last executing test programs: 1m47.185131794s ago: executing program 0 (id=230): bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000580)='ext4_mark_inode_dirty\x00'}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000800000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg(r0, 0x0, 0x20004004) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000008000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000400)='consume_skb\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x12, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) 1m46.82080649s ago: executing program 0 (id=234): openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r1, 0x40047451, &(0x7f0000000180)) 1m46.635803904s ago: executing program 0 (id=235): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000400000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff85000000040000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x1a9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='ns/user\x00') r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x58, 0x4, 0x5}, 0x50) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000240), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000faff00000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xaf) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xa, 0x3, 0x87, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x4, @perf_bp={0x0, 0x3}, 0x172e0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/user\x00') syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x5, 0x4, 0x8, 0x10004, 0x0, 0xffffffffffffffff, 0x2009, '\x00', 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x4}, 0x50) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) sendmsg(r7, 0x0, 0x24000041) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='mm_page_alloc\x00', r8}, 0x10) 1m45.315788584s ago: executing program 0 (id=244): bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000580)='ext4_mark_inode_dirty\x00'}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000800000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg(r0, 0x0, 0x20004004) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000008000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000400)='consume_skb\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x12, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) 1m44.9537923s ago: executing program 0 (id=248): socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000480)=ANY=[@ANYRES32=r0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0500e001b4696ba8d344ea3056e8395fe60004000100000024ffffff0800000008000000a7ca4dcfff24222139001a7c9dcd10d69724fb", @ANYRES32, @ANYBLOB="00001900"/20, @ANYRES32=r2, @ANYRESHEX=r1, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808cdad740000000000004d672800003b4bf100cf001b546d64efa4e4a7", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff80000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x200007f, 0x0, 0x0, 0x40f00, 0x6b, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000500)='xprtrdma_post_recvs_err\x00', r1}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x6, 0xfe, 0x0, 0x0, 0x20000, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xf}, 0x72bd1de2ad10d6f3, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0x4, 0xfffc, 0x0, 0x84000, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305828, &(0x7f0000000040)=0x20000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)="c7b40b4dc10f7283e93c37614ca20594435aa71c97a25fed241b6351ba7e1197ba34a6fb192f9192eb2c20ec079063ba77c85e3682f0f05f7ae924a3c9625c1691874ecffc75b3aa2702e22c8e41e113b04cceb9bd8f7e061b5fe3a7fa8c6d12b54664937e59bb14d5446fefd204fbe704558cde836684f04ccda64bacfbf31823f356161b83bcd2d5cedd4429cdda8255f95c4dae4d89853d7c5901fa968cd7", 0xa0}, {&(0x7f0000000340)="d4760dede5d3e3fb059659e993d2869ffbd855849425c4dacde375620bd3a0932ea5b4f3445fc6e0a87a0a519ec6577faf5b106bdf0a03cd27b341e4e6", 0x3d}], 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0xf0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000440)='q\"^\xce\xf4KXH\xdd\xdf\xdc\xe5\xbcO\x992') 1m43.866449309s ago: executing program 0 (id=254): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0a00000005000000020000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000004000000000000001000001000000007aa3dd14956d10484ec07d620435e183162151b65bc25f00"/54], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0400000004000000040000000000011008080000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000003ffffffff00"/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='fsi_master_aspeed_opb_read\x00', r3}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x1d, &(0x7f00000001c0), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8922, &(0x7f0000000080)) 1m28.829180329s ago: executing program 32 (id=254): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0a00000005000000020000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000004000000000000001000001000000007aa3dd14956d10484ec07d620435e183162151b65bc25f00"/54], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0400000004000000040000000000011008080000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000003ffffffff00"/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='fsi_master_aspeed_opb_read\x00', r3}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x1d, &(0x7f00000001c0), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8922, &(0x7f0000000080)) 15.495900491s ago: executing program 3 (id=1101): socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000480)=ANY=[@ANYRES32=r0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0500e001b4696ba8d344ea3056e8395fe60004000100000024ffffff0800000008000000a7ca4dcfff24222139001a7c9dcd10d69724fb", @ANYRES32, @ANYBLOB="00001900"/20, @ANYRES32=r2, @ANYRESHEX=r1, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808cdad740000000000004d672800003b4bf100cf001b546d64efa4e4a7", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff80000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x200007f, 0x0, 0x0, 0x40f00, 0x6b, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000500)='xprtrdma_post_recvs_err\x00', r1}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x200, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0x6, 0xfe, 0x0, 0x0, 0x20000, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b4b, 0x2, @perf_bp={0x0, 0xf}, 0x72bd1de2ad10d6f3, 0xfffffff7fffffffc, 0x2, 0x1, 0x0, 0x4, 0xfffc, 0x0, 0x84000, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40305828, &(0x7f0000000040)=0x20000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)="c7b40b4dc10f7283e93c37614ca20594435aa71c97a25fed241b6351ba7e1197ba34a6fb192f9192eb2c20ec079063ba77c85e3682f0f05f7ae924a3c9625c1691874ecffc75b3aa2702e22c8e41e113b04cceb9bd8f7e061b5fe3a7fa8c6d12b54664937e59bb14d5446fefd204fbe704558cde836684f04ccda64bacfbf31823f356161b83bcd2d5cedd4429cdda8255f95c4dae4d89853d7c5901fa968cd73a34c94fac629d384218a921e542cdcc94c3b2564943", 0xb6}, {&(0x7f0000000340)="d4760dede5d3e3fb059659e993d2869ffbd855849425c4dacde375620bd3a0932ea5b4f3445fc6e0a87a0a519ec6577faf5b106bdf0a03cd27b341e4e6", 0x3d}], 0x2, &(0x7f0000000640)=ANY=[], 0xf0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000440)='q\"^\xce\xf4KXH\xdd\xdf\xdc\xe5\xbcO\x992') 14.872752091s ago: executing program 2 (id=1108): socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000480)=ANY=[@ANYRES32=r0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0500e001b4696ba8d344ea3056e8395fe60004000100000024ffffff0800000008000000a7ca4dcfff24222139001a7c9dcd10d69724fb", @ANYRES32, @ANYBLOB="00001900"/20, @ANYRES32=r2, @ANYRESHEX=r1, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808cdad740000000000004d672800003b4bf100cf001b546d64efa4e4a7", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff80000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x200007f, 0x0, 0x0, 0x40f00, 0x6b, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000500)='xprtrdma_post_recvs_err\x00', r1}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x6, 0xfe, 0x0, 0x0, 0x20000, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xf}, 0x72bd1de2ad10d6f3, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0x4, 0xfffc, 0x0, 0x84000, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305828, &(0x7f0000000040)=0x20000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)="c7b40b4dc10f7283e93c37614ca20594435aa71c97a25fed241b6351ba7e1197ba34a6fb192f9192eb2c20ec079063ba77c85e3682f0f05f7ae924a3c9625c1691874ecffc75b3aa2702e22c8e41e113b04cceb9bd8f7e061b5fe3a7fa8c6d12b54664937e59bb14d5446fefd204fbe704558cde836684f04ccda64bacfbf31823f356161b83bcd2d5cedd4429cdda8255f95c4dae4d89853d7c5901fa968cd73a34c94fac629d384218a921e542cdcc94c3b2564943", 0xb6}, {&(0x7f0000000340)="d4760dede5d3e3fb059659e993d2869ffbd855849425c4dacde375620bd3a0932ea5b4f3445fc6e0a87a0a519ec6577faf5b106bdf0a03cd27b341e4e6", 0x3d}], 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB="110000000000000000000000010000009100000000000000d4000000000000000000000007000000865b00000002070c76dede4319aa4896a66f000a7cc999dbf8748ca60504434f000fdcd15cd469f9f02be7ed06a31511b60fd7001d21b789010209971e6957617087011235c4ceb36937eba51fa09738b40ceb81020a81a881025a12631c0607039308326a830bf000000000ac1e0101891769ac1414bbe0000001ffffffff64010102000000008617000000030711f01a597d7ec687e680970e010fad880094040100018923317f000001e0000002ac1414bb7f00000164010102ac1414aa7f000001000000000004fcca00000300000000"], 0xf0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000440)='q\"^\xce\xf4KXH\xdd\xdf\xdc\xe5\xbcO\x992') 14.680817386s ago: executing program 3 (id=1111): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) socketpair(0x11, 0x3, 0x300, &(0x7f0000000000)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000400000001"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b703000000000000850000000400000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='tlb_flush\x00', r4}, 0x10) syz_clone(0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 14.204461577s ago: executing program 2 (id=1113): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0x200000000000030e, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={r3, r2}, 0xc) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f3ff0000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) close(r0) 2.165074432s ago: executing program 3 (id=1116): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x9}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd, 0x0, 0xffffffffffffffff, 0x28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0x7, 0x0, &(0x7f0000000040)="3d6ee2e04b91ab", 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.158551483s ago: executing program 1 (id=1118): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x12}, 0x50) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r1}, &(0x7f0000000500), &(0x7f0000000540)=r2}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) 2.114923568s ago: executing program 2 (id=1119): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(0x3) 2.113743858s ago: executing program 5 (id=1121): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000300)='rose0\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0xfe}, 0x80) 2.048793717s ago: executing program 3 (id=1122): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b7"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x35, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00'}, 0x3d) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r4}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 2.009782522s ago: executing program 1 (id=1123): socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000480)=ANY=[@ANYRES32=r0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0500e001b4696ba8d344ea3056e8395fe60004000100000024ffffff0800000008000000a7ca4dcfff24222139001a7c9dcd10d69724fb", @ANYRES32, @ANYBLOB="00001900"/20, @ANYRES32=r2, @ANYRESHEX=r1, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808cdad740000000000004d672800003b4bf100cf001b546d64efa4e4a7", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff80000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x200007f, 0x0, 0x0, 0x40f00, 0x6b, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000500)='xprtrdma_post_recvs_err\x00', r1}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305828, &(0x7f0000000040)=0x20000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)="c7b40b4dc10f7283e93c37614ca20594435aa71c97a25fed241b6351ba7e1197ba34a6fb192f9192eb2c20ec079063ba77c85e3682f0f05f7ae924a3c9625c1691874ecffc75b3aa2702e22c8e41e113b04cceb9bd8f7e061b5fe3a7fa8c6d12b54664937e59bb14d5446fefd204fbe704558cde836684f04ccda64bacfbf31823f356161b83bcd2d5cedd4429cdda8255f95c4dae4d89853d7c5901fa968cd73a34c94fac629d384218a921e542cdcc94c3b2564943", 0xb6}, {&(0x7f0000000340)="d4760dede5d3e3fb059659e993d2869ffbd855849425c4dacde375620bd3a0932ea5b4f3445fc6e0a87a0a519ec6577faf5b106bdf0a03cd27b341e4e6", 0x3d}], 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0xf0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000440)='q\"^\xce\xf4KXH\xdd\xdf\xdc\xe5\xbcO\x992') 2.002602443s ago: executing program 4 (id=1124): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001800)={&(0x7f0000001680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x5, [@enum={0x2, 0x5, 0x0, 0x6, 0x4, [{0xf, 0xffff}, {0xa, 0x3}, {0xd, 0x5}, {0x1, 0x3a4f}, {0x1, 0x101}]}]}, {0x0, [0x30, 0x2e, 0x5f]}}, &(0x7f0000001700)=""/251, 0x51, 0xfb, 0x1, 0xe, 0x10000}, 0x28) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 1.95006221s ago: executing program 2 (id=1125): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffd}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10038, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x395}, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000000000000, 0x2}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0x6c0000000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d0000008500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.908257105s ago: executing program 4 (id=1126): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x84, 0x5, 0x0, 0x0, 0x0, 0x0, 0x322c6, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x4, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 1.540453102s ago: executing program 1 (id=1127): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) 1.221869393s ago: executing program 4 (id=1128): openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000088fe508a8500000004000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x41, 0x0) close(r4) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r4, 0x40047451, &(0x7f0000000180)) 1.106506978s