394930][ T5819] __request_module+0x28f/0x8a0 [ 232.399805][ T5819] ? _trace_android_vh_delayacct_thrashing_end+0x110/0x110 [ 232.407045][ T5819] ? cap_capable+0x1aa/0x230 [ 232.411659][ T5819] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 232.417489][ T5819] ? security_capable+0x87/0xb0 [ 232.422354][ T5819] dev_load+0x5b/0xb0 [ 232.426341][ T5819] dev_ioctl+0x464/0xd10 [ 232.430587][ T5819] sock_do_ioctl+0x22e/0x300 [ 232.435195][ T5819] ? sock_show_fdinfo+0xa0/0xa0 [ 232.440049][ T5819] ? selinux_file_ioctl+0x377/0x480 [ 232.445248][ T5819] sock_ioctl+0x4bc/0x6b0 [ 232.449686][ T5819] ? fput_many+0x27/0x1a0 [ 232.454023][ T5819] ? sock_poll+0x3d0/0x3d0 [ 232.458438][ T5819] ? __fget_files+0x2c4/0x320 [ 232.463121][ T5819] ? security_file_ioctl+0x84/0xa0 [ 232.468235][ T5819] ? sock_poll+0x3d0/0x3d0 [ 232.472650][ T5819] __se_sys_ioctl+0x121/0x1a0 [ 232.477333][ T5819] __x64_sys_ioctl+0x7b/0x90 [ 232.481950][ T5819] x64_sys_call+0x2f/0x9a0 [ 232.486369][ T5819] do_syscall_64+0x4c/0xa0 [ 232.490787][ T5819] ? clear_bhb_loop+0x50/0xa0 [ 232.495461][ T5819] ? clear_bhb_loop+0x50/0xa0 [ 232.500140][ T5819] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 232.506032][ T5819] RIP: 0033:0x7f3e87e0dbe9 [ 232.510463][ T5819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 232.530069][ T5819] RSP: 002b:00007f3e86876038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 232.538487][ T5819] RAX: ffffffffffffffda RBX: 00007f3e88044fa0 RCX: 00007f3e87e0dbe9 [ 232.546459][ T5819] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000009 [ 232.554429][ T5819] RBP: 00007f3e86876090 R08: 0000000000000000 R09: 0000000000000000 [ 232.562399][ T5819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 232.570367][ T5819] R13: 00007f3e88045038 R14: 00007f3e88044fa0 R15: 00007ffcbff74778 [ 232.578342][ T5819] [ 232.595391][ T30] audit: type=1400 audit(1756839629.200:133): avc: denied { sys_module } for pid=5818 comm="syz.2.1916" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 233.266550][ T5843] device veth0_vlan left promiscuous mode [ 233.274214][ T5843] device veth0_vlan entered promiscuous mode [ 233.472168][ T5851] device syzkaller0 entered promiscuous mode [ 234.256915][ T5860] device syzkaller0 entered promiscuous mode [ 237.449420][ T5908] device syzkaller0 entered promiscuous mode [ 238.410469][ T5930] FAULT_INJECTION: forcing a failure. [ 238.410469][ T5930] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 238.423980][ T5930] CPU: 1 PID: 5930 Comm: syz.4.1955 Not tainted syzkaller #0 [ 238.431406][ T5930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 238.441486][ T5930] Call Trace: [ 238.444778][ T5930] [ 238.447721][ T5930] __dump_stack+0x21/0x30 [ 238.452074][ T5930] dump_stack_lvl+0xee/0x150 [ 238.456712][ T5930] ? show_regs_print_info+0x20/0x20 [ 238.461935][ T5930] ? migrate_enable+0x192/0x260 [ 238.466809][ T5930] ? migrate_disable+0x180/0x180 [ 238.471778][ T5930] dump_stack+0x15/0x20 [ 238.475958][ T5930] should_fail+0x3c1/0x510 [ 238.480394][ T5930] should_fail_usercopy+0x1a/0x20 [ 238.485459][ T5930] _copy_from_user+0x20/0xd0 [ 238.490069][ T5930] generic_map_update_batch+0x4a3/0x740 [ 238.495619][ T5930] ? irqentry_exit+0x37/0x40 [ 238.500215][ T5930] ? generic_map_delete_batch+0x510/0x510 [ 238.505933][ T5930] ? __fdget+0x1a1/0x230 [ 238.510172][ T5930] ? generic_map_delete_batch+0x510/0x510 [ 238.515892][ T5930] bpf_map_do_batch+0x463/0x5f0 [ 238.520743][ T5930] __sys_bpf+0x5e3/0x730 [ 238.524985][ T5930] ? bpf_link_show_fdinfo+0x310/0x310 [ 238.530356][ T5930] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 238.536514][ T5930] __x64_sys_bpf+0x7c/0x90 [ 238.540929][ T5930] x64_sys_call+0x4b9/0x9a0 [ 238.545440][ T5930] do_syscall_64+0x4c/0xa0 [ 238.549859][ T5930] ? clear_bhb_loop+0x50/0xa0 [ 238.554628][ T5930] ? clear_bhb_loop+0x50/0xa0 [ 238.559305][ T5930] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 238.565198][ T5930] RIP: 0033:0x7f3579db8be9 [ 238.569613][ T5930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 238.589308][ T5930] RSP: 002b:00007f3578821038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 238.597826][ T5930] RAX: ffffffffffffffda RBX: 00007f3579feffa0 RCX: 00007f3579db8be9 [ 238.605798][ T5930] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 238.613781][ T5930] RBP: 00007f3578821090 R08: 0000000000000000 R09: 0000000000000000 [ 238.621770][ T5930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 238.629742][ T5930] R13: 00007f3579ff0038 R14: 00007f3579feffa0 R15: 00007ffe465c3888 [ 238.637718][ T5930] [ 238.674310][ T5940] syz.3.1958[5940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.674383][ T5940] syz.3.1958[5940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.242049][ T5964] device pim6reg1 entered promiscuous mode [ 239.776628][ T5991] device syzkaller0 entered promiscuous mode [ 240.055529][ T6004] FAULT_INJECTION: forcing a failure. [ 240.055529][ T6004] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 240.069367][ T6004] CPU: 1 PID: 6004 Comm: syz.4.1978 Not tainted syzkaller #0 [ 240.076771][ T6004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 240.086841][ T6004] Call Trace: [ 240.090133][ T6004] [ 240.093081][ T6004] __dump_stack+0x21/0x30 [ 240.097440][ T6004] dump_stack_lvl+0xee/0x150 [ 240.102043][ T6004] ? show_regs_print_info+0x20/0x20 [ 240.107268][ T6004] dump_stack+0x15/0x20 [ 240.111440][ T6004] should_fail+0x3c1/0x510 [ 240.115882][ T6004] should_fail_usercopy+0x1a/0x20 [ 240.120924][ T6004] _copy_to_user+0x20/0x90 [ 240.125363][ T6004] simple_read_from_buffer+0xe9/0x160 [ 240.130774][ T6004] proc_fail_nth_read+0x19a/0x210 [ 240.135815][ T6004] ? proc_fault_inject_write+0x2f0/0x2f0 [ 240.141469][ T6004] ? security_file_permission+0x83/0xa0 [ 240.147029][ T6004] ? proc_fault_inject_write+0x2f0/0x2f0 [ 240.152711][ T6004] vfs_read+0x282/0xbe0 [ 240.156893][ T6004] ? kernel_read+0x1f0/0x1f0 [ 240.161498][ T6004] ? __kasan_check_write+0x14/0x20 [ 240.166638][ T6004] ? mutex_lock+0x95/0x1a0 [ 240.171079][ T6004] ? wait_for_completion_killable_timeout+0x10/0x10 [ 240.177698][ T6004] ? __fget_files+0x2c4/0x320 [ 240.182414][ T6004] ? __fdget_pos+0x2d2/0x380 [ 240.187216][ T6004] ? ksys_read+0x71/0x240 [ 240.191599][ T6004] ksys_read+0x140/0x240 [ 240.195864][ T6004] ? vfs_write+0xf70/0xf70 [ 240.200297][ T6004] ? sched_clock_cpu+0x18/0x3c0 [ 240.205169][ T6004] __x64_sys_read+0x7b/0x90 [ 240.209689][ T6004] x64_sys_call+0x96d/0x9a0 [ 240.214211][ T6004] do_syscall_64+0x4c/0xa0 [ 240.218657][ T6004] ? clear_bhb_loop+0x50/0xa0 [ 240.223357][ T6004] ? clear_bhb_loop+0x50/0xa0 [ 240.228062][ T6004] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 240.233983][ T6004] RIP: 0033:0x7f3579db75fc [ 240.238427][ T6004] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 240.258086][ T6004] RSP: 002b:00007f3578821030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 240.266521][ T6004] RAX: ffffffffffffffda RBX: 00007f3579feffa0 RCX: 00007f3579db75fc [ 240.274509][ T6004] RDX: 000000000000000f RSI: 00007f35788210a0 RDI: 0000000000000006 [ 240.282502][ T6004] RBP: 00007f3578821090 R08: 0000000000000000 R09: 0000000000000000 [ 240.290483][ T6004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 240.298450][ T6004] R13: 00007f3579ff0038 R14: 00007f3579feffa0 R15: 00007ffe465c3888 [ 240.306425][ T6004] [ 241.085750][ T6046] device pim6reg1 entered promiscuous mode [ 241.749826][ T6091] device pim6reg1 entered promiscuous mode [ 242.354036][ T6120] device syzkaller0 entered promiscuous mode [ 242.497810][ T6131] device pim6reg1 entered promiscuous mode [ 242.757106][ T6145] device veth0_vlan left promiscuous mode [ 242.802561][ T6145] device veth0_vlan entered promiscuous mode [ 243.372748][ T6157] device syzkaller0 entered promiscuous mode [ 244.151363][ T6182] device syzkaller0 entered promiscuous mode [ 244.336129][ T30] audit: type=1400 audit(1756839640.940:134): avc: denied { create } for pid=6186 comm="syz.2.2038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 244.605075][ T6196] device syzkaller0 entered promiscuous mode [ 244.723920][ T6199] device syzkaller0 entered promiscuous mode [ 245.526435][ T6219] device syzkaller0 entered promiscuous mode [ 246.335554][ T6233] device syzkaller0 entered promiscuous mode [ 246.534373][ T6244] device pim6reg1 entered promiscuous mode [ 246.901891][ T6268] device syzkaller0 entered promiscuous mode [ 246.924200][ T6270] device veth0_vlan left promiscuous mode [ 246.930365][ T6270] device veth0_vlan entered promiscuous mode [ 246.948571][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.959577][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 246.967907][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.281667][ T6273] device syzkaller0 entered promiscuous mode [ 247.304213][ T6283] device pim6reg1 entered promiscuous mode [ 247.898938][ T6307] device syzkaller0 entered promiscuous mode [ 247.943211][ T6314] device pim6reg1 entered promiscuous mode [ 247.983322][ T30] audit: type=1400 audit(1756839644.590:135): avc: denied { create } for pid=6315 comm="syz.4.2084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 248.049437][ T30] audit: type=1400 audit(1756839644.620:136): avc: denied { create } for pid=6315 