ago: executing program 5 (id=1129): openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000088fe508a8500000004000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r4) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r4, 0x40047451, &(0x7f0000000180)) 1.025182538s ago: executing program 4 (id=1130): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d86dd", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000800000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) sendmsg(r1, 0x0, 0x20004004) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r6, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x0) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='mm_page_alloc\x00', r8}, 0x10) close(r7) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r9, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) r10 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r10, 0x11, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={@cgroup=r11, 0x24, 0x0, 0xffff, &(0x7f0000000000)=[0x0], 0x40e8, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', r2, 0x4000, r0}, 0x18) sendmsg$inet(r6, &(0x7f00000008c0)={&(0x7f00000004c0)={0x2, 0x4e22, @empty}, 0x10, 0x0}, 0x20000014) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 996.940772ms ago: executing program 1 (id=1131): openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r0}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa121, 0x0, @perf_config_ext={0x1000000000, 0x4}, 0x110200, 0xc8, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3a}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x22}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x21) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001cc0)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000100000000000000400000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200000000000085000000860000001858000008000000000000000000000002d1030080555a002c6608000100000018210000", @ANYRES32, @ANYBLOB="001b00000104000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], 0x0, 0x7, 0x0, 0x0, 0x41000, 0x16, '\x00', r3, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000840)={0x4, 0x7, 0x3, 0x80}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c00)=[r2, r2, 0xffffffffffffffff, r2, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000c40)=[{0x0, 0x3, 0x0, 0x7}, {0x3, 0x1, 0x7, 0x6}, {0x1, 0x1, 0xa}, {0x4, 0x2, 0xf, 0x1}, {0x2, 0x2, 0xf, 0x4}], 0x10, 0x4}, 0x94) socketpair(0x6, 0x0, 0x5, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00'}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8", 0xe}], 0x1, 0x0, 0x0, 0x4000001}, 0x0) close(r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1a, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000001b279187b9c804d70000009500008053b8b9da123c5be83b2e55705300000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000200), &(0x7f00000003c0)}, 0x20) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0}, 0x200, 0x2, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000080000efffffffffffffff000008000000000000"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x19, &(0x7f0000000400)=ANY=[@ANYBLOB="180000008f000000000000000b00000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000086000000bf0900000000000055090100000000009500000000000000bd0a060000000000d500f4ff0100030018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000010000006500000006000000bf91000000000000b702000003000000850000002a000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x7, 0x1000, &(0x7f0000000cc0)=""/4096, 0x41100, 0x2f}, 0x21) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) 877.194117ms ago: executing program 2 (id=1132): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) close(r0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000034000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r5, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) openat$cgroup_subtree(r2, 0x0, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000019c0)=ANY=[@ANYRES32=r6, @ANYRES32, @ANYBLOB='&\x00\x00', @ANYRES64=0x0], 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x26000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r10, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r11, 0x0, &(0x7f0000001780)=""/4096}, 0x20) close(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r12) 858.61247ms ago: executing program 1 (id=1133): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x9}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd, 0x0, 0xffffffffffffffff, 0x28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xb, 0x0, &(0x7f0000000040)="3d6ee2e04b91ab10143d9a", 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 843.251062ms ago: executing program 3 (id=1134): bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg(r0, 0x0, 0x20004004) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000400)='consume_skb\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x12, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) 807.468337ms ago: executing program 1 (id=1135): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000034000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000019c0)=ANY=[@ANYRES32=r5, @ANYRES32, @ANYRES64=0x0], 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x26000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r9, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r10, 0x0, &(0x7f0000001780)=""/4096}, 0x20) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) 806.688757ms ago: executing program 5 (id=1136): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, 0x0, &(0x7f0000000b00)=""/151}, 0x20) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(0x3) 603.678513ms ago: executing program 3 (id=1137): socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000480)=ANY=[@ANYRES32=r0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0500e001b4696ba8d344ea3056e8395fe60004000100000024ffffff0800000008000000a7ca4dcfff24222139001a7c9dcd10d69724fb", @ANYRES32, @ANYBLOB="00001900"/20, @ANYRES32=r2, @ANYRESHEX=r1, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808cdad740000000000004d672800003b4bf100cf001b546d64efa4e4a7", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff80000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x200007f, 0x0, 0x0, 0x40f00, 0x6b, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000500)='xprtrdma_post_recvs_err\x00', r1}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305828, &(0x7f0000000040)=0x20000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)="c7b40b4dc10f7283e93c37614ca20594435aa71c97a25fed241b6351ba7e1197ba34a6fb192f9192eb2c20ec079063ba77c85e3682f0f05f7ae924a3c9625c1691874ecffc75b3aa2702e22c8e41e113b04cceb9bd8f7e061b5fe3a7fa8c6d12b54664937e59bb14d5446fefd204fbe704558cde836684f04ccda64bacfbf31823f356161b83bcd2d5cedd4429cdda8255f95c4dae4d89853d7c5901fa968cd73a34c94fac629d384218a921e542cdcc94c3b2564943", 0xb6}, {&(0x7f0000000340)="d4760dede5d3e3fb059659e993d2869ffbd855849425c4dacde375620bd3a0932ea5b4f3445fc6e0a87a0a519ec6577faf5b106bdf0a03cd27b341e4e6", 0x3d}], 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB="110000000000000000000000010000009100000000000000d4000000000000000000000007000000865b00000002070c76dede4319aa4896a66f000a7cc999dbf8748ca60504434f000fdcd15cd469f9f02be7ed06a31511b60fd7001d21b789010209971e6957617087011235c4ceb36937eba51fa09738b40ceb81020a81a881025a12631c0607039308326a830bf000000000ac1e0101891769ac1414bbe0000001ffffffff64010102000000008617000000030711f01a597d7ec687e680970e010fad880094040100018923317f000001e0000002ac1414bb7f00000164010102ac1414aa7f000001000000000004fcca00000300000000"], 0xf0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000440)='q\"^\xce\xf4KXH\xdd\xdf\xdc\xe5\xbcO\x992') 576.774126ms ago: executing program 5 (id=1138): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001800)={&(0x7f0000001680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x5, [@enum={0x2, 0x5, 0x0, 0x6, 0x4, [{0xf, 0xffff}, {0xa, 0x3}, {0xd, 0x5}, {0x1, 0x3a4f}, {0x1, 0x101}]}]}, {0x0, [0x30, 0x2e, 0x5f]}}, &(0x7f0000001700)=""/251, 0x51, 0xfb, 0x1, 0xe, 0x10000}, 0x28) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 412.911047ms ago: executing program 5 (id=1139): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x12}, 0x50) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r1}, &(0x7f0000000500), &(0x7f0000000540)=r2}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) 287.016793ms ago: executing program 4 (id=1140): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c0000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001800)={&(0x7f0000001680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x5, [@enum={0x2, 0x5, 0x0, 0x6, 0x4, [{0xf, 0xffff}, {0xa, 0x3}, {0xd, 0x5}, {0x1, 0x3a4f}, {0x1, 0x101}]}]}, {0x0, [0x30, 0x2e, 0x5f]}}, &(0x7f0000001700)=""/251, 0x51, 0xfb, 0x1, 0xe, 0x10000}, 0x28) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 98.620818ms ago: executing program 5 (id=1141): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x84, 0x5, 0x0, 0x0, 0x0, 0x0, 0x322c6, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x4, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 413.9µs ago: executing program 2 (id=1142): openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000088fe508a8500000004000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x41, 0x0) close(r4) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r4, 0x40047451, &(0x7f0000000180)) 0s ago: executing program 4 (id=1143): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffd}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10038, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x395}, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000000000000, 0x2}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0x6c0000000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d0000008500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): s. [ 20.881054][ T30] audit: type=1400 audit(1768848269.498:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.884287][ T273] cgroup: Unknown subsys name 'net' [ 20.903781][ T30] audit: type=1400 audit(1768848269.498:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.931230][ T30] audit: type=1400 audit(1768848269.528:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.931631][ T273] cgroup: Unknown subsys name 'devices' [ 21.078883][ T273] cgroup: Unknown subsys name 'hugetlb' [ 21.084533][ T273] cgroup: Unknown subsys name 'rlimit' [ 21.253237][ T30] audit: type=1400 audit(1768848269.868:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.276438][ T30] audit: type=1400 audit(1768848269.868:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.301836][ T30] audit: type=1400 audit(1768848269.868:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.320256][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.333763][ T30] audit: type=1400 audit(1768848269.948:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.359415][ T30] audit: type=1400 audit(1768848269.948:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.390477][ T30] audit: type=1400 audit(1768848270.008:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.391590][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.416227][ T30] audit: type=1400 audit(1768848270.008:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.959722][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.966884][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.974280][ T282] device bridge_slave_0 entered promiscuous mode [ 21.982246][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.989322][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.996789][ T282] device bridge_slave_1 entered promiscuous mode [ 22.028182][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.035347][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.042847][ T281] device bridge_slave_0 entered promiscuous mode [ 22.050830][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.058057][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.065446][ T281] device bridge_slave_1 entered promiscuous mode [ 22.157145][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.164208][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.171713][ T285] device bridge_slave_0 entered promiscuous mode [ 22.181321][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.188496][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.195907][ T285] device bridge_slave_1 entered promiscuous mode [ 22.253142][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.260240][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.267689][ T283] device bridge_slave_0 entered promiscuous mode [ 22.279228][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.286281][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.293651][ T284] device bridge_slave_0 entered promiscuous mode [ 22.300597][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.307676][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.315100][ T284] device bridge_slave_1 entered promiscuous mode [ 22.324230][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.331310][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.338731][ T283] device bridge_slave_1 entered promiscuous mode [ 22.434953][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.442144][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.449471][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.456528][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.466325][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.473388][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.480665][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.487708][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.522566][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.529732][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.537022][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.544055][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.558576][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.565653][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.572962][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.580006][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.592021][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.599105][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.606354][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.613411][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.644980][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.652517][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.659937][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.668086][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.675259][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.682567][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.690377][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.697854][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.704980][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.712304][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.719789][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.727271][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.757328][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.766364][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.773903][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.782936][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.790033][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.797675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.805762][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.812807][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.820149][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.828348][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.835453][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.842823][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.850985][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.858049][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.865367][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.873622][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.880717][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.888153][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.897695][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.907251][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.915433][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.922479][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.961887][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.970328][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.977891][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.985969][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.993020][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.000817][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.008999][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.016012][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.023387][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.031310][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.039327][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.047317][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.055417][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.063623][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.070650][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.078042][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.086123][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.093173][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.100511][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.108587][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.117079][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.130500][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.138596][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.146597][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.154919][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.172194][ T285] device veth0_vlan entered promiscuous mode [ 23.183079][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.191474][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.199907][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.208440][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.216988][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.224811][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.234109][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.241666][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.253106][ T281] device veth0_vlan entered promiscuous mode [ 23.261311][ T282] device veth0_vlan entered promiscuous mode [ 23.267803][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.275728][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.284008][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.292098][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.300181][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.307759][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.315165][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.322738][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.337786][ T283] device veth0_vlan entered promiscuous mode [ 23.345710][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.354322][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.362343][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.370122][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.377849][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.386143][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.394553][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.403302][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.411724][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.421272][ T281] device veth1_macvtap entered promiscuous mode [ 23.434025][ T283] device veth1_macvtap entered promiscuous mode [ 23.443606][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.451967][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.459734][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.468000][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.478117][ T285] device veth1_macvtap entered promiscuous mode [ 23.493268][ T282] device veth1_macvtap entered promiscuous mode [ 23.500025][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.508490][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.516034][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.523854][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.532945][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.541505][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.549921][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.558328][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.566782][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.575093][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.583629][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.599922][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.608227][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.630334][ T283] request_module fs-gadgetfs succeeded, but still no fs? [ 23.632028][ T284] device veth0_vlan entered promiscuous mode [ 23.649573][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.657584][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.665740][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.674189][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.682513][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.691052][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.698613][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.715529][ T284] device veth1_macvtap entered promiscuous mode [ 23.730940][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.739670][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.767016][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.799764][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.827075][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.849141][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.857899][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.975872][ C1] hrtimer: interrupt took 25790 ns [ 25.885060][ T390] device pim6reg1 entered promiscuous mode [ 25.958941][ T30] kauditd_printk_skb: 36 callbacks suppressed [ 25.958955][ T30] audit: type=1400 audit(1768848274.578:110): avc: denied { append } for pid=391 comm="syz.3.16" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 26.209835][ T396] device syzkaller0 entered promiscuous mode [ 26.553965][ T30] audit: type=1400 audit(1768848275.168:111): avc: denied { cpu } for pid=408 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 27.468404][ T423] device sit0 entered promiscuous mode [ 28.912128][ T30] audit: type=1400 audit(1768848277.528:112): avc: denied { create } for pid=451 comm="syz.4.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 28.968717][ T456] device veth1_macvtap left promiscuous mode [ 30.985888][ T30] audit: type=1400 audit(1768848279.598:113): avc: denied { tracepoint } for pid=485 comm="syz.3.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.355321][ T493] syz.2.44[493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.355383][ T493] syz.2.44[493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.151651][ T30] audit: type=1400 audit(1768848280.768:114): avc: denied { setopt } for pid=502 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.665260][ T30] audit: type=1400 audit(1768848281.278:115): avc: denied { create } for pid=516 comm="syz.2.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 33.515068][ T30] audit: type=1400 audit(1768848282.128:116): avc: denied { create } for pid=530 comm="syz.3.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 33.669647][ T522] device veth0_vlan left promiscuous mode [ 33.682575][ T522] device veth0_vlan entered promiscuous mode [ 33.917611][ T478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.940371][ T478] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.988475][ T478] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 34.056294][ T30] audit: type=1400 audit(1768848282.668:117): avc: denied { read } for pid=542 comm="syz.4.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 34.142723][ T30] audit: type=1400 audit(1768848282.758:118): avc: denied { create } for pid=545 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 34.963909][ T30] audit: type=1400 audit(1768848283.578:119): avc: denied { create } for pid=568 comm="syz.4.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 35.392800][ T579] device pim6reg1 entered promiscuous mode [ 36.298702][ T534] syz.2.53 (534) used greatest stack depth: 22760 bytes left [ 36.329003][ T584] device pim6reg1 entered promiscuous mode [ 36.897900][ T30] audit: type=1400 audit(1768848285.518:120): avc: denied { create } for pid=604 comm="syz.1.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 37.581446][ T30] audit: type=1400 audit(1768848286.198:121): avc: denied { relabelfrom } for pid=618 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 37.675473][ T30] audit: type=1400 audit(1768848286.228:122): avc: denied { relabelto } for pid=618 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 37.934287][ T647] device veth1_macvtap left promiscuous mode [ 39.322042][ T710] device pim6reg1 entered promiscuous mode [ 40.274276][ T740] @ÿ: renamed from bond_slave_0 [ 40.347570][ T740] device veth1_macvtap left promiscuous mode [ 40.374382][ T740] device macsec0 entered promiscuous mode [ 40.626493][ T755] device pim6reg1 entered promiscuous mode [ 40.782453][ T751] device syzkaller0 entered promiscuous mode [ 41.278978][ T770] ªªªªªª: renamed from vlan0 [ 41.931878][ T30] audit: type=1400 audit(1768848290.548:123): avc: denied { setattr } for pid=829 comm="syz.2.147" path="pipe:[14133]" dev="pipefs" ino=14133 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 43.469530][ T897] device sit0 left promiscuous mode [ 43.533504][ T897] device sit0 entered promiscuous mode [ 44.339106][ T928] device pim6reg1 entered promiscuous mode [ 45.731163][ T963] device pim6reg1 entered promiscuous mode [ 45.935529][ T30] audit: type=1400 audit(1768848294.548:124): avc: denied { create } for pid=968 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 46.259675][ T997] FAULT_INJECTION: forcing a failure. [ 46.259675][ T997] name failslab, interval 1, probability 0, space 0, times 1 [ 46.297475][ T997] CPU: 1 PID: 997 Comm: syz.1.196 Not tainted syzkaller #0 [ 46.304821][ T997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 46.314899][ T997] Call Trace: [ 46.318353][ T997] [ 46.321306][ T997] __dump_stack+0x21/0x30 [ 46.325674][ T997] dump_stack_lvl+0x110/0x170 [ 46.330368][ T997] ? show_regs_print_info+0x20/0x20 [ 46.335613][ T997] ? ppp_ioctl+0x5da/0x1790 [ 46.340137][ T997] dump_stack+0x15/0x20 [ 46.344316][ T997] should_fail+0x3c1/0x510 [ 46.348765][ T997] __should_failslab+0xa4/0xe0 [ 46.353547][ T997] should_failslab+0x9/0x20 [ 46.358095][ T997] slab_pre_alloc_hook+0x3b/0xe0 [ 46.363054][ T997] ? radix_tree_node_alloc+0x80/0x380 [ 46.368487][ T997] kmem_cache_alloc+0x44/0x260 [ 46.373295][ T997] radix_tree_node_alloc+0x80/0x380 [ 46.378521][ T997] idr_get_free+0x2b1/0xab0 [ 46.383063][ T997] ? trace_raw_output_percpu_destroy_chunk+0xc0/0xc0 [ 46.389765][ T997] idr_alloc+0x176/0x2b0 [ 46.394030][ T997] ? idr_alloc_u32+0x2e0/0x2e0 [ 46.398807][ T997] ? mutex_lock+0x9b/0x1c0 [ 46.403260][ T997] ppp_dev_configure+0x74b/0xac0 [ 46.408232][ T997] ppp_ioctl+0x64b/0x1790 [ 46.412604][ T997] ? ppp_poll+0x260/0x260 [ 46.416963][ T997] ? security_file_ioctl+0x84/0xa0 [ 46.422089][ T997] ? ppp_poll+0x260/0x260 [ 46.426437][ T997] __se_sys_ioctl+0x121/0x1a0 [ 46.431351][ T997] __x64_sys_ioctl+0x7b/0x90 [ 46.435969][ T997] x64_sys_call+0x2f/0x9a0 [ 46.440410][ T997] do_syscall_64+0x4c/0xa0 [ 46.444848][ T997] ? clear_bhb_loop+0x50/0xa0 [ 46.449544][ T997] ? clear_bhb_loop+0x50/0xa0 [ 46.454244][ T997] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 46.460161][ T997] RIP: 0033:0x7f8ee2496cb9 [ 46.464604][ T997] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 46.484315][ T997] RSP: 002b:00007f8ee0ef3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 46.492762][ T997] RAX: ffffffffffffffda RBX: 00007f8ee2711fa0 RCX: 00007f8ee2496cb9 [ 46.500759][ T997] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000003 [ 46.508748][ T997] RBP: 00007f8ee0ef3090 R08: 0000000000000000 R09: 0000000000000000 [ 46.516738][ T997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 46.524719][ T997] R13: 00007f8ee2712038 R14: 00007f8ee2711fa0 R15: 00007ffd8b0f7a08 [ 46.532710][ T997] [ 47.137372][ T1022] device pim6reg1 entered promiscuous mode [ 47.510749][ T1056] FAULT_INJECTION: forcing a failure. [ 47.510749][ T1056] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 47.524119][ T1056] CPU: 0 PID: 1056 Comm: syz.2.210 Not tainted syzkaller #0 [ 47.531456][ T1056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 47.541666][ T1056] Call Trace: [ 47.544958][ T1056] [ 47.547910][ T1056] __dump_stack+0x21/0x30 [ 47.552281][ T1056] dump_stack_lvl+0x110/0x170 [ 47.556973][ T1056] ? show_regs_print_info+0x20/0x20 [ 47.562277][ T1056] ? perf_event_read_local+0x613/0x730 [ 47.567765][ T1056] dump_stack+0x15/0x20 [ 47.571943][ T1056] should_fail+0x3c1/0x510 [ 47.576381][ T1056] should_fail_alloc_page+0x55/0x80 [ 47.581606][ T1056] prepare_alloc_pages+0x156/0x610 [ 47.586763][ T1056] ? __alloc_pages_bulk+0xad0/0xad0 [ 47.591989][ T1056] __alloc_pages+0x11d/0x460 [ 47.596600][ T1056] ? prep_new_page+0x110/0x110 [ 47.601383][ T1056] ? __kasan_check_write+0x14/0x20 [ 47.606514][ T1056] ? finish_task_switch+0x209/0x780 [ 47.611733][ T1056] new_slab+0xa1/0x4d0 [ 47.615826][ T1056] ___slab_alloc+0x381/0x810 [ 47.620433][ T1056] ? radix_tree_node_alloc+0x80/0x380 [ 47.625824][ T1056] ? _find_next_bit+0x1fa/0x200 [ 47.630696][ T1056] ? radix_tree_node_alloc+0x80/0x380 [ 47.636096][ T1056] __slab_alloc+0x49/0x90 [ 47.640450][ T1056] ? radix_tree_node_alloc+0x80/0x380 [ 47.645851][ T1056] kmem_cache_alloc+0x138/0x260 [ 47.650770][ T1056] radix_tree_node_alloc+0x80/0x380 [ 47.655997][ T1056] idr_get_free+0x2b1/0xab0 [ 47.660532][ T1056] ? trace_raw_output_percpu_destroy_chunk+0xc0/0xc0 [ 47.667240][ T1056] idr_alloc+0x176/0x2b0 [ 47.671513][ T1056] ? idr_alloc_u32+0x2e0/0x2e0 [ 47.676298][ T1056] ? mutex_lock+0x9b/0x1c0 [ 47.680738][ T1056] ppp_dev_configure+0x74b/0xac0 [ 47.685696][ T1056] ppp_ioctl+0x64b/0x1790 [ 47.690050][ T1056] ? ppp_poll+0x260/0x260 [ 47.694405][ T1056] ? security_file_ioctl+0x84/0xa0 [ 47.699568][ T1056] ? ppp_poll+0x260/0x260 [ 47.703913][ T1056] __se_sys_ioctl+0x121/0x1a0 [ 47.708623][ T1056] __x64_sys_ioctl+0x7b/0x90 [ 47.713253][ T1056] x64_sys_call+0x2f/0x9a0 [ 47.717798][ T1056] do_syscall_64+0x4c/0xa0 [ 47.722243][ T1056] ? clear_bhb_loop+0x50/0xa0 [ 47.726934][ T1056] ? clear_bhb_loop+0x50/0xa0 [ 47.731623][ T1056] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.737575][ T1056] RIP: 0033:0x7ff7986b8cb9 [ 47.742014][ T1056] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 47.761641][ T1056] RSP: 002b:00007ff797115028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 47.770094][ T1056] RAX: ffffffffffffffda RBX: 00007ff798933fa0 RCX: 00007ff7986b8cb9 [ 47.778066][ T1056] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000003 [ 47.786036][ T1056] RBP: 00007ff797115090 R08: 0000000000000000 R09: 0000000000000000 [ 47.794205][ T1056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 47.802184][ T1056] R13: 00007ff798934038 R14: 00007ff798933fa0 R15: 00007ffde179a6a8 [ 47.810188][ T1056] [ 47.894029][ T1057] device pim6reg1 entered promiscuous mode [ 47.911779][ T1059] device syzkaller0 entered promiscuous mode [ 48.895584][ T1100] FAULT_INJECTION: forcing a failure. [ 48.895584][ T1100] name failslab, interval 1, probability 0, space 0, times 0 [ 48.938169][ T1100] CPU: 0 PID: 1100 Comm: syz.2.223 Not tainted syzkaller #0 [ 48.945527][ T1100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 48.955605][ T1100] Call Trace: [ 48.958903][ T1100] [ 48.961854][ T1100] __dump_stack+0x21/0x30 [ 48.966200][ T1100] dump_stack_lvl+0x110/0x170 [ 48.970908][ T1100] ? show_regs_print_info+0x20/0x20 [ 48.976122][ T1100] dump_stack+0x15/0x20 [ 48.980287][ T1100] should_fail+0x3c1/0x510 [ 48.984715][ T1100] __should_failslab+0xa4/0xe0 [ 48.989505][ T1100] should_failslab+0x9/0x20 [ 48.994029][ T1100] slab_pre_alloc_hook+0x3b/0xe0 [ 48.998986][ T1100] ? kvasprintf_const+0xd7/0x240 [ 49.003951][ T1100] __kmalloc_track_caller+0x6c/0x2c0 [ 49.009245][ T1100] ? x64_sys_call+0x2f/0x9a0 [ 49.013844][ T1100] ? kvasprintf_const+0xd7/0x240 [ 49.018795][ T1100] kstrdup_const+0x55/0x90 [ 49.023235][ T1100] kvasprintf_const+0xd7/0x240 [ 49.028013][ T1100] kobject_set_name_vargs+0x61/0x110 [ 49.033319][ T1100] dev_set_name+0xdf/0x130 [ 49.037753][ T1100] ? get_device+0x30/0x30 [ 49.042101][ T1100] ? pm_runtime_init+0x258/0x330 [ 49.047058][ T1100] ? device_initialize+0x1e1/0x420 [ 49.052217][ T1100] netdev_register_kobject+0xb5/0x360 [ 49.057610][ T1100] ? raw_notifier_call_chain+0xe9/0x100 [ 49.063181][ T1100] register_netdevice+0xe85/0x1460 [ 49.068354][ T1100] ? netif_stacked_transfer_operstate+0x220/0x220 [ 49.074787][ T1100] ? mutex_unlock+0x8f/0x230 [ 49.079412][ T1100] ? __mutex_lock_slowpath+0x10/0x10 [ 49.084747][ T1100] ppp_dev_configure+0x814/0xac0 [ 49.089805][ T1100] ppp_ioctl+0x64b/0x1790 [ 49.094158][ T1100] ? ppp_poll+0x260/0x260 [ 49.098514][ T1100] ? security_file_ioctl+0x84/0xa0 [ 49.103652][ T1100] ? ppp_poll+0x260/0x260 [ 49.108001][ T1100] __se_sys_ioctl+0x121/0x1a0 [ 49.112700][ T1100] __x64_sys_ioctl+0x7b/0x90 [ 49.117327][ T1100] x64_sys_call+0x2f/0x9a0 [ 49.121753][ T1100] do_syscall_64+0x4c/0xa0 [ 49.126181][ T1100] ? clear_bhb_loop+0x50/0xa0 [ 49.130881][ T1100] ? clear_bhb_loop+0x50/0xa0 [ 49.135575][ T1100] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 49.141485][ T1100] RIP: 0033:0x7ff7986b8cb9 [ 49.145927][ T1100] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 49.165637][ T1100] RSP: 002b:00007ff797115028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 49.174064][ T1100] RAX: ffffffffffffffda RBX: 00007ff798933fa0 RCX: 00007ff7986b8cb9 [ 49.182075][ T1100] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000003 [ 49.190077][ T1100] RBP: 00007ff797115090 R08: 0000000000000000 R09: 0000000000000000 [ 49.198077][ T1100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 49.206069][ T1100] R13: 00007ff798934038 R14: 00007ff798933fa0 R15: 00007ffde179a6a8 [ 49.214113][ T1100] [ 50.328148][ T30] audit: type=1400 audit(1768848298.938:125): avc: denied { create } for pid=1136 comm="syz.0.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 51.630494][ T1067] syz.0.213 (1067) used greatest stack depth: 22592 bytes left [ 52.971452][ T1186] device pim6reg1 entered promiscuous mode [ 53.010120][ T1194] device sit0 left promiscuous mode [ 53.245791][ T1199] bond_slave_1: mtu less than device minimum [ 53.317504][ T1191] syz.1.252 (1191) used greatest stack depth: 22048 bytes left [ 54.589766][ T1228] device sit0 entered promiscuous mode [ 55.172734][ T1250] ÿÿÿÿÿÿ: renamed from vlan1 [ 56.499471][ T30] audit: type=1400 audit(1768848305.118:126): avc: denied { create } for pid=1286 comm="syz.2.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 57.653306][ T1320] device syzkaller0 entered promiscuous mode [ 60.149315][ T1410] device syzkaller0 entered promiscuous mode [ 60.991081][ T1441] syz.3.334 (1441) used greatest stack depth: 22008 bytes left [ 61.258084][ T1459] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.265324][ T1459] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.283978][ T30] audit: type=1400 audit(1768848309.898:127): avc: denied { create } for pid=1463 comm="syz.4.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 61.329962][ T1459] device bridge_slave_1 left promiscuous mode [ 61.336150][ T1459] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.369169][ T1459] device bridge_slave_0 left promiscuous mode [ 61.430015][ T1459] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.758469][ T1471] ÿÿÿÿÿÿ: renamed from vlan1 [ 62.657449][ T1490] FAULT_INJECTION: forcing a failure. [ 62.657449][ T1490] name failslab, interval 1, probability 0, space 0, times 0 [ 62.682371][ T1490] CPU: 1 PID: 1490 Comm: syz.4.348 Not tainted syzkaller #0 [ 62.690110][ T1490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 62.700568][ T1490] Call Trace: [ 62.704229][ T1490] [ 62.707180][ T1490] __dump_stack+0x21/0x30 [ 62.711983][ T1490] dump_stack_lvl+0x110/0x170 [ 62.717072][ T1490] ? show_regs_print_info+0x20/0x20 [ 62.722701][ T1490] ? __kasan_check_write+0x14/0x20 [ 62.727832][ T1490] ? _raw_spin_lock+0x94/0xf0 [ 62.732531][ T1490] dump_stack+0x15/0x20 [ 62.736690][ T1490] should_fail+0x3c1/0x510 [ 62.741145][ T1490] __should_failslab+0xa4/0xe0 [ 62.745912][ T1490] should_failslab+0x9/0x20 [ 62.750458][ T1490] slab_pre_alloc_hook+0x3b/0xe0 [ 62.755419][ T1490] ? __kernfs_new_node+0xe3/0x6b0 [ 62.760445][ T1490] kmem_cache_alloc+0x44/0x260 [ 62.765216][ T1490] __kernfs_new_node+0xe3/0x6b0 [ 62.770166][ T1490] ? kernfs_activate+0x362/0x380 [ 62.775122][ T1490] ? kernfs_new_node+0x260/0x260 [ 62.780063][ T1490] ? __kernfs_create_file+0x1ff/0x270 [ 62.785440][ T1490] kernfs_new_node+0x150/0x260 [ 62.790211][ T1490] kernfs_create_link+0xa4/0x200 [ 62.795179][ T1490] sysfs_do_create_link_sd+0x8a/0x110 [ 62.800558][ T1490] sysfs_create_link+0x68/0x80 [ 62.805328][ T1490] device_add+0x5ab/0xed0 [ 62.809674][ T1490] netdev_register_kobject+0x1bc/0x360 [ 62.815178][ T1490] ? raw_notifier_call_chain+0xe9/0x100 [ 62.820731][ T1490] register_netdevice+0xe85/0x1460 [ 62.825850][ T1490] ? netif_stacked_transfer_operstate+0x220/0x220 [ 62.832271][ T1490] ? mutex_unlock+0x8f/0x230 [ 62.836873][ T1490] ? __mutex_lock_slowpath+0x10/0x10 [ 62.842167][ T1490] ppp_dev_configure+0x814/0xac0 [ 62.847117][ T1490] ppp_ioctl+0x64b/0x1790 [ 62.851455][ T1490] ? ppp_poll+0x260/0x260 [ 62.855796][ T1490] ? security_file_ioctl+0x84/0xa0 [ 62.860914][ T1490] ? ppp_poll+0x260/0x260 [ 62.865250][ T1490] __se_sys_ioctl+0x121/0x1a0 [ 62.869958][ T1490] __x64_sys_ioctl+0x7b/0x90 [ 62.874564][ T1490] x64_sys_call+0x2f/0x9a0 [ 62.878985][ T1490] do_syscall_64+0x4c/0xa0 [ 62.883411][ T1490] ? clear_bhb_loop+0x50/0xa0 [ 62.888100][ T1490] ? clear_bhb_loop+0x50/0xa0 [ 62.892789][ T1490] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 62.898710][ T1490] RIP: 0033:0x7f30d6127cb9 [ 62.903131][ T1490] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 62.922764][ T1490] RSP: 002b:00007f30d4b84028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 62.931196][ T1490] RAX: ffffffffffffffda RBX: 00007f30d63a2fa0 RCX: 00007f30d6127cb9 [ 62.939172][ T1490] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000003 [ 62.947150][ T1490] RBP: 00007f30d4b84090 R08: 0000000000000000 R09: 0000000000000000 [ 62.955127][ T1490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 62.963106][ T1490] R13: 00007f30d63a3038 R14: 00007f30d63a2fa0 R15: 00007ffd721c0718 [ 62.971105][ T1490] [ 63.797289][ T1494] syz.2.350 (1494) used greatest stack depth: 21304 bytes left [ 64.306274][ T1516] device pim6reg1 entered promiscuous mode [ 64.426037][ T1518] syz.4.357[1518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.426103][ T1518] syz.4.357[1518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.308973][ T30] audit: type=1400 audit(1768848313.928:128): avc: denied { create } for pid=1537 comm="syz.2.363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 65.522811][ T1540] syz.4.364[1540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.522894][ T1540] syz.4.364[1540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.782968][ T1566] ÿÿÿ: renamed from bond_slave_0 [ 67.089598][ T1613] device pim6reg1 entered promiscuous mode [ 67.175786][ T1614] device pim6reg1 entered promiscuous mode [ 68.517141][ T1633] device syzkaller0 entered promiscuous mode [ 68.708952][ T1629] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.751996][ T1629] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.812086][ T1629] device bridge_slave_0 entered promiscuous mode [ 68.917976][ T1629] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.966647][ T1629] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.016529][ T1629] device bridge_slave_1 entered promiscuous mode [ 69.332396][ T30] audit: type=1400 audit(1768848317.948:129): avc: denied { create } for pid=1629 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 69.370672][ T1678] syz.3.409[1678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.372024][ T1678] syz.3.409[1678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.393513][ T30] audit: type=1400 audit(1768848317.948:130): avc: denied { write } for pid=1629 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 69.596506][ T30] audit: type=1400 audit(1768848317.948:131): avc: denied { read } for pid=1629 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 69.880607][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 69.899023][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 69.916751][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.924633][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.944527][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 69.963927][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 69.983101][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.990205][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.021127][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.039848][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.110445][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.117583][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.133899][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.152495][ T1684] device veth0_vlan left promiscuous mode [ 70.167489][ T1684] device veth0_vlan entered promiscuous mode [ 70.271590][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 70.285699][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 70.307474][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 70.332565][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 70.356597][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 70.381380][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 70.406355][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 70.430597][ T1629] device veth0_vlan entered promiscuous mode [ 70.499399][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 70.513234][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 70.575885][ T1629] device veth1_macvtap entered promiscuous mode [ 70.642211][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 70.654428][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 70.683075][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 70.720857][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 70.754134][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 71.049467][ T30] audit: type=1400 audit(1768848319.668:132): avc: denied { create } for pid=1720 comm="syz.3.