comm="syz.4.2084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 248.824370][ T6350] device pim6reg1 entered promiscuous mode [ 249.033441][ T6347] device syzkaller0 entered promiscuous mode [ 249.927984][ T6387] device pim6reg1 entered promiscuous mode [ 250.135706][ T6384] device syzkaller0 entered promiscuous mode [ 250.956675][ T6407] device syzkaller0 entered promiscuous mode [ 251.366917][ T6425] device pim6reg1 entered promiscuous mode [ 251.742052][ T6441] device syzkaller0 entered promiscuous mode [ 252.010163][ T6449] device syzkaller0 entered promiscuous mode [ 253.146160][ T6490] device syzkaller0 entered promiscuous mode [ 253.369018][ T6500] device veth0_vlan left promiscuous mode [ 253.380639][ T6500] device veth0_vlan entered promiscuous mode [ 253.543577][ T6505] FAULT_INJECTION: forcing a failure. [ 253.543577][ T6505] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 253.670447][ T6505] CPU: 0 PID: 6505 Comm: syz.2.2148 Not tainted syzkaller #0 [ 253.677883][ T6505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 253.687951][ T6505] Call Trace: [ 253.691256][ T6505] [ 253.694203][ T6505] __dump_stack+0x21/0x30 [ 253.698563][ T6505] dump_stack_lvl+0xee/0x150 [ 253.703169][ T6505] ? show_regs_print_info+0x20/0x20 [ 253.708390][ T6505] dump_stack+0x15/0x20 [ 253.712562][ T6505] should_fail+0x3c1/0x510 [ 253.716988][ T6505] should_fail_alloc_page+0x55/0x80 [ 253.722194][ T6505] prepare_alloc_pages+0x156/0x600 [ 253.727324][ T6505] ? __alloc_pages_bulk+0xab0/0xab0 [ 253.732531][ T6505] __alloc_pages+0x10a/0x440 [ 253.737129][ T6505] ? prep_new_page+0x110/0x110 [ 253.741892][ T6505] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 253.747701][ T6505] shmem_alloc_and_acct_page+0x42b/0x870 [ 253.753351][ T6505] ? shmem_swapin_page+0x14c0/0x14c0 [ 253.758649][ T6505] ? xas_load+0x2ea/0x300 [ 253.762979][ T6505] ? pagecache_get_page+0xcbd/0xda0 [ 253.768182][ T6505] ? page_cache_prev_miss+0x270/0x270 [ 253.773552][ T6505] ? lru_cache_add+0x2c1/0x690 [ 253.778318][ T6505] ? _raw_spin_lock_irq+0x8f/0xe0 [ 253.783372][ T6505] ? _raw_spin_lock_irqsave+0x110/0x110 [ 253.788925][ T6505] shmem_getpage_gfp+0xfe5/0x2310 [ 253.793962][ T6505] ? __kasan_check_write+0x14/0x20 [ 253.799189][ T6505] shmem_write_begin+0xce/0x1b0 [ 253.804042][ T6505] generic_perform_write+0x2ad/0x670 [ 253.809338][ T6505] ? grab_cache_page_write_begin+0xb0/0xb0 [ 253.815148][ T6505] ? file_remove_privs+0x590/0x590 [ 253.820274][ T6505] ? rwsem_write_trylock+0x130/0x300 [ 253.825578][ T6505] ? clear_nonspinnable+0x60/0x60 [ 253.830605][ T6505] ? avc_policy_seqno+0x1b/0x70 [ 253.835452][ T6505] __generic_file_write_iter+0x268/0x480 [ 253.841083][ T6505] generic_file_write_iter+0xa9/0x1d0 [ 253.846465][ T6505] vfs_write+0x802/0xf70 [ 253.850712][ T6505] ? file_end_write+0x1b0/0x1b0 [ 253.855562][ T6505] ? wait_for_completion_killable_timeout+0x10/0x10 [ 253.862151][ T6505] ? __fget_files+0x2c4/0x320 [ 253.866836][ T6505] ? __fdget_pos+0x2d2/0x380 [ 253.871423][ T6505] ? ksys_write+0x71/0x240 [ 253.875840][ T6505] ksys_write+0x140/0x240 [ 253.880172][ T6505] ? __ia32_sys_read+0x90/0x90 [ 253.884934][ T6505] ? debug_smp_processor_id+0x17/0x20 [ 253.890347][ T6505] __x64_sys_write+0x7b/0x90 [ 253.894934][ T6505] x64_sys_call+0x8ef/0x9a0 [ 253.899432][ T6505] do_syscall_64+0x4c/0xa0 [ 253.903846][ T6505] ? clear_bhb_loop+0x50/0xa0 [ 253.908532][ T6505] ? clear_bhb_loop+0x50/0xa0 [ 253.913220][ T6505] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 253.919140][ T6505] RIP: 0033:0x7f3e87e0dbe9 [ 253.923569][ T6505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 253.943177][ T6505] RSP: 002b:00007f3e86876038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 253.951780][ T6505] RAX: ffffffffffffffda RBX: 00007f3e88044fa0 RCX: 00007f3e87e0dbe9 [ 253.959761][ T6505] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000007 [ 253.967816][ T6505] RBP: 00007f3e86876090 R08: 0000000000000000 R09: 0000000000000000 [ 253.975784][ T6505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 253.983770][ T6505] R13: 00007f3e88045038 R14: 00007f3e88044fa0 R15: 00007ffcbff74778 [ 253.991774][ T6505] [ 254.808932][ T30] audit: type=1400 audit(1756839651.410:137): avc: denied { create } for pid=6534 comm="syz.4.2159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 254.880537][ T6533] device syzkaller0 entered promiscuous mode [ 256.634732][ T6580] device syzkaller0 entered promiscuous mode [ 256.912330][ T6587] bond_slave_1: mtu less than device minimum [ 256.919974][ T6588] device pim6reg1 entered promiscuous mode [ 258.651245][ T6617] device syzkaller0 entered promiscuous mode [ 258.753661][ T6622] device syzkaller0 entered promiscuous mode [ 259.666867][ T6641] device syzkaller0 entered promiscuous mode [ 260.028110][ T6654] device pim6reg1 entered promiscuous mode [ 260.343262][ T6656] device syzkaller0 entered promiscuous mode [ 260.532580][ T6673] device pim6reg1 entered promiscuous mode [ 261.039545][ T6683] device veth0_vlan left promiscuous mode [ 261.045983][ T6683] device veth0_vlan entered promiscuous mode [ 261.102383][ T6688] device pim6reg1 entered promiscuous mode [ 261.741996][ T6696] device syzkaller0 entered promiscuous mode [ 262.587995][ T6726] device pim6reg1 entered promiscuous mode [ 262.903912][ T6735] device pim6reg1 entered promiscuous mode [ 263.044450][ T6741] FAULT_INJECTION: forcing a failure. [ 263.044450][ T6741] name failslab, interval 1, probability 0, space 0, times 0 [ 263.069756][ T6741] CPU: 0 PID: 6741 Comm: syz.0.2230 Not tainted syzkaller #0 [ 263.077268][ T6741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 263.087428][ T6741] Call Trace: [ 263.090721][ T6741] [ 263.093659][ T6741] __dump_stack+0x21/0x30 [ 263.098003][ T6741] dump_stack_lvl+0xee/0x150 [ 263.102609][ T6741] ? show_regs_print_info+0x20/0x20 [ 263.107829][ T6741] dump_stack+0x15/0x20 [ 263.111994][ T6741] should_fail+0x3c1/0x510 [ 263.116426][ T6741] __should_failslab+0xa4/0xe0 [ 263.121217][ T6741] should_failslab+0x9/0x20 [ 263.125731][ T6741] slab_pre_alloc_hook+0x3b/0xe0 [ 263.130691][ T6741] ? security_inode_alloc+0x33/0x110 [ 263.136002][ T6741] kmem_cache_alloc+0x44/0x260 [ 263.140777][ T6741] security_inode_alloc+0x33/0x110 [ 263.145927][ T6741] inode_init_always+0x711/0x990 [ 263.150889][ T6741] new_inode_pseudo+0x91/0x210 [ 263.155675][ T6741] __sock_create+0x12c/0x7a0 [ 263.160289][ T6741] __sys_socketpair+0x218/0x590 [ 263.165158][ T6741] __x64_sys_socketpair+0x9b/0xb0 [ 263.170229][ T6741] x64_sys_call+0x36/0x9a0 [ 263.174657][ T6741] do_syscall_64+0x4c/0xa0 [ 263.179079][ T6741] ? clear_bhb_loop+0x50/0xa0 [ 263.183762][ T6741] ? clear_bhb_loop+0x50/0xa0 [ 263.188465][ T6741] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 263.194375][ T6741] RIP: 0033:0x7f0b432ddbe9 [ 263.198791][ T6741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 263.218402][ T6741] RSP: 002b:00007f0b41d46038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 263.226825][ T6741] RAX: ffffffffffffffda RBX: 00007f0b43514fa0 RCX: 00007f0b432ddbe9 [ 263.234803][ T6741] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 263.242774][ T6741] RBP: 00007f0b41d46090 R08: 0000000000000000 R09: 0000000000000000 [ 263.250746][ T6741] R10: 00002000000029c0 R11: 0000000000000246 R12: 0000000000000001 [ 263.258721][ T6741] R13: 00007f0b43515038 R14: 00007f0b43514fa0 R15: 00007ffd65df4008 [ 263.266703][ T6741] [ 263.282005][ T6741] socket: no more sockets [ 263.316437][ T6743] device syzkaller0 entered promiscuous mode [ 263.983796][ T6761] device syzkaller0 entered promiscuous mode [ 264.008761][ T6769] device pim6reg1 entered promiscuous mode [ 264.964156][ T6799] device veth0_vlan left promiscuous mode [ 264.971067][ T6799] device veth0_vlan entered promiscuous mode [ 265.149247][ T6808] device pim6reg1 entered promiscuous mode [ 266.129251][ T6833] device veth0_vlan left promiscuous mode [ 266.150534][ T6833] device veth0_vlan entered promiscuous mode [ 266.478991][ T6842] device syzkaller0 entered promiscuous mode [ 266.701723][ T6846] device pim6reg1 entered promiscuous mode [ 267.401755][ T6872] device syzkaller0 entered promiscuous mode [ 267.453011][ T6876] device syzkaller0 entered promiscuous mode [ 267.552086][ T6882] device pim6reg1 entered promiscuous mode [ 268.084218][ T6897] device syzkaller0 entered promiscuous mode [ 268.398750][ T6901] device syzkaller0 entered promiscuous mode [ 268.558293][ T6917] device pim6reg1 entered promiscuous mode [ 268.623762][ T6915] device syzkaller0 entered promiscuous mode [ 269.217140][ T6942] FAULT_INJECTION: forcing a failure. [ 269.217140][ T6942] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 269.266137][ T6942] CPU: 0 PID: 6942 Comm: syz.2.2302 Not tainted syzkaller #0 [ 269.273568][ T6942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 269.283638][ T6942] Call Trace: [ 269.286946][ T6942] [ 269.289890][ T6942] __dump_stack+0x21/0x30 [ 269.294246][ T6942] dump_stack_lvl+0xee/0x150 [ 269.298853][ T6942] ? show_regs_print_info+0x20/0x20 [ 269.304073][ T6942] dump_stack+0x15/0x20 [ 269.308250][ T6942] should_fail+0x3c1/0x510 [ 269.312690][ T6942] should_fail_usercopy+0x1a/0x20 [ 269.317737][ T6942] _copy_from_iter+0x21a/0x1050 [ 269.322606][ T6942] ? __kasan_check_write+0x14/0x20 [ 269.327736][ T6942] ? skb_set_owner_w+0x24d/0x370 [ 269.332697][ T6942] ? copy_mc_pipe_to_iter+0x770/0x770 [ 269.338094][ T6942] ? check_stack_object+0x81/0x140 [ 269.343234][ T6942] ? __check_object_size+0x2f4/0x3c0 [ 269.348717][ T6942] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 269.354460][ T6942] ? skb_put+0x10e/0x1f0 [ 269.358724][ T6942] unix_stream_sendmsg+0x66b/0xc80 [ 269.363861][ T6942] ? unix_show_fdinfo+0xa0/0xa0 [ 269.368730][ T6942] ? __this_cpu_preempt_check+0x13/0x20 [ 269.374296][ T6942] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 269.380558][ T6942] ? hrtimer_forward+0x18f/0x2a0 [ 269.385518][ T6942] ? security_socket_sendmsg+0x82/0xa0 [ 269.391000][ T6942] ? unix_show_fdinfo+0xa0/0xa0 [ 269.395871][ T6942] ____sys_sendmsg+0x5a2/0x8c0 [ 269.400654][ T6942] ? __sys_sendmsg_sock+0x40/0x40 [ 269.405685][ T6942] ? import_iovec+0x7c/0xb0 [ 269.410187][ T6942] ___sys_sendmsg+0x1f0/0x260 [ 269.415049][ T6942] ? __sys_sendmsg+0x250/0x250 [ 269.419817][ T6942] ? __fdget+0x1a1/0x230 [ 269.424148][ T6942] __x64_sys_sendmsg+0x1e2/0x2a0 [ 269.429083][ T6942] ? ___sys_sendmsg+0x260/0x260 [ 269.433966][ T6942] x64_sys_call+0x4b/0x9a0 [ 269.438389][ T6942] do_syscall_64+0x4c/0xa0 [ 269.442836][ T6942] ? clear_bhb_loop+0x50/0xa0 [ 269.447513][ T6942] ? clear_bhb_loop+0x50/0xa0 [ 269.452218][ T6942] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 269.458113][ T6942] RIP: 0033:0x7f3e87e0dbe9 [ 269.462529][ T6942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 269.482216][ T6942] RSP: 002b:00007f3e86876038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 269.490634][ T6942] RAX: ffffffffffffffda RBX: 00007f3e88044fa0 RCX: 00007f3e87e0dbe9 [ 269.498602][ T6942] RDX: 0000000000000020 RSI: 0000200000000980 RDI: 0000000000000003 [ 269.506565][ T6942] RBP: 00007f3e86876090 R08: 0000000000000000 R09: 0000000000000000 [ 269.514533][ T6942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 269.522507][ T6942] R13: 00007f3e88045038 R14: 00007f3e88044fa0 R15: 00007ffcbff74778 [ 269.530488][ T6942] [ 270.020006][ T6953] device pim6reg1 entered promiscuous mode [ 270.174026][ T6959] device syzkaller0 entered promiscuous mode [ 270.921269][ T6971] ÿÿÿÿÿÿ: renamed from vlan1 [ 271.270030][ T6980] device veth0_vlan left promiscuous mode [ 271.300666][ T6980] device veth0_vlan entered promiscuous mode [ 271.369941][ T3945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 271.391471][ T3945] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 271.419164][ T3945] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 271.479823][ T6984] device pim6reg1 entered promiscuous mode [ 271.502760][ T6986] device syzkaller0 entered promiscuous mode [ 271.752338][ T7000] syz.1.2324[7000] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.752445][ T7000] syz.1.2324[7000] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.898823][ T7005] syzkaller: port 1(erspan0) entered blocking state [ 271.940087][ T7005] syzkaller: port 1(erspan0) entered disabled state [ 271.980169][ T7005] device erspan0 entered promiscuous mode [ 271.986725][ T7010] syzkaller: port 1(erspan0) entered blocking state [ 271.993403][ T7010] syzkaller: port 1(erspan0) entered forwarding state [ 272.355467][ T7018] device pim6reg1 entered promiscuous mode [ 272.598690][ T7025] device syzkaller0 entered promiscuous mode [ 272.642312][ T7031] FAULT_INJECTION: forcing a failure. [ 272.642312][ T7031] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 272.667960][ T7031] CPU: 1 PID: 7031 Comm: syz.0.2335 Not tainted syzkaller #0 [ 272.675374][ T7031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 272.685447][ T7031] Call Trace: [ 272.688745][ T7031] [ 272.691684][ T7031] __dump_stack+0x21/0x30 [ 272.696062][ T7031] dump_stack_lvl+0xee/0x150 [ 272.700675][ T7031] ? show_regs_print_info+0x20/0x20 [ 272.705910][ T7031] dump_stack+0x15/0x20 [ 272.710094][ T7031] should_fail+0x3c1/0x510 [ 272.714531][ T7031] should_fail_alloc_page+0x55/0x80 [ 272.719760][ T7031] prepare_alloc_pages+0x156/0x600 [ 272.724896][ T7031] ? __alloc_pages_bulk+0xab0/0xab0 [ 272.730119][ T7031] ? __this_cpu_preempt_check+0x13/0x20 [ 272.735692][ T7031] ? __perf_event_task_sched_in+0x1fb/0x280 [ 272.741613][ T7031] __alloc_pages+0x10a/0x440 [ 272.746397][ T7031] ? prep_new_page+0x110/0x110 [ 272.751176][ T7031] shmem_alloc_and_acct_page+0x42b/0x870 [ 272.756831][ T7031] ? shmem_swapin_page+0x14c0/0x14c0 [ 272.762144][ T7031] ? xas_load+0x2ea/0x300 [ 272.766493][ T7031] ? pagecache_get_page+0xcbd/0xda0 [ 272.771718][ T7031] ? irqentry_exit+0x37/0x40 [ 272.776340][ T7031] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 272.782168][ T7031] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 272.788367][ T7031] ? shmem_getpage_gfp+0xe98/0x2310 [ 272.793592][ T7031] shmem_getpage_gfp+0xfe5/0x2310 [ 272.798647][ T7031] shmem_fallocate+0x7f7/0xcf0 [ 272.803442][ T7031] ? shmem_mmap+0x270/0x270 [ 272.807967][ T7031] ? irqentry_exit+0x37/0x40 [ 272.812580][ T7031] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 272.818412][ T7031] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 272.824596][ T7031] vfs_fallocate+0x4b4/0x590 [ 272.829297][ T7031] do_vfs_ioctl+0x1a96/0x1d00 [ 272.833996][ T7031] ? __ia32_compat_sys_ioctl+0x850/0x850 [ 272.839652][ T7031] ? irqentry_exit+0x37/0x40 [ 272.844283][ T7031] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 272.850119][ T7031] ? ioctl_has_perm+0x19c/0x4d0 [ 272.854987][ T7031] ? kasan_check_range+0x53/0x290 [ 272.860021][ T7031] ? ioctl_has_perm+0x394/0x4d0 [ 272.864888][ T7031] ? has_cap_mac_admin+0x330/0x330 [ 272.870028][ T7031] ? __hrtimer_run_queues+0x97a/0x9e0 [ 272.875547][ T7031] ? selinux_file_ioctl+0x377/0x480 [ 272.880756][ T7031] ? ktime_get+0x12f/0x160 [ 272.885183][ T7031] ? irqentry_exit+0x37/0x40 [ 272.889781][ T7031] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 272.895595][ T7031] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 272.901765][ T7031] ? security_file_ioctl+0x78/0xa0 [ 272.906886][ T7031] ? security_file_ioctl+0x84/0xa0 [ 272.912008][ T7031] __se_sys_ioctl+0x9f/0x1a0 [ 272.916621][ T7031] __x64_sys_ioctl+0x7b/0x90 [ 272.921224][ T7031] x64_sys_call+0x2f/0x9a0 [ 272.925649][ T7031] do_syscall_64+0x4c/0xa0 [ 272.930082][ T7031] ? clear_bhb_loop+0x50/0xa0 [ 272.934765][ T7031] ? clear_bhb_loop+0x50/0xa0 [ 272.939451][ T7031] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 272.945356][ T7031] RIP: 0033:0x7f0b432ddbe9 [ 272.949776][ T7031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 272.969385][ T7031] RSP: 002b:00007f0b41d46038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 272.977827][ T7031] RAX: ffffffffffffffda RBX: 00007f0b43514fa0 RCX: 00007f0b432ddbe9 [ 272.985892][ T7031] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000007 [ 272.993869][ T7031] RBP: 00007f0b41d46090 R08: 0000000000000000 R09: 0000000000000000 [ 273.001842][ T7031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 273.009908][ T7031] R13: 00007f0b43515038 R14: 00007f0b43514fa0 R15: 00007ffd65df4008 [ 273.017893][ T7031] [ 273.245630][ T7059] device pim6reg1 entered promiscuous mode [ 273.873482][ T7079] device syzkaller0 entered promiscuous mode [ 273.899591][ T7084] device syzkaller0 entered promiscuous mode [ 274.076840][ T7092] device wg2 left promiscuous mode [ 274.130931][ T7095] device pim6reg1 entered promiscuous mode [ 274.248737][ T7109] ±ÿ: renamed from team_slave_1 [ 274.253832][ T7109] FAULT_INJECTION: forcing a failure. [ 274.253832][ T7109] name failslab, interval 1, probability 0, space 0, times 0 [ 274.266553][ T7109] CPU: 1 PID: 7109 Comm: syz.2.2363 Not tainted syzkaller #0 [ 274.273949][ T7109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 274.284015][ T7109] Call Trace: [ 274.287302][ T7109] [ 274.290246][ T7109] __dump_stack+0x21/0x30 [ 274.294597][ T7109] dump_stack_lvl+0xee/0x150 [ 274.299225][ T7109] ? show_regs_print_info+0x20/0x20 [ 274.304441][ T7109] dump_stack+0x15/0x20 [ 274.308607][ T7109] should_fail+0x3c1/0x510 [ 274.313041][ T7109] __should_failslab+0xa4/0xe0 [ 274.317828][ T7109] should_failslab+0x9/0x20 [ 274.322339][ T7109] slab_pre_alloc_hook+0x3b/0xe0 [ 274.327294][ T7109] __kmalloc+0x6d/0x2c0 [ 274.331469][ T7109] ? kobject_get_path+0xbf/0x1f0 [ 274.336431][ T7109] kobject_get_path+0xbf/0x1f0 [ 274.341209][ T7109] kobject_uevent_env+0x28b/0x700 [ 274.346252][ T7109] kobject_rename+0x3f5/0x4d0 [ 274.350944][ T7109] ? kobject_init_and_add+0x190/0x190 [ 274.356325][ T7109] ? sysfs_rename_link_ns+0x170/0x1a0 [ 274.361725][ T7109] device_rename+0x164/0x190 [ 274.366338][ T7109] dev_change_name+0x2df/0x8f0 [ 274.371160][ T7109] ? avc_denied+0x1b0/0x1b0 [ 274.375679][ T7109] ? dev_alloc_name+0x130/0x130 [ 274.380641][ T7109] dev_ifsioc+0x3b9/0xe70 [ 274.384984][ T7109] ? dev_ioctl+0xd10/0xd10 [ 274.389426][ T7109] ? __kasan_check_write+0x14/0x20 [ 274.394530][ T7109] ? mutex_lock+0x95/0x1a0 [ 274.398940][ T7109] ? wait_for_completion_killable_timeout+0x10/0x10 [ 274.405535][ T7109] ? security_capable+0x87/0xb0 [ 274.410397][ T7109] dev_ioctl+0x345/0xd10 [ 274.414659][ T7109] sock_do_ioctl+0x22e/0x300 [ 274.419247][ T7109] ? sock_show_fdinfo+0xa0/0xa0 [ 274.424103][ T7109] ? selinux_file_ioctl+0x377/0x480 [ 274.429299][ T7109] sock_ioctl+0x4bc/0x6b0 [ 274.433640][ T7109] ? sock_poll+0x3d0/0x3d0 [ 274.438089][ T7109] ? __fget_files+0x2c4/0x320 [ 274.442782][ T7109] ? security_file_ioctl+0x84/0xa0 [ 274.447902][ T7109] ? sock_poll+0x3d0/0x3d0 [ 274.452327][ T7109] __se_sys_ioctl+0x121/0x1a0 [ 274.457032][ T7109] __x64_sys_ioctl+0x7b/0x90 [ 274.461630][ T7109] x64_sys_call+0x2f/0x9a0 [ 274.466053][ T7109] do_syscall_64+0x4c/0xa0 [ 274.470477][ T7109] ? clear_bhb_loop+0x50/0xa0 [ 274.475333][ T7109] ? clear_bhb_loop+0x50/0xa0 [ 274.480018][ T7109] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 274.485912][ T7109] RIP: 0033:0x7f3e87e0dbe9 [ 274.490325][ T7109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 274.509936][ T7109] RSP: 002b:00007f3e86876038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 274.518352][ T7109] RAX: ffffffffffffffda RBX: 00007f3e88044fa0 RCX: 00007f3e87e0dbe9 [ 274.526326][ T7109] RDX: 00002000000000c0 RSI: 0000000000008923 RDI: 0000000000000004 [ 274.534306][ T7109] RBP: 00007f3e86876090 R08: 0000000000000000 R09: 0000000000000000 [ 274.542283][ T7109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 274.550259][ T7109] R13: 00007f3e88045038 R14: 00007f3e88044fa0 R15: 00007ffcbff74778 [ 274.558241][ T7109] [ 274.693276][ T7126] device syzkaller0 entered promiscuous mode [ 274.700731][ T7126] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 275.657982][ T7158] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 275.669085][ T7158] syzkaller1: linktype set to 780 [ 275.916927][ T7174] device veth1_macvtap left promiscuous mode [ 275.958067][ T7174] device macsec0 entered promiscuous mode [ 276.022043][ T7174] FAULT_INJECTION: forcing a failure. [ 276.022043][ T7174] name failslab, interval 1, probability 0, space 0, times 0 [ 276.099887][ T7174] CPU: 1 PID: 7174 Comm: syz.3.2388 Not tainted syzkaller #0 [ 276.107321][ T7174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 276.117393][ T7174] Call Trace: [ 276.120685][ T7174] [ 276.123626][ T7174] __dump_stack+0x21/0x30 [ 276.127990][ T7174] dump_stack_lvl+0xee/0x150 [ 276.132685][ T7174] ? show_regs_print_info+0x20/0x20 [ 276.137912][ T7174] dump_stack+0x15/0x20 [ 276.142086][ T7174] should_fail+0x3c1/0x510 [ 276.146524][ T7174] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 276.151985][ T7174] __should_failslab+0xa4/0xe0 [ 276.156749][ T7174] should_failslab+0x9/0x20 [ 276.161249][ T7174] slab_pre_alloc_hook+0x3b/0xe0 [ 276.166198][ T7174] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 276.171654][ T7174] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 276.177111][ T7174] __kmalloc_track_caller+0x6c/0x2c0 [ 276.182445][ T7174] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 276.187917][ T7174] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 276.193375][ T7174] __alloc_skb+0x21a/0x740 [ 276.197794][ T7174] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 276.203080][ T7174] rtmsg_ifinfo+0x7a/0x130 [ 276.207490][ T7174] __dev_notify_flags+0xdb/0x500 [ 276.212423][ T7174] ? __dev_change_flags+0x6a0/0x6a0 [ 276.217620][ T7174] ? __dev_change_flags+0x4bb/0x6a0 [ 276.222821][ T7174] ? dev_get_flags+0x1e0/0x1e0 [ 276.227604][ T7174] ? __kasan_slab_free+0x11/0x20 [ 276.232546][ T7174] dev_change_flags+0xe8/0x1a0 [ 276.237307][ T7174] dev_ifsioc+0x147/0xe70 [ 276.241633][ T7174] ? dev_ioctl+0xd10/0xd10 [ 276.246048][ T7174] ? __mutex_lock_slowpath+0xe/0x10 [ 276.251240][ T7174] ? mutex_lock+0x100/0x1a0 [ 276.255739][ T7174] ? wait_for_completion_killable_timeout+0x10/0x10 [ 276.262323][ T7174] ? dev_get_by_name_rcu+0xc8/0xf0 [ 276.267439][ T7174] dev_ioctl+0x560/0xd10 [ 276.271696][ T7174] sock_do_ioctl+0x22e/0x300 [ 276.276287][ T7174] ? sock_show_fdinfo+0xa0/0xa0 [ 276.281144][ T7174] ? selinux_file_ioctl+0x377/0x480 [ 276.286342][ T7174] sock_ioctl+0x4bc/0x6b0 [ 276.290670][ T7174] ? sock_poll+0x3d0/0x3d0 [ 276.295083][ T7174] ? __fget_files+0x2c4/0x320 [ 276.299757][ T7174] ? security_file_ioctl+0x84/0xa0 [ 276.304881][ T7174] ? sock_poll+0x3d0/0x3d0 [ 276.309297][ T7174] __se_sys_ioctl+0x121/0x1a0 [ 276.313981][ T7174] __x64_sys_ioctl+0x7b/0x90 [ 276.318571][ T7174] x64_sys_call+0x2f/0x9a0 [ 276.322983][ T7174] do_syscall_64+0x4c/0xa0 [ 276.327396][ T7174] ? clear_bhb_loop+0x50/0xa0 [ 276.332069][ T7174] ? clear_bhb_loop+0x50/0xa0 [ 276.336751][ T7174] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 276.342647][ T7174] RIP: 0033:0x7f1773cc9be9 [ 276.347057][ T7174] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 276.366652][ T7174] RSP: 002b:00007f1772732038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 276.375074][ T7174] RAX: ffffffffffffffda RBX: 00007f1773f00fa0 RCX: 00007f1773cc9be9 [ 276.383040][ T7174] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 0000000000000009 [ 276.391004][ T7174] RBP: 00007f1772732090 R08: 0000000000000000 R09: 0000000000000000 [ 276.398965][ T7174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 276.406931][ T7174] R13: 00007f1773f01038 R14: 00007f1773f00fa0 R15: 00007fffa65da888 [ 276.414913][ T7174] [ 276.961582][ T7210] device pim6reg1 entered promiscuous mode [ 277.464787][ T7237] device veth0_vlan left promiscuous mode [ 277.471389][ T7237] device veth0_vlan entered promiscuous mode [ 277.793269][ T7262] device veth0_vlan left promiscuous mode [ 277.799344][ T7262] device veth0_vlan entered promiscuous mode [ 277.854014][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 277.886411][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 277.912394][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 277.999933][ T7271] FAULT_INJECTION: forcing a failure. [ 277.999933][ T7271] name failslab, interval 1, probability 0, space 0, times 0 [ 278.025206][ T7271] CPU: 1 PID: 7271 Comm: syz.0.2426 Not tainted syzkaller #0 [ 278.032631][ T7271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 278.042707][ T7271] Call Trace: [ 278.046002][ T7271] [ 278.048960][ T7271] __dump_stack+0x21/0x30 [ 278.053317][ T7271] dump_stack_lvl+0xee/0x150 [ 278.057984][ T7271] ? show_regs_print_info+0x20/0x20 [ 278.063214][ T7271] dump_stack+0x15/0x20 [ 278.067397][ T7271] should_fail+0x3c1/0x510 [ 278.071830][ T7271] __should_failslab+0xa4/0xe0 [ 278.076607][ T7271] should_failslab+0x9/0x20 [ 278.081118][ T7271] slab_pre_alloc_hook+0x3b/0xe0 [ 278.086067][ T7271] __kmalloc+0x6d/0x2c0 [ 278.090228][ T7271] ? kvmalloc_node+0x206/0x300 [ 278.095001][ T7271] kvmalloc_node+0x206/0x300 [ 278.099609][ T7271] ? vm_mmap+0xb0/0xb0 [ 278.103686][ T7271] ? __kasan_check_write+0x14/0x20 [ 278.108802][ T7271] pfifo_fast_init+0x260/0x7a0 [ 278.113590][ T7271] qdisc_create_dflt+0x142/0x3a0 [ 278.118647][ T7271] dev_activate+0x2a0/0x1060 [ 278.123259][ T7271] __dev_open+0x3aa/0x4c0 [ 278.127602][ T7271] ? dev_open+0x230/0x230 [ 278.131937][ T7271] ? _raw_spin_unlock_bh+0x51/0x60 [ 278.137055][ T7271] ? dev_set_rx_mode+0x212/0x2c0 [ 278.141995][ T7271] ? __kasan_check_read+0x11/0x20 [ 278.147025][ T7271] __dev_change_flags+0x20a/0x6a0 [ 278.152047][ T7271] ? dev_get_flags+0x1e0/0x1e0 [ 278.156808][ T7271] ? __request_module+0x3dc/0x8a0 [ 278.161855][ T7271] dev_change_flags+0x88/0x1a0 [ 278.166626][ T7271] dev_ifsioc+0x147/0xe70 [ 278.170957][ T7271] ? dev_ioctl+0xd10/0xd10 [ 278.175372][ T7271] ? __mutex_lock_slowpath+0xe/0x10 [ 278.180575][ T7271] ? mutex_lock+0x100/0x1a0 [ 278.185098][ T7271] ? wait_for_completion_killable_timeout+0x10/0x10 [ 278.191687][ T7271] ? security_capable+0x87/0xb0 [ 278.196544][ T7271] dev_ioctl+0x560/0xd10 [ 278.200825][ T7271] sock_do_ioctl+0x22e/0x300 [ 278.205425][ T7271] ? sock_show_fdinfo+0xa0/0xa0 [ 278.210284][ T7271] ? selinux_file_ioctl+0x377/0x480 [ 278.215491][ T7271] sock_ioctl+0x4bc/0x6b0 [ 278.219825][ T7271] ? sock_poll+0x3d0/0x3d0 [ 278.224250][ T7271] ? __fget_files+0x2c4/0x320 [ 278.228937][ T7271] ? security_file_ioctl+0x84/0xa0 [ 278.234051][ T7271] ? sock_poll+0x3d0/0x3d0 [ 278.238477][ T7271] __se_sys_ioctl+0x121/0x1a0 [ 278.243163][ T7271] __x64_sys_ioctl+0x7b/0x90 [ 278.247763][ T7271] x64_sys_call+0x2f/0x9a0 [ 278.252214][ T7271] do_syscall_64+0x4c/0xa0 [ 278.256640][ T7271] ? clear_bhb_loop+0x50/0xa0 [ 278.261333][ T7271] ? clear_bhb_loop+0x50/0xa0 [ 278.266035][ T7271] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 278.272411][ T7271] RIP: 0033:0x7f0b432ddbe9 [ 278.276856][ T7271] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 278.296499][ T7271] RSP: 002b:00007f0b41d25038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 278.304925][ T7271] RAX: ffffffffffffffda RBX: 00007f0b43515090 RCX: 00007f0b432ddbe9 [ 278.312901][ T7271] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 000000000000000d [ 278.320878][ T7271] RBP: 00007f0b41d25090 R08: 0000000000000000 R09: 0000000000000000 [ 278.328941][ T7271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.336914][ T7271] R13: 00007f0b43515128 R14: 00007f0b43515090 R15: 00007ffd65df4008 [ 278.344900][ T7271] [ 278.348641][ T7271] device pim6reg1 entered promiscuous mode [ 279.203899][ T7287] device pim6reg1 entered promiscuous mode [ 279.229374][ T7288] device syzkaller0 entered promiscuous mode [ 279.354389][ T7293] FAULT_INJECTION: forcing a failure. [ 279.354389][ T7293] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 