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 71.280398][ T1732] device syzkaller0 entered promiscuous mode [ 72.742824][ T30] audit: type=1400 audit(1768848321.358:133): avc: denied { create } for pid=1755 comm="syz.2.431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 73.066716][ T1769] device pim6reg1 entered promiscuous mode [ 74.094480][ T1810] device pim6reg1 entered promiscuous mode [ 74.222454][ T1815] FAULT_INJECTION: forcing a failure. [ 74.222454][ T1815] name failslab, interval 1, probability 0, space 0, times 0 [ 74.294192][ T1815] CPU: 1 PID: 1815 Comm: syz.5.451 Not tainted syzkaller #0 [ 74.301634][ T1815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 74.311705][ T1815] Call Trace: [ 74.314997][ T1815] [ 74.317934][ T1815] __dump_stack+0x21/0x30 [ 74.322284][ T1815] dump_stack_lvl+0x110/0x170 [ 74.326975][ T1815] ? show_regs_print_info+0x20/0x20 [ 74.332193][ T1815] ? kernfs_xattr_get+0x81/0x90 [ 74.337066][ T1815] dump_stack+0x15/0x20 [ 74.341239][ T1815] should_fail+0x3c1/0x510 [ 74.345670][ T1815] __should_failslab+0xa4/0xe0 [ 74.350439][ T1815] should_failslab+0x9/0x20 [ 74.354950][ T1815] slab_pre_alloc_hook+0x3b/0xe0 [ 74.359911][ T1815] ? __kernfs_new_node+0xe3/0x6b0 [ 74.364950][ T1815] kmem_cache_alloc+0x44/0x260 [ 74.369730][ T1815] __kernfs_new_node+0xe3/0x6b0 [ 74.374608][ T1815] ? rwsem_write_trylock+0x136/0x300 [ 74.379900][ T1815] ? clear_nonspinnable+0x60/0x60 [ 74.384927][ T1815] ? kernfs_new_node+0x260/0x260 [ 74.389877][ T1815] ? rwsem_write_trylock+0x136/0x300 [ 74.395169][ T1815] ? up_write+0x7b/0x290 [ 74.399415][ T1815] kernfs_new_node+0x150/0x260 [ 74.404187][ T1815] __kernfs_create_file+0x4e/0x270 [ 74.409309][ T1815] sysfs_add_file_mode_ns+0x29a/0x350 [ 74.414690][ T1815] internal_create_group+0x495/0xd00 [ 74.419983][ T1815] ? up_write+0x7b/0x290 [ 74.424241][ T1815] ? sysfs_create_group+0x30/0x30 [ 74.429293][ T1815] ? __kasan_check_write+0x14/0x20 [ 74.434413][ T1815] ? kernfs_put+0x449/0x480 [ 74.438914][ T1815] sysfs_create_groups+0x58/0x120 [ 74.443940][ T1815] device_add_attrs+0x8c/0x700 [ 74.448718][ T1815] device_add+0x5e3/0xed0 [ 74.453060][ T1815] netdev_register_kobject+0x1bc/0x360 [ 74.458526][ T1815] ? raw_notifier_call_chain+0xe9/0x100 [ 74.464090][ T1815] register_netdevice+0xe85/0x1460 [ 74.469219][ T1815] ? netif_stacked_transfer_operstate+0x220/0x220 [ 74.475643][ T1815] ? mutex_unlock+0x8f/0x230 [ 74.480237][ T1815] ? __mutex_lock_slowpath+0x10/0x10 [ 74.485530][ T1815] ppp_dev_configure+0x814/0xac0 [ 74.490492][ T1815] ppp_ioctl+0x64b/0x1790 [ 74.494934][ T1815] ? ppp_poll+0x260/0x260 [ 74.499277][ T1815] ? security_file_ioctl+0x84/0xa0 [ 74.504392][ T1815] ? ppp_poll+0x260/0x260 [ 74.508724][ T1815] __se_sys_ioctl+0x121/0x1a0 [ 74.513671][ T1815] __x64_sys_ioctl+0x7b/0x90 [ 74.518264][ T1815] x64_sys_call+0x2f/0x9a0 [ 74.522690][ T1815] do_syscall_64+0x4c/0xa0 [ 74.527103][ T1815] ? clear_bhb_loop+0x50/0xa0 [ 74.531779][ T1815] ? clear_bhb_loop+0x50/0xa0 [ 74.536463][ T1815] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 74.542388][ T1815] RIP: 0033:0x7f5740fd8cb9 [ 74.546811][ T1815] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 74.566514][ T1815] RSP: 002b:00007f573fa35028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 74.574954][ T1815] RAX: ffffffffffffffda RBX: 00007f5741253fa0 RCX: 00007f5740fd8cb9 [ 74.582949][ T1815] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000003 [ 74.590926][ T1815] RBP: 00007f573fa35090 R08: 0000000000000000 R09: 0000000000000000 [ 74.598913][ T1815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 74.606974][ T1815] R13: 00007f5741254038 R14: 00007f5741253fa0 R15: 00007fff00c440a8 [ 74.614960][ T1815] [ 74.996903][ T1819] device syzkaller0 entered promiscuous mode [ 75.430339][ T1832] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.438856][ T1832] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.503479][ T30] audit: type=1400 audit(1768848324.118:134): avc: denied { ioctl } for pid=1833 comm="syz.2.459" path="socket:[21732]" dev="sockfs" ino=21732 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 75.551407][ T1832] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.558650][ T1832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.568105][ T1832] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.575520][ T1832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.626855][ T1832] device bridge0 entered promiscuous mode [ 75.901752][ T1861] device syzkaller0 entered promiscuous mode [ 75.973036][ T1869] device pim6reg1 entered promiscuous mode [ 76.020741][ T1875] device pim6reg1 entered promiscuous mode [ 76.169819][ T30] audit: type=1400 audit(1768848324.788:135): avc: denied { write } for pid=1877 comm="syz.4.470" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 77.180964][ T1910] device pim6reg1 entered promiscuous mode [ 77.313504][ T1916] device sit0 entered promiscuous mode [ 78.535195][ T30] audit: type=1400 audit(1768848327.148:136): avc: denied { create } for pid=1950 comm="syz.1.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 78.619331][ T1947] device sit0 entered promiscuous mode [ 79.475655][ T1986] device pim6reg1 entered promiscuous mode [ 79.544148][ T30] audit: type=1400 audit(1768848328.158:137): avc: denied { attach_queue } for pid=1973 comm="syz.3.501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 79.933036][ T2003] device sit0 entered promiscuous mode [ 80.554047][ T2010] bond_slave_1: mtu less than device minimum [ 80.733399][ T2034] syz.4.514[2034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.733488][ T2034] syz.4.514[2034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.805299][ T2033] device pim6reg1 entered promiscuous mode [ 82.562346][ T2086] device pim6reg1 entered promiscuous mode [ 83.179286][ T2101] device pim6reg1 entered promiscuous mode [ 83.858947][ T2124] FAULT_INJECTION: forcing a failure. [ 83.858947][ T2124] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 83.996536][ T2124] CPU: 1 PID: 2124 Comm: syz.2.544 Not tainted syzkaller #0 [ 84.003906][ T2124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 84.013985][ T2124] Call Trace: [ 84.017288][ T2124] [ 84.020236][ T2124] __dump_stack+0x21/0x30 [ 84.024591][ T2124] dump_stack_lvl+0x110/0x170 [ 84.029300][ T2124] ? show_regs_print_info+0x20/0x20 [ 84.034558][ T2124] ? vfs_write+0xc72/0xfd0 [ 84.039018][ T2124] dump_stack+0x15/0x20 [ 84.043192][ T2124] should_fail+0x3c1/0x510 [ 84.047642][ T2124] should_fail_usercopy+0x1a/0x20 [ 84.052686][ T2124] _copy_from_user+0x20/0xd0 [ 84.057300][ T2124] __sys_bpf+0x258/0x7d0 [ 84.061653][ T2124] ? bpf_link_show_fdinfo+0x330/0x330 [ 84.067047][ T2124] ? debug_smp_processor_id+0x17/0x20 [ 84.072430][ T2124] __x64_sys_bpf+0x7c/0x90 [ 84.076858][ T2124] x64_sys_call+0x4b9/0x9a0 [ 84.081375][ T2124] do_syscall_64+0x4c/0xa0 [ 84.085810][ T2124] ? clear_bhb_loop+0x50/0xa0 [ 84.090548][ T2124] ? clear_bhb_loop+0x50/0xa0 [ 84.095241][ T2124] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 84.101154][ T2124] RIP: 0033:0x7ff7986b8cb9 [ 84.105587][ T2124] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 84.125203][ T2124] RSP: 002b:00007ff797115028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 84.133635][ T2124] RAX: ffffffffffffffda RBX: 00007ff798933fa0 RCX: 00007ff7986b8cb9 [ 84.141616][ T2124] RDX: 0000000000000020 RSI: 00002000000004c0 RDI: 0000000000000004 [ 84.149613][ T2124] RBP: 00007ff797115090 R08: 0000000000000000 R09: 0000000000000000 [ 84.157607][ T2124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.165600][ T2124] R13: 00007ff798934038 R14: 00007ff798933fa0 R15: 00007ffde179a6a8 [ 84.173594][ T2124] [ 84.385595][ T2135] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.392833][ T2135] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.064870][ T2159] device pim6reg1 entered promiscuous mode [ 85.337786][ T2168] syz.1.555 uses obsolete (PF_INET,SOCK_PACKET) [ 85.409509][ T2172] FAULT_INJECTION: forcing a failure. [ 85.409509][ T2172] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 85.516603][ T2172] CPU: 1 PID: 2172 Comm: syz.2.558 Not tainted syzkaller #0 [ 85.524146][ T2172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 85.534220][ T2172] Call Trace: [ 85.537519][ T2172] [ 85.540469][ T2172] __dump_stack+0x21/0x30 [ 85.544828][ T2172] dump_stack_lvl+0x110/0x170 [ 85.549625][ T2172] ? show_regs_print_info+0x20/0x20 [ 85.554851][ T2172] ? vfs_write+0xc72/0xfd0 [ 85.559286][ T2172] dump_stack+0x15/0x20 [ 85.563460][ T2172] should_fail+0x3c1/0x510 [ 85.568072][ T2172] should_fail_usercopy+0x1a/0x20 [ 85.573111][ T2172] _copy_from_user+0x20/0xd0 [ 85.577715][ T2172] __sys_bpf+0x258/0x7d0 [ 85.582060][ T2172] ? bpf_link_show_fdinfo+0x330/0x330 [ 85.587479][ T2172] ? debug_smp_processor_id+0x17/0x20 [ 85.592871][ T2172] __x64_sys_bpf+0x7c/0x90 [ 85.597296][ T2172] x64_sys_call+0x4b9/0x9a0 [ 85.601806][ T2172] do_syscall_64+0x4c/0xa0 [ 85.606235][ T2172] ? clear_bhb_loop+0x50/0xa0 [ 85.610967][ T2172] ? clear_bhb_loop+0x50/0xa0 [ 85.615662][ T2172] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 85.621583][ T2172] RIP: 0033:0x7ff7986b8cb9 [ 85.626010][ T2172] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 85.645636][ T2172] RSP: 002b:00007ff797115028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 85.654073][ T2172] RAX: ffffffffffffffda RBX: 00007ff798933fa0 RCX: 00007ff7986b8cb9 [ 85.662078][ T2172] RDX: 0000000000000020 RSI: 00002000000004c0 RDI: 0000000000000004 [ 85.670049][ T2172] RBP: 00007ff797115090 R08: 0000000000000000 R09: 0000000000000000 [ 85.678023][ T2172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 85.686023][ T2172] R13: 00007ff798934038 R14: 00007ff798933fa0 R15: 00007ffde179a6a8 [ 85.694105][ T2172] [ 86.277672][ T2206] device pim6reg1 entered promiscuous mode [ 86.993910][ T2227] FAULT_INJECTION: forcing a failure. [ 86.993910][ T2227] name failslab, interval 1, probability 0, space 0, times 0 [ 87.185046][ T2227] CPU: 0 PID: 2227 Comm: syz.3.573 Not tainted syzkaller #0 [ 87.192392][ T2227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 87.202475][ T2227] Call Trace: [ 87.205767][ T2227] [ 87.208731][ T2227] __dump_stack+0x21/0x30 [ 87.213089][ T2227] dump_stack_lvl+0x110/0x170 [ 87.217790][ T2227] ? show_regs_print_info+0x20/0x20 [ 87.223009][ T2227] ? kstrtouint_from_user+0x1c4/0x220 [ 87.228494][ T2227] dump_stack+0x15/0x20 [ 87.232675][ T2227] should_fail+0x3c1/0x510 [ 87.237129][ T2227] __should_failslab+0xa4/0xe0 [ 87.241925][ T2227] should_failslab+0x9/0x20 [ 87.246469][ T2227] slab_pre_alloc_hook+0x3b/0xe0 [ 87.251442][ T2227] __kmalloc+0x6d/0x2c0 [ 87.255631][ T2227] ? kvmalloc_node+0x211/0x320 [ 87.260414][ T2227] kvmalloc_node+0x211/0x320 [ 87.265036][ T2227] ? vm_mmap+0xb0/0xb0 [ 87.269214][ T2227] ? __fdget+0x1a1/0x230 [ 87.273485][ T2227] map_get_next_key+0x279/0x4c0 [ 87.278361][ T2227] __sys_bpf+0x3d0/0x7d0 [ 87.282629][ T2227] ? bpf_link_show_fdinfo+0x330/0x330 [ 87.288023][ T2227] ? debug_smp_processor_id+0x17/0x20 [ 87.293423][ T2227] __x64_sys_bpf+0x7c/0x90 [ 87.297866][ T2227] x64_sys_call+0x4b9/0x9a0 [ 87.302392][ T2227] do_syscall_64+0x4c/0xa0 [ 87.306821][ T2227] ? clear_bhb_loop+0x50/0xa0 [ 87.311512][ T2227] ? clear_bhb_loop+0x50/0xa0 [ 87.316206][ T2227] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 87.322113][ T2227] RIP: 0033:0x7f14b942fcb9 [ 87.326541][ T2227] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 87.346159][ T2227] RSP: 002b:00007f14b7e8c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 87.354602][ T2227] RAX: ffffffffffffffda RBX: 00007f14b96aafa0 RCX: 00007f14b942fcb9 [ 87.362614][ T2227] RDX: 0000000000000020 RSI: 00002000000004c0 RDI: 0000000000000004 [ 87.370651][ T2227] RBP: 00007f14b7e8c090 R08: 0000000000000000 R09: 0000000000000000 [ 87.378649][ T2227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 87.386648][ T2227] R13: 00007f14b96ab038 R14: 00007f14b96aafa0 R15: 00007fff6cfbafc8 [ 87.394648][ T2227] [ 87.506684][ T30] audit: type=1400 audit(1768848336.118:138): avc: denied { create } for pid=2232 comm="syz.5.577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 87.720508][ T2251] device pim6reg1 entered promiscuous mode [ 89.137981][ T30] audit: type=1400 audit(1768848337.758:139): avc: denied { create } for pid=2294 comm="syz.5.599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 90.016306][ T2322] syz.5.606[2322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.016373][ T2322] syz.5.606[2322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.979293][ T30] audit: type=1400 audit(1768848339.598:140): avc: denied { ioctl } for pid=2372 comm="syz.3.620" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5460 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 91.207290][ T30] audit: type=1400 audit(1768848339.808:141): avc: denied { create } for pid=2386 comm="syz.4.624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 91.406949][ T2390] device sit0 left promiscuous mode [ 91.420132][ T2391] device veth1_macvtap left promiscuous mode [ 91.431002][ T2393] device sit0 entered promiscuous mode [ 91.716582][ T2395] device pim6reg1 entered promiscuous mode [ 92.792872][ T30] audit: type=1400 audit(1768848341.408:142): avc: denied { create } for pid=2431 comm="syz.1.