279.404707][ T7293] CPU: 0 PID: 7293 Comm: syz.1.2435 Not tainted syzkaller #0 [ 279.412142][ T7293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 279.422211][ T7293] Call Trace: [ 279.425502][ T7293] [ 279.428437][ T7293] __dump_stack+0x21/0x30 [ 279.432783][ T7293] dump_stack_lvl+0xee/0x150 [ 279.437387][ T7293] ? show_regs_print_info+0x20/0x20 [ 279.442588][ T7293] ? stack_trace_save+0x98/0xe0 [ 279.447450][ T7293] dump_stack+0x15/0x20 [ 279.451614][ T7293] should_fail+0x3c1/0x510 [ 279.456128][ T7293] should_fail_usercopy+0x1a/0x20 [ 279.461157][ T7293] _copy_from_user+0x20/0xd0 [ 279.465752][ T7293] iovec_from_user+0x1bc/0x2f0 [ 279.470525][ T7293] ? __copy_msghdr_from_user+0x302/0x5e0 [ 279.476176][ T7293] ? _kstrtoull+0x3c0/0x4d0 [ 279.480678][ T7293] __import_iovec+0x71/0x400 [ 279.485270][ T7293] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 279.490558][ T7293] ? kstrtouint_from_user+0x1a0/0x200 [ 279.495931][ T7293] import_iovec+0x7c/0xb0 [ 279.500265][ T7293] ___sys_sendmsg+0x1b9/0x260 [ 279.504941][ T7293] ? __sys_sendmsg+0x250/0x250 [ 279.509712][ T7293] ? __fdget+0x1a1/0x230 [ 279.513959][ T7293] __x64_sys_sendmsg+0x1e2/0x2a0 [ 279.518895][ T7293] ? ___sys_sendmsg+0x260/0x260 [ 279.523741][ T7293] ? ksys_write+0x1eb/0x240 [ 279.528243][ T7293] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 279.534315][ T7293] x64_sys_call+0x4b/0x9a0 [ 279.538727][ T7293] do_syscall_64+0x4c/0xa0 [ 279.543228][ T7293] ? clear_bhb_loop+0x50/0xa0 [ 279.547931][ T7293] ? clear_bhb_loop+0x50/0xa0 [ 279.552614][ T7293] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 279.558509][ T7293] RIP: 0033:0x7f84f835cbe9 [ 279.562925][ T7293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 279.582535][ T7293] RSP: 002b:00007f84f6dc5038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 279.590949][ T7293] RAX: ffffffffffffffda RBX: 00007f84f8593fa0 RCX: 00007f84f835cbe9 [ 279.598919][ T7293] RDX: 0000000000000020 RSI: 0000200000000980 RDI: 000000000000000a [ 279.606891][ T7293] RBP: 00007f84f6dc5090 R08: 0000000000000000 R09: 0000000000000000 [ 279.614862][ T7293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 279.622829][ T7293] R13: 00007f84f8594038 R14: 00007f84f8593fa0 R15: 00007ffcd29d5058 [ 279.630808][ T7293] [ 279.922242][ T7322] device syzkaller0 entered promiscuous mode [ 280.076026][ T7329] device pim6reg1 entered promiscuous mode [ 280.325864][ T7334] device syzkaller0 entered promiscuous mode [ 280.520222][ T7340] device syzkaller0 entered promiscuous mode [ 281.566094][ T7374] device pim6reg1 entered promiscuous mode [ 281.616795][ T7375] device syzkaller0 entered promiscuous mode [ 282.069340][ T7384] device syzkaller0 entered promiscuous mode [ 282.828841][ T7414] device pim6reg1 entered promiscuous mode [ 283.278826][ T7417] device syzkaller0 entered promiscuous mode [ 283.303401][ T7436] device pim6reg1 entered promiscuous mode [ 283.331191][ T7437] device syzkaller0 entered promiscuous mode [ 283.549361][ T7447] device pim6reg1 entered promiscuous mode [ 283.679044][ T7443] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.976352][ T7470] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.983621][ T7470] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.199620][ T7473] device bridge_slave_1 left promiscuous mode [ 284.206422][ T7473] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.214505][ T7473] device bridge_slave_0 left promiscuous mode [ 284.220798][ T7473] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.444435][ T7468] device syzkaller0 entered promiscuous mode [ 284.876367][ T7489] device pim6reg1 entered promiscuous mode [ 285.367648][ T7514] device syzkaller0 entered promiscuous mode [ 286.446673][ T7536] device pim6reg1 entered promiscuous mode [ 287.377173][ T7553] device pim6reg1 entered promiscuous mode [ 287.430322][ T7553] FAULT_INJECTION: forcing a failure. [ 287.430322][ T7553] name failslab, interval 1, probability 0, space 0, times 0 [ 287.443028][ T7553] CPU: 1 PID: 7553 Comm: syz.1.2524 Not tainted syzkaller #0 [ 287.450420][ T7553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 287.460494][ T7553] Call Trace: [ 287.463782][ T7553] [ 287.466716][ T7553] __dump_stack+0x21/0x30 [ 287.471060][ T7553] dump_stack_lvl+0xee/0x150 [ 287.475663][ T7553] ? show_regs_print_info+0x20/0x20 [ 287.480876][ T7553] dump_stack+0x15/0x20 [ 287.485047][ T7553] should_fail+0x3c1/0x510 [ 287.489502][ T7553] ? inet6_rt_notify+0x287/0x470 [ 287.494477][ T7553] __should_failslab+0xa4/0xe0 [ 287.499271][ T7553] should_failslab+0x9/0x20 [ 287.503784][ T7553] slab_pre_alloc_hook+0x3b/0xe0 [ 287.508737][ T7553] ? inet6_rt_notify+0x287/0x470 [ 287.513685][ T7553] ? inet6_rt_notify+0x287/0x470 [ 287.518631][ T7553] __kmalloc_track_caller+0x6c/0x2c0 [ 287.523934][ T7553] ? inet6_rt_notify+0x287/0x470 [ 287.528881][ T7553] ? inet6_rt_notify+0x287/0x470 [ 287.533829][ T7553] __alloc_skb+0x21a/0x740 [ 287.538259][ T7553] inet6_rt_notify+0x287/0x470 [ 287.543031][ T7553] ? __se_sys_ioctl+0x121/0x1a0 [ 287.547899][ T7553] ? __x64_sys_ioctl+0x7b/0x90 [ 287.552674][ T7553] ? rt6_nh_dump_exceptions+0x690/0x690 [ 287.558237][ T7553] fib6_add+0x2279/0x3d10 [ 287.562588][ T7553] ? fib6_update_sernum_stub+0x190/0x190 [ 287.568238][ T7553] ? __kasan_check_write+0x14/0x20 [ 287.573360][ T7553] ? _raw_spin_lock_bh+0x8e/0xe0 [ 287.578310][ T7553] ? _raw_spin_lock_irq+0xe0/0xe0 [ 287.583356][ T7553] ip6_route_add+0x89/0x130 [ 287.587872][ T7553] addrconf_add_linklocal+0x3cf/0x620 [ 287.593256][ T7553] ? inet6_addr_del+0x540/0x540 [ 287.598140][ T7553] ? memcpy+0x56/0x70 [ 287.602130][ T7553] ? ipv6_generate_eui64+0x797/0x10b0 [ 287.607516][ T7553] addrconf_addr_gen+0x48b/0x5b0 [ 287.612466][ T7553] ? ip6_route_add+0x104/0x130 [ 287.617241][ T7553] ? addrconf_sysctl_register+0x1a0/0x1a0 [ 287.622971][ T7553] ? addrconf_add_dev+0x329/0x430 [ 287.628006][ T7553] ? local_bh_enable+0x30/0x30 [ 287.632794][ T7553] ? __local_bh_enable_ip+0x58/0x80 [ 287.638020][ T7553] ? addrconf_permanent_addr+0x867/0x8c0 [ 287.643678][ T7553] ? __kasan_check_read+0x11/0x20 [ 287.648714][ T7553] addrconf_init_auto_addrs+0x842/0xb90 [ 287.654269][ T7553] ? addrconf_dad_run+0x5a0/0x5a0 [ 287.659309][ T7553] ? igmpv3_del_delrec+0x700/0x700 [ 287.664436][ T7553] ? __local_bh_enable_ip+0x58/0x80 [ 287.669647][ T7553] ? _raw_spin_unlock_bh+0x51/0x60 [ 287.674912][ T7553] ? __kasan_check_write+0x14/0x20 [ 287.680053][ T7553] ? tun_sock_write_space+0x13b/0x1b0 [ 287.685537][ T7553] ? __kasan_check_write+0x14/0x20 [ 287.690675][ T7553] ? mutex_unlock+0x89/0x220 [ 287.695310][ T7553] ? __mutex_lock_slowpath+0x10/0x10 [ 287.700604][ T7553] ? macsec_notify+0xff/0x490 [ 287.705300][ T7553] ? addrconf_link_ready+0x134/0x190 [ 287.710602][ T7553] addrconf_notify+0x95d/0xde0 [ 287.715381][ T7553] raw_notifier_call_chain+0x90/0x100 [ 287.720768][ T7553] __dev_notify_flags+0x28f/0x500 [ 287.725806][ T7553] ? __dev_change_flags+0x6a0/0x6a0 [ 287.731012][ T7553] ? __dev_change_flags+0x510/0x6a0 [ 287.736224][ T7553] ? dev_get_flags+0x1e0/0x1e0 [ 287.741005][ T7553] ? __kasan_slab_free+0x11/0x20 [ 287.745958][ T7553] dev_change_flags+0xe8/0x1a0 [ 287.750732][ T7553] dev_ifsioc+0x147/0xe70 [ 287.755074][ T7553] ? dev_ioctl+0xd10/0xd10 [ 287.759506][ T7553] ? __kasan_check_write+0x14/0x20 [ 287.764640][ T7553] ? mutex_lock+0x95/0x1a0 [ 287.769067][ T7553] ? wait_for_completion_killable_timeout+0x10/0x10 [ 287.775674][ T7553] ? dev_get_by_name_rcu+0xc8/0xf0 [ 287.780814][ T7553] dev_ioctl+0x560/0xd10 [ 287.785074][ T7553] sock_do_ioctl+0x22e/0x300 [ 287.789676][ T7553] ? sock_show_fdinfo+0xa0/0xa0 [ 287.794549][ T7553] ? selinux_file_ioctl+0x377/0x480 [ 287.799770][ T7553] sock_ioctl+0x4bc/0x6b0 [ 287.804116][ T7553] ? sock_poll+0x3d0/0x3d0 [ 287.808550][ T7553] ? __fget_files+0x2c4/0x320 [ 287.813249][ T7553] ? security_file_ioctl+0x84/0xa0 [ 287.818381][ T7553] ? sock_poll+0x3d0/0x3d0 [ 287.822809][ T7553] __se_sys_ioctl+0x121/0x1a0 [ 287.827502][ T7553] __x64_sys_ioctl+0x7b/0x90 [ 287.832130][ T7553] x64_sys_call+0x2f/0x9a0 [ 287.836560][ T7553] do_syscall_64+0x4c/0xa0 [ 287.841002][ T7553] ? clear_bhb_loop+0x50/0xa0 [ 287.845698][ T7553] ? clear_bhb_loop+0x50/0xa0 [ 287.850392][ T7553] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 287.856299][ T7553] RIP: 0033:0x7f84f835cbe9 [ 287.860733][ T7553] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 287.880375][ T7553] RSP: 002b:00007f84f6dc5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 287.888818][ T7553] RAX: ffffffffffffffda RBX: 00007f84f8593fa0 RCX: 00007f84f835cbe9 [ 287.896813][ T7553] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 000000000000000a [ 287.904800][ T7553] RBP: 00007f84f6dc5090 R08: 0000000000000000 R09: 0000000000000000 [ 287.912783][ T7553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 287.920764][ T7553] R13: 00007f84f8594038 R14: 00007f84f8593fa0 R15: 00007ffcd29d5058 [ 287.928761][ T7553] [ 288.007468][ T7568] syz.4.2530[7568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.007909][ T7568] syz.4.2530[7568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.070730][ T7572] device pim6reg1 entered promiscuous mode [ 288.330380][ T7585] syz.4.2530[7585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.330454][ T7585] syz.4.2530[7585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.579847][ T7587] FAULT_INJECTION: forcing a failure. [ 288.579847][ T7587] name failslab, interval 1, probability 0, space 0, times 0 [ 288.603873][ T7587] CPU: 1 PID: 7587 Comm: syz.2.2537 Not tainted syzkaller #0 [ 288.611277][ T7587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 288.621378][ T7587] Call Trace: [ 288.624676][ T7587] [ 288.627619][ T7587] __dump_stack+0x21/0x30 [ 288.631983][ T7587] dump_stack_lvl+0xee/0x150 [ 288.636595][ T7587] ? show_regs_print_info+0x20/0x20 [ 288.641825][ T7587] ? __kasan_check_write+0x14/0x20 [ 288.646961][ T7587] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 288.652446][ T7587] dump_stack+0x15/0x20 [ 288.656628][ T7587] should_fail+0x3c1/0x510 [ 288.661064][ T7587] __should_failslab+0xa4/0xe0 [ 288.665855][ T7587] should_failslab+0x9/0x20 [ 288.670380][ T7587] slab_pre_alloc_hook+0x3b/0xe0 [ 288.675340][ T7587] kmem_cache_alloc_trace+0x48/0x270 [ 288.680653][ T7587] ? tipc_nametbl_lookup_mcast_sockets+0x641/0xd30 [ 288.687179][ T7587] tipc_nametbl_lookup_mcast_sockets+0x641/0xd30 [ 288.693531][ T7587] tipc_sk_mcast_rcv+0x590/0xec0 [ 288.698507][ T7587] ? tipc_msg_validate+0x2cc/0x590 [ 288.703655][ T7587] ? tipc_sk_bind+0x310/0x310 [ 288.708433][ T7587] tipc_mcast_xmit+0x10fd/0x1710 [ 288.713416][ T7587] ? kasan_unpoison+0x67/0x90 [ 288.718119][ T7587] ? tipc_bcbase_xmit+0x9d0/0x9d0 [ 288.723170][ T7587] ? check_stack_object+0x81/0x140 [ 288.728397][ T7587] ? __check_object_size+0x2f4/0x3c0 [ 288.733708][ T7587] ? tipc_msg_build+0xba1/0xfb0 [ 288.738585][ T7587] __tipc_sendmsg+0x1d81/0x2680 [ 288.743459][ T7587] ? _raw_spin_lock+0xe0/0xe0 [ 288.748165][ T7587] ? local_bh_enable+0x30/0x30 [ 288.752960][ T7587] ? cmp_ex_search+0x1e/0x80 [ 288.757574][ T7587] ? wait_woken+0x170/0x170 [ 288.762186][ T7587] ? avc_has_perm+0x158/0x240 [ 288.766901][ T7587] ? __kasan_check_write+0x14/0x20 [ 288.772034][ T7587] ? _raw_spin_lock_bh+0x8e/0xe0 [ 288.776994][ T7587] ? _raw_spin_lock_irq+0xe0/0xe0 [ 288.782045][ T7587] ? __local_bh_enable_ip+0x58/0x80 [ 288.787266][ T7587] ? lock_sock_nested+0x1f1/0x290 [ 288.792318][ T7587] ? sock_init_data+0xc0/0xc0 [ 288.797034][ T7587] tipc_sendmsg+0x55/0x70 [ 288.801392][ T7587] ? tipc_recvmsg+0x13a0/0x13a0 [ 288.806262][ T7587] ____sys_sendmsg+0x5a2/0x8c0 [ 288.811053][ T7587] ? __sys_sendmsg_sock+0x40/0x40 [ 288.816100][ T7587] ? import_iovec+0x7c/0xb0 [ 288.820628][ T7587] ___sys_sendmsg+0x1f0/0x260 [ 288.825326][ T7587] ? __sys_sendmsg+0x250/0x250 [ 288.830105][ T7587] ? __fdget+0x1a1/0x230 [ 288.834351][ T7587] __x64_sys_sendmsg+0x1e2/0x2a0 [ 288.839291][ T7587] ? ___sys_sendmsg+0x260/0x260 [ 288.844142][ T7587] ? ksys_write+0x1eb/0x240 [ 288.848646][ T7587] ? __bpf_trace_sys_enter+0x62/0x70 [ 288.853937][ T7587] ? trace_sys_enter+0x3d/0x50 [ 288.858728][ T7587] x64_sys_call+0x4b/0x9a0 [ 288.863143][ T7587] do_syscall_64+0x4c/0xa0 [ 288.867583][ T7587] ? clear_bhb_loop+0x50/0xa0 [ 288.872277][ T7587] ? clear_bhb_loop+0x50/0xa0 [ 288.876956][ T7587] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 288.882850][ T7587] RIP: 0033:0x7f3e87e0dbe9 [ 288.887281][ T7587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 288.906885][ T7587] RSP: 002b:00007f3e86876038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 288.915321][ T7587] RAX: ffffffffffffffda RBX: 00007f3e88044fa0 RCX: 00007f3e87e0dbe9 [ 288.923292][ T7587] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000008 [ 288.931267][ T7587] RBP: 00007f3e86876090 R08: 0000000000000000 R09: 0000000000000000 [ 288.939235][ T7587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 288.947200][ T7587] R13: 00007f3e88045038 R14: 00007f3e88044fa0 R15: 00007ffcbff74778 [ 288.955172][ T7587] [ 289.142541][ T7592] kfree: port 1(veth1) entered blocking state [ 289.240134][ T7592] kfree: port 1(veth1) entered disabled state [ 289.337061][ T7592] device veth1 entered promiscuous mode [ 289.373253][ T7615] device pim6reg1 entered promiscuous mode [ 289.636939][ T7623] device sit0 left promiscuous mode [ 289.680298][ T7623] device sit0 entered promiscuous mode [ 290.667379][ T7658] device sit0 entered promiscuous mode [ 290.978713][ T7664] device pim6reg1 entered promiscuous mode [ 292.375535][ T7703] device syzkaller0 entered promiscuous mode [ 292.600799][ T7718] device pim6reg1 entered promiscuous mode [ 293.034013][ T7751] device syzkaller0 entered promiscuous mode [ 293.214023][ T7768] device pim6reg1 entered promiscuous mode [ 293.581867][ T7772] device syzkaller0 entered promiscuous mode [ 294.000469][ T7801] device syzkaller0 entered promiscuous mode [ 294.272498][ T7815] device pim6reg1 entered promiscuous mode [ 295.445702][ T7842] device syzkaller0 entered promiscuous mode [ 296.453663][ T7864] device pim6reg1 entered promiscuous mode [ 296.499790][ T30] audit: type=1400 audit(1756839693.100:138): avc: denied { create } for pid=7869 comm="syz.3.2631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 297.831747][ T7894] device syzkaller0 entered promiscuous mode [ 298.120535][ T7900] FAULT_INJECTION: forcing a failure. [ 298.120535][ T7900] name failslab, interval 1, probability 0, space 0, times 0 [ 298.182235][ T7900] CPU: 0 PID: 7900 Comm: syz.0.2642 Not tainted syzkaller #0 [ 298.189666][ T7900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 298.199841][ T7900] Call Trace: [ 298.203169][ T7900] [ 298.206113][ T7900] __dump_stack+0x21/0x30 [ 298.210462][ T7900] dump_stack_lvl+0xee/0x150 [ 298.215075][ T7900] ? show_regs_print_info+0x20/0x20 [ 298.220290][ T7900] dump_stack+0x15/0x20 [ 298.224644][ T7900] should_fail+0x3c1/0x510 [ 298.229088][ T7900] __should_failslab+0xa4/0xe0 [ 298.233871][ T7900] should_failslab+0x9/0x20 [ 298.238395][ T7900] slab_pre_alloc_hook+0x3b/0xe0 [ 298.243543][ T7900] ? __alloc_file+0x28/0x2a0 [ 298.248154][ T7900] kmem_cache_alloc+0x44/0x260 [ 298.252967][ T7900] __alloc_file+0x28/0x2a0 [ 298.257490][ T7900] alloc_empty_file+0x97/0x180 [ 298.262283][ T7900] alloc_file+0x59/0x540 [ 298.266643][ T7900] alloc_file_pseudo+0x17a/0x1f0 [ 298.271603][ T7900] ? alloc_empty_file_noaccount+0x80/0x80 [ 298.277351][ T7900] sock_alloc_file+0xba/0x260 [ 298.282045][ T7900] __sys_socketpair+0x386/0x590 [ 298.286926][ T7900] __x64_sys_socketpair+0x9b/0xb0 [ 298.291974][ T7900] x64_sys_call+0x36/0x9a0 [ 298.296437][ T7900] do_syscall_64+0x4c/0xa0 [ 298.300872][ T7900] ? clear_bhb_loop+0x50/0xa0 [ 298.305562][ T7900] ? clear_bhb_loop+0x50/0xa0 [ 298.310257][ T7900] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 298.316165][ T7900] RIP: 0033:0x7f0b432ddbe9 [ 298.320594][ T7900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 298.340214][ T7900] RSP: 002b:00007f0b41d46038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 298.348643][ T7900] RAX: ffffffffffffffda RBX: 00007f0b43514fa0 RCX: 00007f0b432ddbe9 [ 298.356628][ T7900] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 298.364607][ T7900] RBP: 00007f0b41d46090 R08: 0000000000000000 R09: 0000000000000000 [ 298.372590][ T7900] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000002 [ 298.380574][ T7900] R13: 00007f0b43515038 R14: 00007f0b43514fa0 R15: 00007ffd65df4008 [ 298.388565][ T7900] [ 298.422274][ T7898] device syzkaller0 entered promiscuous mode [ 298.496395][ T7906] FAULT_INJECTION: forcing a failure. [ 298.496395][ T7906] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 298.531514][ T7906] CPU: 0 PID: 7906 Comm: syz.2.2645 Not tainted syzkaller #0 [ 298.538944][ T7906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 298.549014][ T7906] Call Trace: [ 298.552306][ T7906] [ 298.555256][ T7906] __dump_stack+0x21/0x30 [ 298.559615][ T7906] dump_stack_lvl+0xee/0x150 [ 298.564230][ T7906] ? show_regs_print_info+0x20/0x20 [ 298.569463][ T7906] dump_stack+0x15/0x20 [ 298.573641][ T7906] should_fail+0x3c1/0x510 [ 298.578088][ T7906] should_fail_alloc_page+0x55/0x80 [ 298.583309][ T7906] prepare_alloc_pages+0x156/0x600 [ 298.588445][ T7906] ? __alloc_pages_bulk+0xab0/0xab0 [ 298.593676][ T7906] ? slab_post_alloc_hook+0x4f/0x2b0 [ 298.598989][ T7906] ? alloc_vmap_area+0x17a/0x1990 [ 298.604034][ T7906] ? __get_vm_area_node+0x14e/0x350 [ 298.609255][ T7906] ? __vmalloc_node_range+0xdf/0xaf0 [ 298.614558][ T7906] ? sock_hash_alloc+0x2bc/0x540 [ 298.619519][ T7906] __alloc_pages+0x10a/0x440 [ 298.624133][ T7906] ? prep_new_page+0x110/0x110 [ 298.628919][ T7906] ? __kasan_check_write+0x14/0x20 [ 298.634057][ T7906] __get_free_pages+0x10/0x30 [ 298.638787][ T7906] kasan_populate_vmalloc_pte+0x29/0x120 [ 298.644449][ T7906] __apply_to_page_range+0x8b0/0xbf0 [ 298.649755][ T7906] ? kasan_populate_vmalloc+0x70/0x70 [ 298.655161][ T7906] ? kasan_populate_vmalloc+0x70/0x70 [ 298.660584][ T7906] apply_to_page_range+0x3b/0x50 [ 298.665541][ T7906] kasan_populate_vmalloc+0x60/0x70 [ 298.670773][ T7906] alloc_vmap_area+0x185c/0x1990 [ 298.675745][ T7906] ? vm_map_ram+0xa60/0xa60 [ 298.680277][ T7906] ? __get_vm_area_node+0x11d/0x350 [ 298.685497][ T7906] __get_vm_area_node+0x14e/0x350 [ 298.690541][ T7906] __vmalloc_node_range+0xdf/0xaf0 [ 298.695678][ T7906] ? sock_hash_alloc+0x2bc/0x540 [ 298.700638][ T7906] bpf_map_area_alloc+0xd5/0xe0 [ 298.705517][ T7906] ? sock_hash_alloc+0x2bc/0x540 [ 298.710478][ T7906] sock_hash_alloc+0x2bc/0x540 [ 298.715271][ T7906] map_create+0x455/0x21b0 [ 298.719725][ T7906] __sys_bpf+0x2cf/0x730 [ 298.723998][ T7906] ? bpf_link_show_fdinfo+0x310/0x310 [ 298.729576][ T7906] __x64_sys_bpf+0x7c/0x90 [ 298.734020][ T7906] x64_sys_call+0x4b9/0x9a0 [ 298.738558][ T7906] do_syscall_64+0x4c/0xa0 [ 298.742999][ T7906] ? clear_bhb_loop+0x50/0xa0 [ 298.747710][ T7906] ? clear_bhb_loop+0x50/0xa0 [ 298.752414][ T7906] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 298.758402][ T7906] RIP: 0033:0x7f3e87e0dbe9 [ 298.763109][ T7906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 298.782912][ T7906] RSP: 002b:00007f3e86876038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 298.791368][ T7906] RAX: ffffffffffffffda RBX: 00007f3e88044fa0 RCX: 00007f3e87e0dbe9 [ 298.799368][ T7906] RDX: 0000000000000050 RSI: 0000200000000100 RDI: 0000000000000000 [ 298.807366][ T7906] RBP: 00007f3e86876090 R08: 0000000000000000 R09: 0000000000000000 [ 298.815377][ T7906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 298.823373][ T7906] R13: 00007f3e88045038 R14: 00007f3e88044fa0 R15: 00007ffcbff74778 [ 298.831380][ T7906] [ 301.831577][ T7973] device pim6reg1 entered promiscuous mode [ 302.124276][ T7991] FAULT_INJECTION: forcing a failure. [ 302.124276][ T7991] name failslab, interval 1, probability 0, space 0, times 0 [ 302.137351][ T7991] CPU: 1 PID: 7991 Comm: syz.3.2675 Not tainted syzkaller #0 [ 302.144776][ T7991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 302.154861][ T7991] Call Trace: [ 302.158150][ T7991] [ 302.161088][ T7991] __dump_stack+0x21/0x30 [ 302.165439][ T7991] dump_stack_lvl+0xee/0x150 [ 302.170035][ T7991] ? show_regs_print_info+0x20/0x20 [ 302.175245][ T7991] dump_stack+0x15/0x20 [ 302.179409][ T7991] should_fail+0x3c1/0x510 [ 302.183836][ T7991] __should_failslab+0xa4/0xe0 [ 302.188613][ T7991] should_failslab+0x9/0x20 [ 302.193126][ T7991] slab_pre_alloc_hook+0x3b/0xe0 [ 302.198078][ T7991] ? getname_flags+0xb9/0x500 [ 302.202880][ T7991] kmem_cache_alloc+0x44/0x260 [ 302.207664][ T7991] getname_flags+0xb9/0x500 [ 302.212295][ T7991] ? security_file_permission+0x83/0xa0 [ 302.217852][ T7991] user_path_at_empty+0x30/0x1c0 [ 302.222803][ T7991] bpf_obj_get_user+0xb6/0x480 [ 302.227579][ T7991] ? bpf_obj_pin_user+0x2c0/0x2c0 [ 302.232617][ T7991] bpf_obj_get+0xd3/0x120 [ 302.236951][ T7991] __sys_bpf+0x447/0x730 [ 302.241198][ T7991] ? bpf_link_show_fdinfo+0x310/0x310 [ 302.246581][ T7991] ? debug_smp_processor_id+0x17/0x20 [ 302.251961][ T7991] __x64_sys_bpf+0x7c/0x90 [ 302.256411][ T7991] x64_sys_call+0x4b9/0x9a0 [ 302.260925][ T7991] do_syscall_64+0x4c/0xa0 [ 302.265347][ T7991] ? clear_bhb_loop+0x50/0xa0 [ 302.270031][ T7991] ? clear_bhb_loop+0x50/0xa0 [ 302.274716][ T7991] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 302.280617][ T7991] RIP: 0033:0x7f1773cc9be9 [ 302.285036][ T7991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 302.304734][ T7991] RSP: 002b:00007f1772732038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 302.313162][ T7991] RAX: ffffffffffffffda RBX: 00007f1773f00fa0 RCX: 00007f1773cc9be9 [ 302.321147][ T7991] RDX: 0000000000000018 RSI: 0000200000000400 RDI: 0000000000000007 [ 302.329132][ T7991] RBP: 00007f1772732090 R08: 0000000000000000 R09: 0000000000000000 [ 302.337242][ T7991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 302.345234][ T7991] R13: 00007f1773f01038 R14: 00007f1773f00fa0 R15: 00007fffa65da888 [ 302.353222][ T7991] [ 302.399122][ T7992] device syzkaller0 entered promiscuous mode [ 302.945251][ T7999] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.952451][ T7999] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.960259][ T7999] device bridge_slave_0 entered promiscuous mode [ 302.968609][ T7999] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.975729][ T7999] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.983356][ T7999] device bridge_slave_1 entered promiscuous mode [ 303.353757][ T30] audit: type=1400 audit(1756839699.960:139): avc: denied { create } for pid=7999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 303.370989][ T7999] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.381406][ T7999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.382634][ T30] audit: type=1400 audit(1756839699.960:140): avc: denied { write } for pid=7999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 303.388706][ T7999] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.412808][ T30] audit: type=1400 audit(1756839699.960:141): avc: denied { read } for pid=7999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 303.416069][ T7999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.465221][ T8016] FAULT_INJECTION: forcing a failure. [ 303.465221][ T8016] name failslab, interval 1, probability 0, space 0, times 0 [ 303.478203][ T8016] CPU: 1 PID: 8016 Comm: syz.2.2681 Not tainted syzkaller #0 [ 303.485609][ T8016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 303.495686][ T8016] Call Trace: [ 303.498982][ T8016] [ 303.502041][ T8016] __dump_stack+0x21/0x30 [ 303.506402][ T8016] dump_stack_lvl+0xee/0x150 [ 303.511020][ T8016] ? show_regs_print_info+0x20/0x20 [ 303.516340][ T8016] ? dump_stack+0x9/0x20 [ 303.520607][ T8016] ? dump_stack_lvl+0x1/0x150 [ 303.525420][ T8016] dump_stack+0x15/0x20 [ 303.529601][ T8016] should_fail+0x3c1/0x510 [ 303.534039][ T8016] __should_failslab+0xa4/0xe0 [ 303.538828][ T8016] should_failslab+0x9/0x20 [ 303.543350][ T8016] slab_pre_alloc_hook+0x3b/0xe0 [ 303.548324][ T8016] __kmalloc+0x6d/0x2c0 [ 303.552497][ T8016] ? ___neigh_create+0x6f2/0x1be0 [ 303.557544][ T8016] ___neigh_create+0x6f2/0x1be0 [ 303.562418][ T8016] ? alloc_skb_with_frags+0xa8/0x620 [ 303.567855][ T8016] ? alloc_skb_with_frags+0xa8/0x620 [ 303.573167][ T8016] ? irqentry_exit+0x37/0x40 [ 303.577789][ T8016] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 303.583977][ T8016] __neigh_create+0x31/0x40 [ 303.588511][ T8016] ip6_finish_output2+0xab3/0x1760 [ 303.593657][ T8016] ? __ip6_finish_output+0x7d0/0x7d0 [ 303.598976][ T8016] ? __local_bh_enable_ip+0x58/0x80 [ 303.604210][ T8016] ? local_bh_enable+0x1f/0x30 [ 303.609007][ T8016] __ip6_finish_output+0x61e/0x7d0 [ 303.614150][ T8016] ip6_finish_output+0x31/0x240 [ 303.619027][ T8016] ? ip6_output+0x384/0x3b0 [ 303.619935][ T7999] device veth0_vlan entered promiscuous mode [ 303.623637][ T8016] ip6_output+0x1d1/0x3b0 [ 303.623662][ T8016] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 303.638131][ T7999] device veth1_macvtap entered promiscuous mode [ 303.640117][ T8016] ? ac6_seq_show+0xf0/0xf0 [ 303.640143][ T8016] ? ip6_output+0x3b0/0x3b0 [ 303.640167][ T8016] ip6_local_out+0x21a/0x3d0 [ 303.659991][ T8016] ? dst_output+0x80/0x80 [ 303.664335][ T8016] ? __ip6_local_out+0x350/0x350 [ 303.669287][ T8016] ? __kasan_check_read+0x11/0x20 [ 303.674328][ T8016] ? ip6_setup_cork+0xd10/0x1290 [ 303.679277][ T8016] ip6_push_pending_frames+0x17d/0x2d0 [ 303.684746][ T8016] icmpv6_push_pending_frames+0x29f/0x440 [ 303.690475][ T8016] icmp6_send+0xf6d/0x14c0 [ 303.694920][ T8016] ? icmpv6_push_pending_frames+0x440/0x440 [ 303.700835][ T8016] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 303.707107][ T8016] ? __skb_flow_dissect+0x1b9e/0x5930 [ 303.712488][ T8016] ? __skb_flow_dissect+0x520c/0x5930 [ 303.717863][ T8016] icmpv6_param_prob+0x2f/0x40 [ 303.722633][ T8016] ip6_parse_tlv+0x1a4c/0x1ba0 [ 303.727400][ T8016] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 303.733565][ T8016] ipv6_parse_hopopts+0x2a3/0x580 [ 303.738592][ T8016] ip6_rcv_core+0xca7/0x1390 [ 303.743185][ T8016] ipv6_rcv+0xca/0x210 [ 303.747257][ T8016] ? ip6_rcv_finish+0x360/0x360 [ 303.752108][ T8016] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 303.758356][ T8016] ? _copy_from_iter+0x302/0x1050 [ 303.763383][ T8016] ? ip6_rcv_finish+0x360/0x360 [ 303.768235][ T8016] __netif_receive_skb+0xc8/0x280 [ 303.773267][ T8016] ? _copy_from_iter+0x4ae/0x1050 [ 303.778306][ T8016] ? __kasan_check_write+0x14/0x20 [ 303.783424][ T8016] netif_receive_skb+0x98/0x3d0 [ 303.788273][ T8016] ? netif_receive_skb_core+0x100/0x100 [ 303.793838][ T8016] ? virtio_net_hdr_to_skb+0x9df/0x11c0 [ 303.799523][ T8016] tun_rx_batched+0x5e8/0x710 [ 303.804222][ T8016] ? local_bh_enable+0x30/0x30 [ 303.808997][ T8016] tun_get_user+0x279c/0x33c0 [ 303.813686][ T8016] ? _copy_from_user+0x1b/0xd0 [ 303.818473][ T8016] ? tun_do_read+0x1c40/0x1c40 [ 303.823275][ T8016] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 303.829115][ T8016] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 303.835376][ T8016] tun_chr_write_iter+0x1eb/0x2e0 [ 303.840414][ T8016] vfs_write+0x802/0xf70 [ 303.844668][ T8016] ? file_end_write+0x1b0/0x1b0 [ 303.849528][ T8016] ? __fget_files+0x2c4/0x320 [ 303.854219][ T8016] ? __fdget_pos+0x1f7/0x380 [ 303.858815][ T8016] ? ksys_write+0x71/0x240 [ 303.863235][ T8016] ksys_write+0x140/0x240 [ 303.867569][ T8016] ? __ia32_sys_read+0x90/0x90 [ 303.872330][ T8016] ? sched_clock_cpu+0x18/0x3c0 [ 303.877184][ T8016] __x64_sys_write+0x7b/0x90 [ 303.881776][ T8016] x64_sys_call+0x8ef/0x9a0 [ 303.886282][ T8016] do_syscall_64+0x4c/0xa0 [ 303.890724][ T8016] ? clear_bhb_loop+0x50/0xa0 [ 