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 93.598553][ T2453] device pim6reg1 entered promiscuous mode [ 94.487812][ T2488] device team_slave_1 entered promiscuous mode [ 94.577646][ T30] audit: type=1400 audit(1768848343.188:143): avc: denied { create } for pid=2485 comm="syz.5.651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 94.617809][ T478] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 94.626130][ T478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 94.918068][ T2498] device pim6reg1 entered promiscuous mode [ 95.331608][ T2530] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 95.362391][ T2530] syzkaller0: linktype set to 778 [ 95.378090][ T2532] device wg2 entered promiscuous mode [ 95.394995][ T2530] device sit0 left promiscuous mode [ 95.430538][ T2530] device sit0 entered promiscuous mode [ 96.337081][ T2561] syz.2.672[2561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.337163][ T2561] syz.2.672[2561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.426686][ T2561] syz.2.672 (2561) used obsolete PPPIOCDETACH ioctl [ 96.853064][ T30] audit: type=1400 audit(1768848345.468:144): avc: denied { create } for pid=2600 comm="syz.4.684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 96.945299][ T2588] device syzkaller0 entered promiscuous mode [ 100.053988][ T2694] device pim6reg1 entered promiscuous mode [ 101.426482][ T30] audit: type=1400 audit(1768848350.038:145): avc: denied { create } for pid=2714 comm="syz.1.716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 102.812827][ T2740] device veth0_vlan left promiscuous mode [ 102.854323][ T2740] device veth0_vlan entered promiscuous mode [ 102.924285][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 102.947591][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 102.982222][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 102.995512][ T30] audit: type=1400 audit(1768848351.608:146): avc: denied { create } for pid=2749 comm="syz.2.727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 103.039605][ T2747] device pim6reg1 entered promiscuous mode [ 103.069785][ T2745] device pim6reg1 entered promiscuous mode [ 103.091728][ T30] audit: type=1400 audit(1768848351.638:147): avc: denied { create } for pid=2749 comm="syz.2.727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 103.923860][ T2788] FAULT_INJECTION: forcing a failure. [ 103.923860][ T2788] name failslab, interval 1, probability 0, space 0, times 0 [ 103.941670][ T2788] CPU: 1 PID: 2788 Comm: syz.1.738 Not tainted syzkaller #0 [ 103.949006][ T2788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 103.959074][ T2788] Call Trace: [ 103.962358][ T2788] [ 103.965295][ T2788] __dump_stack+0x21/0x30 [ 103.969634][ T2788] dump_stack_lvl+0x110/0x170 [ 103.974317][ T2788] ? show_regs_print_info+0x20/0x20 [ 103.979517][ T2788] ? kernfs_xattr_get+0x81/0x90 [ 103.984373][ T2788] dump_stack+0x15/0x20 [ 103.988537][ T2788] should_fail+0x3c1/0x510 [ 103.992969][ T2788] __should_failslab+0xa4/0xe0 [ 103.997739][ T2788] should_failslab+0x9/0x20 [ 104.002251][ T2788] slab_pre_alloc_hook+0x3b/0xe0 [ 104.007194][ T2788] ? __kernfs_new_node+0xe3/0x6b0 [ 104.012233][ T2788] kmem_cache_alloc+0x44/0x260 [ 104.017014][ T2788] __kernfs_new_node+0xe3/0x6b0 [ 104.021876][ T2788] ? rwsem_write_trylock+0x136/0x300 [ 104.027183][ T2788] ? clear_nonspinnable+0x60/0x60 [ 104.032217][ T2788] ? kernfs_new_node+0x260/0x260 [ 104.037162][ T2788] ? rwsem_write_trylock+0x136/0x300 [ 104.042449][ T2788] ? up_write+0x7b/0x290 [ 104.046696][ T2788] kernfs_new_node+0x150/0x260 [ 104.051468][ T2788] __kernfs_create_file+0x4e/0x270 [ 104.056588][ T2788] sysfs_add_file_mode_ns+0x29a/0x350 [ 104.061962][ T2788] internal_create_group+0x495/0xd00 [ 104.067249][ T2788] ? up_write+0x7b/0x290 [ 104.071504][ T2788] ? sysfs_create_group+0x30/0x30 [ 104.076552][ T2788] ? __kasan_check_write+0x14/0x20 [ 104.081686][ T2788] ? kernfs_put+0x449/0x480 [ 104.086198][ T2788] sysfs_create_groups+0x58/0x120 [ 104.091235][ T2788] device_add_attrs+0x8c/0x700 [ 104.096016][ T2788] device_add+0x5e3/0xed0 [ 104.100370][ T2788] netdev_register_kobject+0x1bc/0x360 [ 104.105844][ T2788] ? raw_notifier_call_chain+0xe9/0x100 [ 104.111394][ T2788] register_netdevice+0xe85/0x1460 [ 104.116511][ T2788] ? netif_stacked_transfer_operstate+0x220/0x220 [ 104.124940][ T2788] ? mutex_unlock+0x8f/0x230 [ 104.129539][ T2788] ? __mutex_lock_slowpath+0x10/0x10 [ 104.134835][ T2788] ppp_dev_configure+0x814/0xac0 [ 104.139782][ T2788] ppp_ioctl+0x64b/0x1790 [ 104.144122][ T2788] ? ppp_poll+0x260/0x260 [ 104.148460][ T2788] ? security_file_ioctl+0x84/0xa0 [ 104.153583][ T2788] ? ppp_poll+0x260/0x260 [ 104.157927][ T2788] __se_sys_ioctl+0x121/0x1a0 [ 104.162612][ T2788] __x64_sys_ioctl+0x7b/0x90 [ 104.167219][ T2788] x64_sys_call+0x2f/0x9a0 [ 104.171657][ T2788] do_syscall_64+0x4c/0xa0 [ 104.176080][ T2788] ? clear_bhb_loop+0x50/0xa0 [ 104.180757][ T2788] ? clear_bhb_loop+0x50/0xa0 [ 104.185437][ T2788] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 104.191341][ T2788] RIP: 0033:0x7f8ee2496cb9 [ 104.195761][ T2788] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 104.215373][ T2788] RSP: 002b:00007f8ee0ef3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 104.223795][ T2788] RAX: ffffffffffffffda RBX: 00007f8ee2711fa0 RCX: 00007f8ee2496cb9 [ 104.231770][ T2788] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000003 [ 104.239754][ T2788] RBP: 00007f8ee0ef3090 R08: 0000000000000000 R09: 0000000000000000 [ 104.247734][ T2788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 104.255707][ T2788] R13: 00007f8ee2712038 R14: 00007f8ee2711fa0 R15: 00007ffd8b0f7a08 [ 104.263688][ T2788] [ 104.273658][ T2791] syz.3.740[2791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.273721][ T2791] syz.3.740[2791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.336856][ T2793] device pim6reg1 entered promiscuous mode [ 104.801245][ T2825] device pim6reg1 entered promiscuous mode [ 105.322623][ T2844] device pim6reg1 entered promiscuous mode [ 105.362520][ T2846] FAULT_INJECTION: forcing a failure. [ 105.362520][ T2846] name failslab, interval 1, probability 0, space 0, times 0 [ 105.387390][ T2846] CPU: 1 PID: 2846 Comm: syz.2.755 Not tainted syzkaller #0 [ 105.394748][ T2846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 105.404821][ T2846] Call Trace: [ 105.408118][ T2846] [ 105.411068][ T2846] __dump_stack+0x21/0x30 [ 105.415422][ T2846] dump_stack_lvl+0x110/0x170 [ 105.420133][ T2846] ? show_regs_print_info+0x20/0x20 [ 105.425350][ T2846] ? kernfs_xattr_get+0x81/0x90 [ 105.430235][ T2846] dump_stack+0x15/0x20 [ 105.434403][ T2846] should_fail+0x3c1/0x510 [ 105.438840][ T2846] __should_failslab+0xa4/0xe0 [ 105.443619][ T2846] should_failslab+0x9/0x20 [ 105.448141][ T2846] slab_pre_alloc_hook+0x3b/0xe0 [ 105.453101][ T2846] ? __kernfs_new_node+0xe3/0x6b0 [ 105.458137][ T2846] kmem_cache_alloc+0x44/0x260 [ 105.462921][ T2846] __kernfs_new_node+0xe3/0x6b0 [ 105.467782][ T2846] ? rwsem_write_trylock+0x136/0x300 [ 105.473091][ T2846] ? clear_nonspinnable+0x60/0x60 [ 105.478134][ T2846] ? kernfs_new_node+0x260/0x260 [ 105.483090][ T2846] ? rwsem_write_trylock+0x136/0x300 [ 105.488388][ T2846] ? up_write+0x7b/0x290 [ 105.492664][ T2846] kernfs_new_node+0x150/0x260 [ 105.497510][ T2846] __kernfs_create_file+0x4e/0x270 [ 105.502646][ T2846] sysfs_add_file_mode_ns+0x29a/0x350 [ 105.508039][ T2846] internal_create_group+0x495/0xd00 [ 105.513348][ T2846] ? up_write+0x7b/0x290 [ 105.517619][ T2846] ? sysfs_create_group+0x30/0x30 [ 105.522673][ T2846] ? __kasan_check_write+0x14/0x20 [ 105.527813][ T2846] ? kernfs_put+0x449/0x480 [ 105.532341][ T2846] sysfs_create_groups+0x58/0x120 [ 105.537388][ T2846] device_add_attrs+0x8c/0x700 [ 105.542184][ T2846] device_add+0x5e3/0xed0 [ 105.546562][ T2846] netdev_register_kobject+0x1bc/0x360 [ 105.552046][ T2846] ? raw_notifier_call_chain+0xe9/0x100 [ 105.557614][ T2846] register_netdevice+0xe85/0x1460 [ 105.562758][ T2846] ? netif_stacked_transfer_operstate+0x220/0x220 [ 105.569202][ T2846] ? mutex_unlock+0x8f/0x230 [ 105.573814][ T2846] ? __mutex_lock_slowpath+0x10/0x10 [ 105.579216][ T2846] ppp_dev_configure+0x814/0xac0 [ 105.584181][ T2846] ppp_ioctl+0x64b/0x1790 [ 105.588538][ T2846] ? ppp_poll+0x260/0x260 [ 105.592913][ T2846] ? security_file_ioctl+0x84/0xa0 [ 105.598049][ T2846] ? ppp_poll+0x260/0x260 [ 105.602398][ T2846] __se_sys_ioctl+0x121/0x1a0 [ 105.607095][ T2846] __x64_sys_ioctl+0x7b/0x90 [ 105.611717][ T2846] x64_sys_call+0x2f/0x9a0 [ 105.616150][ T2846] do_syscall_64+0x4c/0xa0 [ 105.620602][ T2846] ? clear_bhb_loop+0x50/0xa0 [ 105.625294][ T2846] ? clear_bhb_loop+0x50/0xa0 [ 105.630007][ T2846] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 105.635946][ T2846] RIP: 0033:0x7ff7986b8cb9 [ 105.640372][ T2846] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 105.659997][ T2846] RSP: 002b:00007ff797115028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 105.668429][ T2846] RAX: ffffffffffffffda RBX: 00007ff798933fa0 RCX: 00007ff7986b8cb9 [ 105.676418][ T2846] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000003 [ 105.684400][ T2846] RBP: 00007ff797115090 R08: 0000000000000000 R09: 0000000000000000 [ 105.692385][ T2846] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 105.700371][ T2846] R13: 00007ff798934038 R14: 00007ff798933fa0 R15: 00007ffde179a6a8 [ 105.708364][ T2846] [ 106.288400][ T2856] device syzkaller0 entered promiscuous mode [ 106.683906][ T2881] FAULT_INJECTION: forcing a failure. [ 106.683906][ T2881] name failslab, interval 1, probability 0, space 0, times 0 [ 106.716520][ T2881] CPU: 1 PID: 2881 Comm: syz.3.766 Not tainted syzkaller #0 [ 106.723864][ T2881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 106.733924][ T2881] Call Trace: [ 106.737235][ T2881] [ 106.740180][ T2881] __dump_stack+0x21/0x30 [ 106.744528][ T2881] dump_stack_lvl+0x110/0x170 [ 106.749217][ T2881] ? show_regs_print_info+0x20/0x20 [ 106.754431][ T2881] ? kernfs_xattr_get+0x81/0x90 [ 106.759292][ T2881] dump_stack+0x15/0x20 [ 106.763458][ T2881] should_fail+0x3c1/0x510 [ 106.767917][ T2881] __should_failslab+0xa4/0xe0 [ 106.772700][ T2881] should_failslab+0x9/0x20 [ 106.777221][ T2881] slab_pre_alloc_hook+0x3b/0xe0 [ 106.782166][ T2881] ? __kernfs_new_node+0xe3/0x6b0 [ 106.787193][ T2881] kmem_cache_alloc+0x44/0x260 [ 106.791971][ T2881] __kernfs_new_node+0xe3/0x6b0 [ 106.796827][ T2881] ? rwsem_write_trylock+0x136/0x300 [ 106.802115][ T2881] ? clear_nonspinnable+0x60/0x60 [ 106.807151][ T2881] ? kernfs_new_node+0x260/0x260 [ 106.812096][ T2881] ? rwsem_write_trylock+0x136/0x300 [ 106.817497][ T2881] ? up_write+0x7b/0x290 [ 106.821744][ T2881] kernfs_new_node+0x150/0x260 [ 106.826635][ T2881] __kernfs_create_file+0x4e/0x270 [ 106.831781][ T2881] sysfs_add_file_mode_ns+0x29a/0x350 [ 106.837180][ T2881] internal_create_group+0x495/0xd00 [ 106.842494][ T2881] ? up_write+0x7b/0x290 [ 106.846743][ T2881] ? sysfs_create_group+0x30/0x30 [ 106.851776][ T2881] ? __kasan_check_write+0x14/0x20 [ 106.856892][ T2881] ? kernfs_put+0x449/0x480 [ 106.861400][ T2881] sysfs_create_groups+0x58/0x120 [ 106.866436][ T2881] device_add_attrs+0x8c/0x700 [ 106.871212][ T2881] device_add+0x5e3/0xed0 [ 106.875545][ T2881] netdev_register_kobject+0x1bc/0x360 [ 106.881001][ T2881] ? raw_notifier_call_chain+0xe9/0x100 [ 106.886555][ T2881] register_netdevice+0xe85/0x1460 [ 106.891674][ T2881] ? netif_stacked_transfer_operstate+0x220/0x220 [ 106.898099][ T2881] ? mutex_unlock+0x8f/0x230 [ 106.902702][ T2881] ? __mutex_lock_slowpath+0x10/0x10 [ 106.907992][ T2881] ppp_dev_configure+0x814/0xac0 [ 106.912946][ T2881] ppp_ioctl+0x64b/0x1790 [ 106.917298][ T2881] ? ppp_poll+0x260/0x260 [ 106.921642][ T2881] ? security_file_ioctl+0x84/0xa0 [ 106.926767][ T2881] ? ppp_poll+0x260/0x260 [ 106.931127][ T2881] __se_sys_ioctl+0x121/0x1a0 [ 106.935807][ T2881] __x64_sys_ioctl+0x7b/0x90 [ 106.940402][ T2881] x64_sys_call+0x2f/0x9a0 [ 106.944814][ T2881] do_syscall_64+0x4c/0xa0 [ 106.949235][ T2881] ? clear_bhb_loop+0x50/0xa0 [ 106.953908][ T2881] ? clear_bhb_loop+0x50/0xa0 [ 106.958611][ T2881] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 106.964530][ T2881] RIP: 0033:0x7f14b942fcb9 [ 106.968951][ T2881] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 106.988687][ T2881] RSP: 002b:00007f14b7e8c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 106.997129][ T2881] RAX: ffffffffffffffda RBX: 00007f14b96aafa0 RCX: 00007f14b942fcb9 [ 107.005115][ T2881] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000003 [ 107.013095][ T2881] RBP: 00007f14b7e8c090 R08: 0000000000000000 R09: 0000000000000000 [ 107.021073][ T2881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 107.029062][ T2881] R13: 00007f14b96ab038 R14: 00007f14b96aafa0 R15: 00007fff6cfbafc8 [ 107.037046][ T2881] [ 107.048034][ T2875] Â: renamed from pim6reg1 [ 107.212254][ T2886] device pim6reg1 entered promiscuous mode [ 108.055294][ T2902] device pim6reg1 entered promiscuous mode [ 108.177010][ T2907] device sit0 left promiscuous mode [ 108.549131][ T2922] FAULT_INJECTION: forcing a failure. [ 108.549131][ T2922] name failslab, interval 1, probability 0, space 0, times 0 [ 108.576942][ T2922] CPU: 0 PID: 2922 Comm: syz.3.779 Not tainted syzkaller #0 [ 108.584324][ T2922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 108.594405][ T2922] Call Trace: [ 108.597698][ T2922] [ 108.600645][ T2922] __dump_stack+0x21/0x30 [ 108.605078][ T2922] dump_stack_lvl+0x110/0x170 [ 108.609777][ T2922] ? show_regs_print_info+0x20/0x20 [ 108.614991][ T2922] ? kernfs_xattr_get+0x81/0x90 [ 108.619852][ T2922] dump_stack+0x15/0x20 [ 108.624025][ T2922] should_fail+0x3c1/0x510 [ 108.628448][ T2922] __should_failslab+0xa4/0xe0 [ 108.633223][ T2922] should_failslab+0x9/0x20 [ 108.637731][ T2922] slab_pre_alloc_hook+0x3b/0xe0 [ 108.642699][ T2922] ? __kernfs_new_node+0xe3/0x6b0 [ 108.647736][ T2922] kmem_cache_alloc+0x44/0x260 [ 108.652514][ T2922] __kernfs_new_node+0xe3/0x6b0 [ 108.657366][ T2922] ? rwsem_write_trylock+0x136/0x300 [ 108.662647][ T2922] ? clear_nonspinnable+0x60/0x60 [ 108.667670][ T2922] ? kernfs_new_node+0x260/0x260 [ 108.672614][ T2922] ? rwsem_write_trylock+0x136/0x300 [ 108.677909][ T2922] ? up_write+0x7b/0x290 [ 108.682160][ T2922] kernfs_new_node+0x150/0x260 [ 108.686924][ T2922] __kernfs_create_file+0x4e/0x270 [ 108.692047][ T2922] sysfs_add_file_mode_ns+0x29a/0x350 [ 108.697420][ T2922] internal_create_group+0x495/0xd00 [ 108.702746][ T2922] ? up_write+0x7b/0x290 [ 108.707001][ T2922] ? sysfs_create_group+0x30/0x30 [ 108.712039][ T2922] ? __kasan_check_write+0x14/0x20 [ 108.717154][ T2922] ? kernfs_put+0x449/0x480 [ 108.721654][ T2922] sysfs_create_groups+0x58/0x120 [ 108.726679][ T2922] device_add_attrs+0x8c/0x700 [ 108.731459][ T2922] device_add+0x5e3/0xed0 [ 108.735875][ T2922] netdev_register_kobject+0x1bc/0x360 [ 108.741336][ T2922] ? raw_notifier_call_chain+0xe9/0x100 [ 108.746887][ T2922] register_netdevice+0xe85/0x1460 [ 108.752010][ T2922] ? netif_stacked_transfer_operstate+0x220/0x220 [ 108.758430][ T2922] ? mutex_unlock+0x8f/0x230 [ 108.763028][ T2922] ? __mutex_lock_slowpath+0x10/0x10 [ 108.768318][ T2922] ppp_dev_configure+0x814/0xac0 [ 108.773287][ T2922] ppp_ioctl+0x64b/0x1790 [ 108.777632][ T2922] ? ppp_poll+0x260/0x260 [ 108.781974][ T2922] ? security_file_ioctl+0x84/0xa0 [ 108.787107][ T2922] ? ppp_poll+0x260/0x260 [ 108.791446][ T2922] __se_sys_ioctl+0x121/0x1a0 [ 108.796148][ T2922] __x64_sys_ioctl+0x7b/0x90 [ 108.800739][ T2922] x64_sys_call+0x2f/0x9a0 [ 108.805170][ T2922] do_syscall_64+0x4c/0xa0 [ 108.809589][ T2922] ? clear_bhb_loop+0x50/0xa0 [ 108.814270][ T2922] ? clear_bhb_loop+0x50/0xa0 [ 108.818957][ T2922] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 108.824877][ T2922] RIP: 0033:0x7f14b942fcb9 [ 108.829299][ T2922] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 108.848924][ T2922] RSP: 002b:00007f14b7e8c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 108.857347][ T2922] RAX: ffffffffffffffda RBX: 00007f14b96aafa0 RCX: 00007f14b942fcb9 [ 108.865330][ T2922] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000003 [ 108.873308][ T2922] RBP: 00007f14b7e8c090 R08: 0000000000000000 R09: 0000000000000000 [ 108.881280][ T2922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 108.889258][ T2922] R13: 00007f14b96ab038 R14: 00007f14b96aafa0 R15: 00007fff6cfbafc8 [ 108.897236][ T2922] [ 109.408111][ T30] audit: type=1400 audit(1768848358.028:148): avc: denied { create } for pid=2944 comm="syz.1.787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 111.994839][ T3032] device pim6reg1 entered promiscuous mode [ 112.458707][ T3049] device pim6reg1 entered promiscuous mode [ 112.512698][ T3051] device pim6reg1 entered promiscuous mode [ 113.278961][ T3069] syz.3.825[3069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.494411][ T3082] device syzkaller0 entered promiscuous mode [ 113.706508][ T3100] device pim6reg1 entered promiscuous mode [ 114.200136][ T3111] device pim6reg1 entered promiscuous mode [ 114.334068][ T3113] device pim6reg1 entered promiscuous mode [ 114.717915][ T3133] device syzkaller0 entered promiscuous mode [ 114.936908][ T101] udevd[101]: worker [340] terminated by signal 33 (Unknown signal 33) [ 114.984375][ T101] udevd[101]: worker [340] failed while handling '/devices/virtual/block/loop5' [ 115.195821][ T3150] device pim6reg1 entered promiscuous mode [ 115.282909][ T30] audit: type=1400 audit(1768848363.898:149): avc: denied { create } for pid=3144 comm="syz.3.852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 115.554018][ T3168] device pim6reg1 entered promiscuous mode [ 115.987763][ T3178] device syzkaller0 entered promiscuous mode [ 116.109056][ T3181] FAULT_INJECTION: forcing a failure. [ 116.109056][ T3181] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 116.154852][ T3181] CPU: 1 PID: 3181 Comm: syz.5.864 Not tainted syzkaller #0 [ 116.162187][ T3181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 116.172265][ T3181] Call Trace: [ 116.175569][ T3181] [ 116.178522][ T3181] __dump_stack+0x21/0x30 [ 116.182879][ T3181] dump_stack_lvl+0x110/0x170 [ 116.187575][ T3181] ? show_regs_print_info+0x20/0x20 [ 116.192795][ T3181] ? vfs_write+0xc72/0xfd0 [ 116.197235][ T3181] dump_stack+0x15/0x20 [ 116.201405][ T3181] should_fail+0x3c1/0x510 [ 116.205855][ T3181] should_fail_usercopy+0x1a/0x20 [ 116.210928][ T3181] _copy_from_user+0x20/0xd0 [ 116.215532][ T3181] __sys_bpf+0x258/0x7d0 [ 116.219787][ T3181] ? bpf_link_show_fdinfo+0x330/0x330 [ 116.225180][ T3181] ? debug_smp_processor_id+0x17/0x20 [ 116.230566][ T3181] __x64_sys_bpf+0x7c/0x90 [ 116.235006][ T3181] x64_sys_call+0x4b9/0x9a0 [ 116.239529][ T3181] do_syscall_64+0x4c/0xa0 [ 116.243955][ T3181] ? clear_bhb_loop+0x50/0xa0 [ 116.248650][ T3181] ? clear_bhb_loop+0x50/0xa0 [ 116.253362][ T3181] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 116.259400][ T3181] RIP: 0033:0x7f5740fd8cb9 [ 116.263838][ T3181] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 116.283465][ T3181] RSP: 002b:00007f573fa14028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 116.291894][ T3181] RAX: ffffffffffffffda RBX: 00007f5741254090 RCX: 00007f5740fd8cb9 [ 116.300146][ T3181] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 116.308138][ T3181] RBP: 00007f573fa14090 R08: 0000000000000000 R09: 0000000000000000 [ 116.316135][ T3181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.324140][ T3181] R13: 00007f5741254128 R14: 00007f5741254090 R15: 00007fff00c440a8 [ 116.332134][ T3181] [ 117.021696][ T3206] device pim6reg1 entered promiscuous mode [ 117.169614][ T3212] device syzkaller0 entered promiscuous mode [ 117.320427][ T3228] FAULT_INJECTION: forcing a failure. [ 117.320427][ T3228] name failslab, interval 1, probability 0, space 0, times 0 [ 117.416986][ T3231] FAULT_INJECTION: forcing a failure. [ 117.416986][ T3231] name failslab, interval 1, probability 0, space 0, times 0 [ 117.433128][ T3228] CPU: 1 PID: 3228 Comm: syz.4.882 Not tainted syzkaller #0 [ 117.440574][ T3228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 117.450659][ T3228] Call Trace: [ 117.453945][ T3228] [ 117.456892][ T3228] __dump_stack+0x21/0x30 [ 117.461254][ T3228] dump_stack_lvl+0x110/0x170 [ 117.465956][ T3228] ? show_regs_print_info+0x20/0x20 [ 117.471181][ T3228] ? kernfs_xattr_get+0x81/0x90 [ 117.476052][ T3228] dump_stack+0x15/0x20 [ 117.480264][ T3228] should_fail+0x3c1/0x510 [ 117.484715][ T3228] __should_failslab+0xa4/0xe0 [ 117.489522][ T3228] should_failslab+0x9/0x20 [ 117.494038][ T3228] slab_pre_alloc_hook+0x3b/0xe0 [ 117.499003][ T3228] ? __kernfs_new_node+0xe3/0x6b0 [ 117.504041][ T3228] kmem_cache_alloc+0x44/0x260 [ 117.508822][ T3228] __kernfs_new_node+0xe3/0x6b0 [ 117.513686][ T3228] ? rwsem_write_trylock+0x136/0x300 [ 117.518982][ T3228] ? clear_nonspinnable+0x60/0x60 [ 117.524022][ T3228] ? kernfs_new_node+0x260/0x260 [ 117.528974][ T3228] ? rwsem_write_trylock+0x136/0x300 [ 117.534304][ T3228] ? up_write+0x7b/0x290 [ 117.538568][ T3228] kernfs_new_node+0x150/0x260 [ 117.543377][ T3228] __kernfs_create_file+0x4e/0x270 [ 117.548516][ T3228] sysfs_add_file_mode_ns+0x29a/0x350 [ 117.553933][ T3228] internal_create_group+0x495/0xd00 [ 117.559250][ T3228] ? up_write+0x7b/0x290 [ 117.563520][ T3228] ? sysfs_create_group+0x30/0x30 [ 117.568566][ T3228] ? __kasan_check_write+0x14/0x20 [ 117.573703][ T3228] ? kernfs_put+0x449/0x480 [ 117.578230][ T3228] sysfs_create_groups+0x58/0x120 [ 117.583289][ T3228] device_add_attrs+0x8c/0x700 [ 117.588079][ T3228] device_add+0x5e3/0xed0 [ 117.592439][ T3228] netdev_register_kobject+0x1bc/0x360 [ 117.597938][ T3228] ? raw_notifier_call_chain+0xe9/0x100 [ 117.603509][ T3228] register_netdevice+0xe85/0x1460 [ 117.608745][ T3228] ? netif_stacked_transfer_operstate+0x220/0x220 [ 117.615177][ T3228] ? mutex_unlock+0x8f/0x230 [ 117.619788][ T3228] ? __mutex_lock_slowpath+0x10/0x10 [ 117.625088][ T3228] ppp_dev_configure+0x814/0xac0 [ 117.630048][ T3228] ppp_ioctl+0x64b/0x1790 [ 117.634412][ T3228] ? ppp_poll+0x260/0x260 [ 117.638782][ T3228] ? security_file_ioctl+0x84/0xa0 [ 117.643909][ T3228] ? ppp_poll+0x260/0x260 [ 117.648261][ T3228] __se_sys_ioctl+0x121/0x1a0 [ 117.652969][ T3228] __x64_sys_ioctl+0x7b/0x90 [ 117.657581][ T3228] x64_sys_call+0x2f/0x9a0 [ 117.662012][ T3228] do_syscall_64+0x4c/0xa0 [ 117.666448][ T3228] ? clear_bhb_loop+0x50/0xa0 [ 117.671146][ T3228] ? clear_bhb_loop+0x50/0xa0 [ 117.675852][ T3228] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 117.681768][ T3228] RIP: 0033:0x7f30d6127cb9 [ 117.686193][ T3228] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 117.705820][ T3228] RSP: 002b:00007f30d4b84028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 117.714271][ T3228] RAX: ffffffffffffffda RBX: 00007f30d63a2fa0 RCX: 00007f30d6127cb9 [ 117.722261][ T3228] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000003 [ 117.730250][ T3228] RBP: 00007f30d4b84090 R08: 0000000000000000 R09: 0000000000000000 [ 117.738239][ T3228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 117.746238][ T3228] R13: 00007f30d63a3038 R14: 00007f30d63a2fa0 R15: 00007ffd721c0718 [ 117.754256][ T3228] [ 117.830545][ T3231] CPU: 1 PID: 3231 Comm: syz.1.883 Not tainted syzkaller #0 [ 117.838313][ T3231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 117.848386][ T3231] Call Trace: [ 117.851684][ T3231] [ 117.854653][ T3231] __dump_stack+0x21/0x30 [ 117.859002][ T3231] dump_stack_lvl+0x110/0x170 [ 117.863714][ T3231] ? show_regs_print_info+0x20/0x20 [ 117.868938][ T3231] ? __perf_event_task_sched_in+0x213/0x290 [ 117.874862][ T3231] ? perf_pmu_sched_task+0x180/0x180 [ 117.880170][ T3231] dump_stack+0x15/0x20 [ 117.884340][ T3231] should_fail+0x3c1/0x510 [ 117.888858][ T3231] __should_failslab+0xa4/0xe0 [ 117.893653][ T3231] should_failslab+0x9/0x20 [ 117.898184][ T3231] slab_pre_alloc_hook+0x3b/0xe0 [ 117.903156][ T3231] __kmalloc+0x6d/0x2c0 [ 117.907324][ T3231] ? bpf_test_init+0x100/0x1c0 [ 117.912105][ T3231] bpf_test_init+0x100/0x1c0 [ 117.916728][ T3231] bpf_prog_test_run_xdp+0x1cb/0x910 [ 117.922039][ T3231] ? __kasan_check_write+0x14/0x20 [ 117.927179][ T3231] ? dev_put+0x80/0x80 [ 117.931263][ T3231] ? __fget_files+0x2c4/0x320 [ 117.935955][ T3231] ? fput_many+0x15a/0x1a0 [ 117.940374][ T3231] ? dev_put+0x80/0x80 [ 117.944447][ T3231] bpf_prog_test_run+0x3d5/0x630 [ 117.949388][ T3231] ? bpf_prog_query+0x230/0x230 [ 117.954258][ T3231] ? selinux_bpf+0xce/0xf0 [ 117.958709][ T3231] ? security_bpf+0x82/0xa0 [ 117.963209][ T3231] __sys_bpf+0x590/0x7d0 [ 117.967504][ T3231] ? bpf_link_show_fdinfo+0x330/0x330 [ 117.972886][ T3231] ? debug_smp_processor_id+0x17/0x20 [ 117.978263][ T3231] __x64_sys_bpf+0x7c/0x90 [ 117.982704][ T3231] x64_sys_call+0x4b9/0x9a0 [ 117.987218][ T3231] do_syscall_64+0x4c/0xa0 [ 117.991638][ T3231] ? clear_bhb_loop+0x50/0xa0 [ 117.996317][ T3231] ? clear_bhb_loop+0x50/0xa0 [ 118.001025][ T3231] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 118.006919][ T3231] RIP: 0033:0x7f8ee2496cb9 [ 118.011344][ T3231] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 118.030955][ T3231] RSP: 002b:00007f8ee0ed2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 118.039377][ T3231] RAX: ffffffffffffffda RBX: 00007f8ee2712090 RCX: 00007f8ee2496cb9 [ 118.047355][ T3231] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 118.055337][ T3231] RBP: 00007f8ee0ed2090 R08: 0000000000000000 R09: 0000000000000000 [ 118.063326][ T3231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 118.071306][ T3231] R13: 00007f8ee2712128 R14: 00007f8ee2712090 R15: 00007ffd8b0f7a08 [ 118.079296][ T3231] [ 118.132528][ T3236] device pim6reg1 entered promiscuous mode [ 118.157872][ T3242] FAULT_INJECTION: forcing a failure. [ 118.157872][ T3242] name failslab, interval 1, probability 0, space 0, times 0 [ 118.170938][ T3242] CPU: 1 PID: 3242 Comm: syz.4.886 Not tainted syzkaller #0 [ 118.178254][ T3242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 118.188329][ T3242] Call Trace: [ 118.191631][ T3242] [ 118.194572][ T3242] __dump_stack+0x21/0x30 [ 118.198914][ T3242] dump_stack_lvl+0x110/0x170 [ 118.203787][ T3242] ? show_regs_print_info+0x20/0x20 [ 118.208993][ T3242] ? sysvec_irq_work+0x61/0xc0 [ 118.213784][ T3242] dump_stack+0x15/0x20 [ 118.217944][ T3242] should_fail+0x3c1/0x510 [ 118.222369][ T3242] __should_failslab+0xa4/0xe0 [ 118.227147][ T3242] should_failslab+0x9/0x20 [ 118.231671][ T3242] slab_pre_alloc_hook+0x3b/0xe0 [ 118.236621][ T3242] ? dup_task_struct+0x57/0xc10 [ 118.241506][ T3242] kmem_cache_alloc+0x44/0x260 [ 118.246284][ T3242] ? _raw_spin_lock_irq+0x95/0xf0 [ 118.251318][ T3242] dup_task_struct+0x57/0xc10 [ 118.255999][ T3242] ? __kasan_check_write+0x14/0x20 [ 118.261120][ T3242] copy_process+0x5c4/0x3250 [ 118.265724][ T3242] ? kstrtol_from_user+0x2a0/0x2a0 [ 118.270863][ T3242] ? putname+0x111/0x160 [ 118.275122][ T3242] ? __kasan_check_write+0x14/0x20 [ 118.280235][ T3242] ? proc_fail_nth_write+0x180/0x200 [ 118.285523][ T3242] ? proc_fail_nth_read+0x220/0x220 [ 118.290722][ T3242] ? __pidfd_prepare+0x150/0x150 [ 118.295667][ T3242] kernel_clone+0x233/0x960 [ 118.300171][ T3242] ? create_io_thread+0x170/0x170 [ 118.305207][ T3242] ? __kasan_check_write+0x14/0x20 [ 118.310321][ T3242] ? mutex_unlock+0x8f/0x230 [ 118.314930][ T3242] __x64_sys_clone+0x198/0x210 [ 118.319703][ T3242] ? __kasan_check_write+0x14/0x20 [ 118.324821][ T3242] ? __ia32_sys_vfork+0x130/0x130 [ 118.329867][ T3242] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 118.335939][ T3242] x64_sys_call+0x41f/0x9a0 [ 118.340488][ T3242] do_syscall_64+0x4c/0xa0 [ 118.344908][ T3242] ? clear_bhb_loop+0x50/0xa0 [ 118.349581][ T3242] ? clear_bhb_loop+0x50/0xa0 [ 118.354252][ T3242] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 118.360159][ T3242] RIP: 0033:0x7f30d6127cb9 [ 118.364584][ T3242] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 118.384200][ T3242] RSP: 002b:00007f30d4b83fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 118.392629][ T3242] RAX: ffffffffffffffda RBX: 00007f30d63a2fa0 RCX: 00007f30d6127cb9 [ 118.400625][ T3242] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 118.408603][ T3242] RBP: 00007f30d4b84090 R08: 0000000000000000 R09: 0000000000000000 [ 118.416598][ T3242] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 118.424575][ T3242] R13: 00007f30d63a3038 R14: 00007f30d63a2fa0 R15: 00007ffd721c0718 [ 118.432558][ T3242] [ 118.523007][ T3252] device pim6reg1 entered promiscuous mode [ 118.620683][ T3254] device syzkaller0 entered promiscuous mode [ 118.918375][ T3271] FAULT_INJECTION: forcing a failure. [ 118.918375][ T3271] name failslab, interval 1, probability 0, space 0, times 0 [ 118.969850][ T3271] CPU: 0 PID: 3271 Comm: syz.2.898 Not tainted syzkaller #0 [ 118.977307][ T3271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 118.987388][ T3271] Call Trace: [ 118.990711][ T3271] [ 118.993663][ T3271] __dump_stack+0x21/0x30 [ 118.998023][ T3271] dump_stack_lvl+0x110/0x170 [ 119.002728][ T3271] ? show_regs_print_info+0x20/0x20 [ 119.007963][ T3271] ? kernfs_xattr_get+0x81/0x90 [ 119.012846][ T3271] dump_stack+0x15/0x20 [ 119.017030][ T3271] should_fail+0x3c1/0x510 [ 119.021472][ T3271] __should_failslab+0xa4/0xe0 [ 119.026262][ T3271] should_failslab+0x9/0x20 [ 119.030806][ T3271] slab_pre_alloc_hook+0x3b/0xe0 [ 119.035757][ T3271] ? __kernfs_new_node+0xe3/0x6b0 [ 119.040890][ T3271] kmem_cache_alloc+0x44/0x260 [ 119.045682][ T3271] __kernfs_new_node+0xe3/0x6b0 [ 119.050645][ T3271] ? rwsem_write_trylock+0x136/0x300 [ 119.055997][ T3271] ? clear_nonspinnable+0x60/0x60 [ 119.061041][ T3271] ? kernfs_new_node+0x260/0x260 [ 119.066020][ T3271] ? rwsem_write_trylock+0x136/0x300 [ 119.071327][ T3271] ? up_write+0x7b/0x290 [ 119.075590][ T3271] kernfs_new_node+0x150/0x260 [ 119.080407][ T3271] __kernfs_create_file+0x4e/0x270 [ 119.085553][ T3271] sysfs_add_file_mode_ns+0x29a/0x350 [ 119.090960][ T3271] internal_create_group+0x495/0xd00 [ 119.096259][ T3271] ? up_write+0x7b/0x290 [ 119.100525][ T3271] ? sysfs_create_group+0x30/0x30 [ 119.105594][ T3271] ? __kasan_check_write+0x14/0x20 [ 119.110734][ T3271] ? kernfs_put+0x449/0x480 [ 119.115268][ T3271] sysfs_create_groups+0x58/0x120 [ 119.120322][ T3271] device_add_attrs+0x8c/0x700 [ 119.125103][ T3271] device_add+0x5e3/0xed0 [ 119.129454][ T3271] netdev_register_kobject+0x1bc/0x360 [ 119.134935][ T3271] ? raw_notifier_call_chain+0xe9/0x100 [ 119.140497][ T3271] register_netdevice+0xe85/0x1460 [ 119.145639][ T3271] ? netif_stacked_transfer_operstate+0x220/0x220 [ 119.152061][ T3271] ? mutex_unlock+0x8f/0x230 [ 119.156657][ T3271] ? __mutex_lock_slowpath+0x10/0x10 [ 119.161950][ T3271] ppp_dev_configure+0x814/0xac0 [ 119.166895][ T3271] ppp_ioctl+0x64b/0x1790 [ 119.171238][ T3271] ? ppp_poll+0x260/0x260 [ 119.175585][ T3271] ? security_file_ioctl+0x84/0xa0 [ 119.180711][ T3271] ? ppp_poll+0x260/0x260 [ 119.185042][ T3271] __se_sys_ioctl+0x121/0x1a0 [ 119.189742][ T3271] __x64_sys_ioctl+0x7b/0x90 [ 119.194337][ T3271] x64_sys_call+0x2f/0x9a0 [ 119.198756][ T3271] do_syscall_64+0x4c/0xa0 [ 119.203177][ T3271] ? clear_bhb_loop+0x50/0xa0 [ 119.207857][ T3271] ? clear_bhb_loop+0x50/0xa0 [ 119.212548][ T3271] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 