303.895403][ T8016] ? clear_bhb_loop+0x50/0xa0 [ 303.900082][ T8016] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 303.905981][ T8016] RIP: 0033:0x7f3e87e0dbe9 [ 303.910393][ T8016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 303.930178][ T8016] RSP: 002b:00007f3e86876038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 303.938618][ T8016] RAX: ffffffffffffffda RBX: 00007f3e88044fa0 RCX: 00007f3e87e0dbe9 [ 303.946709][ T8016] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 303.954678][ T8016] RBP: 00007f3e86876090 R08: 0000000000000000 R09: 0000000000000000 [ 303.962658][ T8016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 303.970639][ T8016] R13: 00007f3e88045038 R14: 00007f3e88044fa0 R15: 00007ffcbff74778 [ 303.978622][ T8016] [ 304.007841][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 304.023241][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 304.032272][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 304.057424][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.066209][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.075135][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 304.084074][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 304.093529][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 304.130845][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 304.174740][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 304.225697][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 304.281841][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 304.292928][ T8025] FAULT_INJECTION: forcing a failure. [ 304.292928][ T8025] name failslab, interval 1, probability 0, space 0, times 0 [ 304.337178][ T8025] CPU: 0 PID: 8025 Comm: syz.2.2685 Not tainted syzkaller #0 [ 304.344608][ T8025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 304.354679][ T8025] Call Trace: [ 304.357991][ T8025] [ 304.360936][ T8025] __dump_stack+0x21/0x30 [ 304.365287][ T8025] dump_stack_lvl+0xee/0x150 [ 304.369902][ T8025] ? show_regs_print_info+0x20/0x20 [ 304.375117][ T8025] dump_stack+0x15/0x20 [ 304.379293][ T8025] should_fail+0x3c1/0x510 [ 304.383730][ T8025] __should_failslab+0xa4/0xe0 [ 304.388517][ T8025] should_failslab+0x9/0x20 [ 304.393034][ T8025] slab_pre_alloc_hook+0x3b/0xe0 [ 304.397988][ T8025] __kmalloc+0x6d/0x2c0 [ 304.402165][ T8025] ? kvmalloc_node+0x206/0x300 [ 304.406943][ T8025] kvmalloc_node+0x206/0x300 [ 304.411553][ T8025] ? vm_mmap+0xb0/0xb0 [ 304.415637][ T8025] generic_map_lookup_batch+0x457/0xa70 [ 304.421203][ T8025] ? security_file_permission+0x79/0xa0 [ 304.426869][ T8025] ? bpf_map_update_value+0x3e0/0x3e0 [ 304.432260][ T8025] ? __fdget+0x1a1/0x230 [ 304.436542][ T8025] ? bpf_map_update_value+0x3e0/0x3e0 [ 304.441957][ T8025] bpf_map_do_batch+0x2d4/0x5f0 [ 304.446827][ T8025] ? security_bpf+0x82/0xa0 [ 304.451436][ T8025] __sys_bpf+0x5e3/0x730 [ 304.455697][ T8025] ? bpf_link_show_fdinfo+0x310/0x310 [ 304.461091][ T8025] ? debug_smp_processor_id+0x17/0x20 [ 304.466494][ T8025] __x64_sys_bpf+0x7c/0x90 [ 304.470921][ T8025] x64_sys_call+0x4b9/0x9a0 [ 304.475456][ T8025] do_syscall_64+0x4c/0xa0 [ 304.479978][ T8025] ? clear_bhb_loop+0x50/0xa0 [ 304.484674][ T8025] ? clear_bhb_loop+0x50/0xa0 [ 304.489365][ T8025] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 304.495288][ T8025] RIP: 0033:0x7f3e87e0dbe9 [ 304.499716][ T8025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 304.519337][ T8025] RSP: 002b:00007f3e86876038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 304.527767][ T8025] RAX: ffffffffffffffda RBX: 00007f3e88044fa0 RCX: 00007f3e87e0dbe9 [ 304.535751][ T8025] RDX: 0000000000000038 RSI: 00002000000000c0 RDI: 0000000000000018 [ 304.543737][ T8025] RBP: 00007f3e86876090 R08: 0000000000000000 R09: 0000000000000000 [ 304.551725][ T8025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 304.559728][ T8025] R13: 00007f3e88045038 R14: 00007f3e88044fa0 R15: 00007ffcbff74778 [ 304.567719][ T8025] [ 304.590576][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 304.603355][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 304.878006][ T30] audit: type=1400 audit(1756839701.480:142): avc: denied { create } for pid=8033 comm="syz.1.2678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 305.363593][ T45] syzkaller: port 1(erspan0) entered disabled state [ 305.382149][ T45] device erspan0 left promiscuous mode [ 305.413640][ T45] syzkaller: port 1(erspan0) entered disabled state [ 306.141553][ T45] device veth1 left promiscuous mode [ 306.147049][ T45] kfree: port 1(veth1) entered disabled state [ 306.197679][ T45] device bridge_slave_1 left promiscuous mode [ 306.244628][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.303363][ T45] device bridge_slave_0 left promiscuous mode [ 306.326621][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.377486][ T45] device veth1_macvtap left promiscuous mode [ 306.391869][ T45] device veth0_vlan left promiscuous mode [ 306.714718][ T8070] device pim6reg1 entered promiscuous mode [ 306.839510][ T30] audit: type=1400 audit(1756839703.440:143): avc: denied { read } for pid=8071 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 307.023642][ T30] audit: type=1400 audit(1756839703.590:144): avc: denied { read } for pid=8076 comm="syz.2.2702" dev="nsfs" ino=4026532549 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 307.068374][ T30] audit: type=1400 audit(1756839703.590:145): avc: denied { open } for pid=8076 comm="syz.2.2702" path="uts:[4026532549]" dev="nsfs" ino=4026532549 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 307.181059][ T30] audit: type=1400 audit(1756839703.670:146): avc: denied { create } for pid=8074 comm="syz.1.2701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 193) OK Stopping crond: stopped /usr/sbin/crond (pid 185) OK [ 307.418101][ T8077] device syzkaller0 entered promiscuous mode Stopping dhcpcd... stopped /sbin/dhcpcd (pid 139) [ 307.497046][ T30] audit: type=1400 audit(1756839704.090:147): avc: denied { search } for pid=8102 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 307.570874][ T8100] syzkaller: port 1(erspan0) entered blocking state [ 307.577516][ T8100] syzkaller: port 1(erspan0) entered disabled state [ 307.592263][ T8100] device erspan0 entered promiscuous mode [ 307.600377][ T8100] syzkaller: port 1(erspan0) entered blocking state [ 307.607031][ T8100] syzkaller: port 1(erspan0) entered forwarding state [ 307.741612][ T30] audit: type=1400 audit(1756839704.350:148): avc: denied { create } for pid=8117 comm="syz.2.2708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 307.817236][ T8118] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.917345][ T8125] device bridge_slave_1 left promiscuous mode [ 307.949913][ T8125] bridge0: port 2(bridge_slave_1) entered disabled state OK [ 308.029711][ T8125] device bridge_slave_0 left promiscuous mode Stopping iptable[ 308.038400][ T8125] bridge0: port 1(bridge_slave_0) entered disabled state s: OK Stopping system message bus: done Stopping klogd: OK [ 309.232351][ T8160] device syzkaller0 entered promiscuous mode Stopping acpid: [ 309.304202][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 309.304220][ T30] audit: type=1400 audit(1756839705.910:159): avc: denied { write } for pid=86 comm="acpid" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 309.455390][ T30] audit: type=1400 audit(1756839705.910:160): avc: denied { remove_name } for pid=86 comm="acpid" name="acpid.pid" dev="tmpfs" ino=8 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 309.480606][ T30] audit: type=1400 audit(1756839705.910:161): avc: denied { unlink } for pid=86 comm="acpid" name="acpid.pid" dev="tmpfs" ino=8 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 309.730706][ T8171] device syzkaller0 entered promiscuous mode OK Stopping syslogd: stopped /sbin/syslogd (pid 83) OK umount: can't remount debugfs read-only [ 311.356487][ T30] audit: type=1400 audit(1756839707.960:162): avc: denied { module_request } for pid=8213 comm="syz.2.2732" kmod="net-pf-21" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 Connection to 10.128.0.142 closed by remote host. umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only The system is going down NOW! Sent SIGTERM to all processes [ 311.828971][ T30] audit: type=1400 audit(1756839708.420:163): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14782]" dev="pipefs" ino=14782 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 312.092996][ T273] syz-executor (273) used greatest stack depth: 21120 bytes left Sent SIGKILL to all processes Requesting system poweroff [ 313.057249][ T45] device bridge_slave_1 left promiscuous mode [ 313.063618][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.071268][ T45] device bridge_slave_0 left promiscuous mode [ 313.077439][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.085674][ T45] device veth1_macvtap left promiscuous mode [ 313.091776][ T45] device veth0_vlan left promiscuous mode [ 313.984039][ T8227] kvm: exiting hardware virtualization [ 313.990916][ T8227] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 313.997892][ T8227] ACPI: PM: Preparing to enter system sleep state S5 [ 314.005015][ T8227] reboot: Power down serialport: VM disconnected.