119.218455][ T3271] RIP: 0033:0x7ff7986b8cb9 [ 119.222882][ T3271] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 119.242493][ T3271] RSP: 002b:00007ff797115028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 119.250918][ T3271] RAX: ffffffffffffffda RBX: 00007ff798933fa0 RCX: 00007ff7986b8cb9 [ 119.258896][ T3271] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000003 [ 119.266880][ T3271] RBP: 00007ff797115090 R08: 0000000000000000 R09: 0000000000000000 [ 119.274859][ T3271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 119.282829][ T3271] R13: 00007ff798934038 R14: 00007ff798933fa0 R15: 00007ffde179a6a8 [ 119.290807][ T3271] [ 119.779374][ T3286] FAULT_INJECTION: forcing a failure. [ 119.779374][ T3286] name failslab, interval 1, probability 0, space 0, times 0 [ 119.902634][ T3286] CPU: 1 PID: 3286 Comm: syz.5.903 Not tainted syzkaller #0 [ 119.909979][ T3286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 119.920060][ T3286] Call Trace: [ 119.923357][ T3286] [ 119.926303][ T3286] __dump_stack+0x21/0x30 [ 119.930670][ T3286] dump_stack_lvl+0x110/0x170 [ 119.935366][ T3286] ? show_regs_print_info+0x20/0x20 [ 119.940599][ T3286] ? __kasan_slab_alloc+0xcf/0xf0 [ 119.945658][ T3286] ? __kasan_slab_alloc+0xbd/0xf0 [ 119.950705][ T3286] ? slab_post_alloc_hook+0x4f/0x2b0 [ 119.956012][ T3286] ? dup_task_struct+0x57/0xc10 [ 119.960881][ T3286] ? copy_process+0x5c4/0x3250 [ 119.965665][ T3286] ? kernel_clone+0x233/0x960 [ 119.970465][ T3286] ? __x64_sys_clone+0x198/0x210 [ 119.975425][ T3286] dump_stack+0x15/0x20 [ 119.979610][ T3286] should_fail+0x3c1/0x510 [ 119.984045][ T3286] __should_failslab+0xa4/0xe0 [ 119.988829][ T3286] should_failslab+0x9/0x20 [ 119.993351][ T3286] slab_pre_alloc_hook+0x3b/0xe0 [ 119.998309][ T3286] kmem_cache_alloc_trace+0x48/0x270 [ 120.003621][ T3286] ? __get_vm_area_node+0x11d/0x350 [ 120.008836][ T3286] __get_vm_area_node+0x11d/0x350 [ 120.013884][ T3286] __vmalloc_node_range+0xdf/0xaf0 [ 120.019018][ T3286] ? copy_process+0x5c4/0x3250 [ 120.023805][ T3286] ? slab_post_alloc_hook+0x6d/0x2b0 [ 120.029111][ T3286] ? kmem_cache_alloc+0xf7/0x260 [ 120.034063][ T3286] dup_task_struct+0x3f2/0xc10 [ 120.038856][ T3286] ? copy_process+0x5c4/0x3250 [ 120.043652][ T3286] copy_process+0x5c4/0x3250 [ 120.048267][ T3286] ? kstrtol_from_user+0x2a0/0x2a0 [ 120.053405][ T3286] ? putname+0x111/0x160 [ 120.057669][ T3286] ? __kasan_check_write+0x14/0x20 [ 120.062807][ T3286] ? proc_fail_nth_write+0x180/0x200 [ 120.068115][ T3286] ? proc_fail_nth_read+0x220/0x220 [ 120.073337][ T3286] ? __pidfd_prepare+0x150/0x150 [ 120.078301][ T3286] kernel_clone+0x233/0x960 [ 120.082835][ T3286] ? create_io_thread+0x170/0x170 [ 120.087884][ T3286] ? __kasan_check_write+0x14/0x20 [ 120.093015][ T3286] ? mutex_unlock+0x8f/0x230 [ 120.097619][ T3286] __x64_sys_clone+0x198/0x210 [ 120.102406][ T3286] ? __kasan_check_write+0x14/0x20 [ 120.107540][ T3286] ? __ia32_sys_vfork+0x130/0x130 [ 120.112592][ T3286] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 120.118677][ T3286] x64_sys_call+0x41f/0x9a0 [ 120.123201][ T3286] do_syscall_64+0x4c/0xa0 [ 120.127731][ T3286] ? clear_bhb_loop+0x50/0xa0 [ 120.132447][ T3286] ? clear_bhb_loop+0x50/0xa0 [ 120.137164][ T3286] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 120.143085][ T3286] RIP: 0033:0x7f5740fd8cb9 [ 120.147534][ T3286] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 120.167168][ T3286] RSP: 002b:00007f573fa34fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 120.175596][ T3286] RAX: ffffffffffffffda RBX: 00007f5741253fa0 RCX: 00007f5740fd8cb9 [ 120.183582][ T3286] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 120.191562][ T3286] RBP: 00007f573fa35090 R08: 0000000000000000 R09: 0000000000000000 [ 120.199555][ T3286] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 120.207536][ T3286] R13: 00007f5741254038 R14: 00007f5741253fa0 R15: 00007fff00c440a8 [ 120.215525][ T3286] [ 120.576478][ T3286] syz.5.903: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz5,mems_allowed=0 [ 120.606457][ T3286] CPU: 0 PID: 3286 Comm: syz.5.903 Not tainted syzkaller #0 [ 120.613792][ T3286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 120.623866][ T3286] Call Trace: [ 120.627160][ T3286] [ 120.630120][ T3286] __dump_stack+0x21/0x30 [ 120.634468][ T3286] dump_stack_lvl+0x110/0x170 [ 120.639210][ T3286] ? show_regs_print_info+0x20/0x20 [ 120.644431][ T3286] ? pr_cont_kernfs_name+0xe3/0xf0 [ 120.649558][ T3286] dump_stack+0x15/0x20 [ 120.653724][ T3286] warn_alloc+0x1dc/0x200 [ 120.658090][ T3286] ? __should_failslab+0xa4/0xe0 [ 120.663068][ T3286] ? zone_watermark_ok_safe+0x270/0x270 [ 120.668758][ T3286] ? __get_vm_area_node+0x11d/0x350 [ 120.673975][ T3286] ? __get_vm_area_node+0x33e/0x350 [ 120.679196][ T3286] __vmalloc_node_range+0x152/0xaf0 [ 120.684410][ T3286] ? slab_post_alloc_hook+0x6d/0x2b0 [ 120.689723][ T3286] ? kmem_cache_alloc+0xf7/0x260 [ 120.694705][ T3286] dup_task_struct+0x3f2/0xc10 [ 120.699488][ T3286] ? copy_process+0x5c4/0x3250 [ 120.704281][ T3286] copy_process+0x5c4/0x3250 [ 120.708890][ T3286] ? kstrtol_from_user+0x2a0/0x2a0 [ 120.714025][ T3286] ? putname+0x111/0x160 [ 120.718290][ T3286] ? __kasan_check_write+0x14/0x20 [ 120.723434][ T3286] ? proc_fail_nth_write+0x180/0x200 [ 120.728777][ T3286] ? proc_fail_nth_read+0x220/0x220 [ 120.733993][ T3286] ? __pidfd_prepare+0x150/0x150 [ 120.738955][ T3286] kernel_clone+0x233/0x960 [ 120.743489][ T3286] ? create_io_thread+0x170/0x170 [ 120.748541][ T3286] ? __kasan_check_write+0x14/0x20 [ 120.753684][ T3286] ? mutex_unlock+0x8f/0x230 [ 120.758366][ T3286] __x64_sys_clone+0x198/0x210 [ 120.763151][ T3286] ? __kasan_check_write+0x14/0x20 [ 120.768282][ T3286] ? __ia32_sys_vfork+0x130/0x130 [ 120.773333][ T3286] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 120.779505][ T3286] x64_sys_call+0x41f/0x9a0 [ 120.784029][ T3286] do_syscall_64+0x4c/0xa0 [ 120.788463][ T3286] ? clear_bhb_loop+0x50/0xa0 [ 120.793161][ T3286] ? clear_bhb_loop+0x50/0xa0 [ 120.797854][ T3286] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 120.803772][ T3286] RIP: 0033:0x7f5740fd8cb9 [ 120.808199][ T3286] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 120.827828][ T3286] RSP: 002b:00007f573fa34fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 120.836267][ T3286] RAX: ffffffffffffffda RBX: 00007f5741253fa0 RCX: 00007f5740fd8cb9 [ 120.844251][ T3286] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 120.852234][ T3286] RBP: 00007f573fa35090 R08: 0000000000000000 R09: 0000000000000000 [ 120.860220][ T3286] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 120.868217][ T3286] R13: 00007f5741254038 R14: 00007f5741253fa0 R15: 00007fff00c440a8 [ 120.876218][ T3286] [ 120.891874][ T3300] device pim6reg1 entered promiscuous mode [ 121.076868][ T3286] Mem-Info: [ 121.080046][ T3286] active_anon:40 inactive_anon:6382 isolated_anon:0 [ 121.080046][ T3286] active_file:17159 inactive_file:9740 isolated_file:0 [ 121.080046][ T3286] unevictable:0 dirty:307 writeback:0 [ 121.080046][ T3286] slab_reclaimable:7555 slab_unreclaimable:78115 [ 121.080046][ T3286] mapped:34357 shmem:162 pagetables:573 bounce:0 [ 121.080046][ T3286] kernel_misc_reclaimable:0 [ 121.080046][ T3286] free:931947 free_pcp:27084 free_cma:0 [ 121.265047][ T3286] Node 0 active_anon:160kB inactive_anon:25928kB active_file:68636kB inactive_file:38960kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:137428kB dirty:1228kB writeback:0kB shmem:1048kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5876kB pagetables:2292kB all_unreclaimable? no [ 121.418570][ T3286] DMA32 free:2978772kB min:62612kB low:78264kB high:93916kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2982772kB mlocked:0kB bounce:0kB free_pcp:4000kB local_pcp:56kB free_cma:0kB [ 121.602181][ T3286] lowmem_reserve[]: 0 3941 3941 [ 121.628752][ T3286] Normal free:749016kB min:84840kB low:106048kB high:127256kB reserved_highatomic:0KB active_anon:160kB inactive_anon:27724kB active_file:68636kB inactive_file:38960kB unevictable:0kB writepending:1276kB present:5242880kB managed:4036096kB mlocked:0kB bounce:0kB free_pcp:101740kB local_pcp:51156kB free_cma:0kB [ 121.956175][ T3286] lowmem_reserve[]: 0 0 0 [ 121.961143][ T3286] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2978772kB [ 122.003461][ T3286] Normal: 2418*4kB (UME) 1387*8kB (UME) 772*16kB (UME) 689*32kB (UME) 127*64kB (UME) 44*128kB (UME) 19*256kB (UME) 6*512kB (M) 4*1024kB (UME) 2*2048kB (UM) 162*4096kB (M) = 748608kB [ 122.045872][ T3286] 27100 total pagecache pages [ 122.056664][ T3286] 0 pages in swap cache [ 122.072369][ T3286] Swap cache stats: add 0, delete 0, find 0/0 [ 122.085100][ T3286] Free swap = 124996kB [ 122.093660][ T3286] Total swap = 124996kB [ 122.113996][ T3286] 2097051 pages RAM [ 122.126632][ T3286] 0 pages HighMem/MovableOnly [ 122.159028][ T3286] 342334 pages reserved [ 122.202035][ T3286] 0 pages cma reserved [ 122.444171][ T3341] FAULT_INJECTION: forcing a failure. [ 122.444171][ T3341] name failslab, interval 1, probability 0, space 0, times 0 [ 122.456943][ T3341] CPU: 0 PID: 3341 Comm: syz.5.922 Not tainted syzkaller #0 [ 122.464285][ T3341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 122.474351][ T3341] Call Trace: [ 122.477649][ T3341] [ 122.480601][ T3341] __dump_stack+0x21/0x30 [ 122.484960][ T3341] dump_stack_lvl+0x110/0x170 [ 122.489653][ T3341] ? show_regs_print_info+0x20/0x20 [ 122.494874][ T3341] dump_stack+0x15/0x20 [ 122.499072][ T3341] should_fail+0x3c1/0x510 [ 122.503518][ T3341] __should_failslab+0xa4/0xe0 [ 122.508337][ T3341] should_failslab+0x9/0x20 [ 122.512868][ T3341] slab_pre_alloc_hook+0x3b/0xe0 [ 122.517833][ T3341] ? radix_tree_node_alloc+0x18e/0x380 [ 122.523313][ T3341] kmem_cache_alloc+0x44/0x260 [ 122.528121][ T3341] ? sysfs_add_file_mode_ns+0x29a/0x350 [ 122.533695][ T3341] radix_tree_node_alloc+0x18e/0x380 [ 122.538992][ T3341] ? x64_sys_call+0x2f/0x9a0 [ 122.543598][ T3341] idr_get_free+0x2b1/0xab0 [ 122.548278][ T3341] idr_alloc_cyclic+0x1bb/0x580 [ 122.553166][ T3341] ? idr_alloc+0x2b0/0x2b0 [ 122.557603][ T3341] ? __kasan_check_write+0x14/0x20 [ 122.562730][ T3341] ? _raw_spin_lock+0x94/0xf0 [ 122.567427][ T3341] ? debug_smp_processor_id+0x17/0x20 [ 122.572850][ T3341] __kernfs_new_node+0x133/0x6b0 [ 122.577827][ T3341] ? kernfs_new_node+0x260/0x260 [ 122.582782][ T3341] ? rwsem_write_trylock+0x136/0x300 [ 122.588086][ T3341] ? up_write+0x7b/0x290 [ 122.592353][ T3341] kernfs_new_node+0x150/0x260 [ 122.597125][ T3341] __kernfs_create_file+0x4e/0x270 [ 122.602259][ T3341] sysfs_add_file_mode_ns+0x29a/0x350 [ 122.607657][ T3341] internal_create_group+0x495/0xd00 [ 122.612972][ T3341] ? up_write+0x7b/0x290 [ 122.617231][ T3341] ? sysfs_create_group+0x30/0x30 [ 122.622268][ T3341] ? __kasan_check_write+0x14/0x20 [ 122.627398][ T3341] ? kernfs_put+0x449/0x480 [ 122.631931][ T3341] sysfs_create_groups+0x58/0x120 [ 122.636985][ T3341] device_add_attrs+0x8c/0x700 [ 122.641762][ T3341] device_add+0x5e3/0xed0 [ 122.646109][ T3341] netdev_register_kobject+0x1bc/0x360 [ 122.651587][ T3341] ? raw_notifier_call_chain+0xe9/0x100 [ 122.657138][ T3341] register_netdevice+0xe85/0x1460 [ 122.662282][ T3341] ? netif_stacked_transfer_operstate+0x220/0x220 [ 122.668706][ T3341] ? mutex_unlock+0x8f/0x230 [ 122.673312][ T3341] ? __mutex_lock_slowpath+0x10/0x10 [ 122.678618][ T3341] ppp_dev_configure+0x814/0xac0 [ 122.683586][ T3341] ppp_ioctl+0x64b/0x1790 [ 122.687923][ T3341] ? ppp_poll+0x260/0x260 [ 122.692268][ T3341] ? security_file_ioctl+0x84/0xa0 [ 122.697390][ T3341] ? ppp_poll+0x260/0x260 [ 122.701733][ T3341] __se_sys_ioctl+0x121/0x1a0 [ 122.706424][ T3341] __x64_sys_ioctl+0x7b/0x90 [ 122.711080][ T3341] x64_sys_call+0x2f/0x9a0 [ 122.715510][ T3341] do_syscall_64+0x4c/0xa0 [ 122.719937][ T3341] ? clear_bhb_loop+0x50/0xa0 [ 122.724645][ T3341] ? clear_bhb_loop+0x50/0xa0 [ 122.729352][ T3341] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 122.735264][ T3341] RIP: 0033:0x7f5740fd8cb9 [ 122.739690][ T3341] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 122.759314][ T3341] RSP: 002b:00007f573fa35028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 122.767825][ T3341] RAX: ffffffffffffffda RBX: 00007f5741253fa0 RCX: 00007f5740fd8cb9 [ 122.775814][ T3341] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000003 [ 122.783787][ T3341] RBP: 00007f573fa35090 R08: 0000000000000000 R09: 0000000000000000 [ 122.791765][ T3341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 122.799742][ T3341] R13: 00007f5741254038 R14: 00007f5741253fa0 R15: 00007fff00c440a8 [ 122.807726][ T3341] [ 122.840365][ T3338] device pim6reg1 entered promiscuous mode [ 123.088585][ T3351] device pim6reg1 entered promiscuous mode [ 124.276379][ T3388] FAULT_INJECTION: forcing a failure. [ 124.276379][ T3388] name failslab, interval 1, probability 0, space 0, times 0 [ 124.296486][ T3388] CPU: 0 PID: 3388 Comm: syz.1.938 Not tainted syzkaller #0 [ 124.303842][ T3388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 124.314097][ T3388] Call Trace: [ 124.317536][ T3388] [ 124.320481][ T3388] __dump_stack+0x21/0x30 [ 124.324832][ T3388] dump_stack_lvl+0x110/0x170 [ 124.329555][ T3388] ? show_regs_print_info+0x20/0x20 [ 124.334786][ T3388] ? kernfs_xattr_get+0x81/0x90 [ 124.339669][ T3388] dump_stack+0x15/0x20 [ 124.343849][ T3388] should_fail+0x3c1/0x510 [ 124.348293][ T3388] __should_failslab+0xa4/0xe0 [ 124.353087][ T3388] should_failslab+0x9/0x20 [ 124.357607][ T3388] slab_pre_alloc_hook+0x3b/0xe0 [ 124.362572][ T3388] ? __kernfs_new_node+0xe3/0x6b0 [ 124.367622][ T3388] kmem_cache_alloc+0x44/0x260 [ 124.372415][ T3388] __kernfs_new_node+0xe3/0x6b0 [ 124.377313][ T3388] ? rwsem_write_trylock+0x136/0x300 [ 124.382643][ T3388] ? clear_nonspinnable+0x60/0x60 [ 124.387782][ T3388] ? kernfs_new_node+0x260/0x260 [ 124.392750][ T3388] ? rwsem_write_trylock+0x136/0x300 [ 124.398069][ T3388] ? up_write+0x7b/0x290 [ 124.402335][ T3388] kernfs_new_node+0x150/0x260 [ 124.407137][ T3388] __kernfs_create_file+0x4e/0x270 [ 124.412263][ T3388] sysfs_add_file_mode_ns+0x29a/0x350 [ 124.417788][ T3388] internal_create_group+0x495/0xd00 [ 124.423109][ T3388] ? up_write+0x7b/0x290 [ 124.427398][ T3388] ? sysfs_create_group+0x30/0x30 [ 124.432461][ T3388] ? __kasan_check_write+0x14/0x20 [ 124.437613][ T3388] ? kernfs_put+0x449/0x480 [ 124.442257][ T3388] sysfs_create_groups+0x58/0x120 [ 124.447450][ T3388] device_add_attrs+0x8c/0x700 [ 124.452301][ T3388] device_add+0x5e3/0xed0 [ 124.456736][ T3388] netdev_register_kobject+0x1bc/0x360 [ 124.462226][ T3388] ? raw_notifier_call_chain+0xe9/0x100 [ 124.467807][ T3388] register_netdevice+0xe85/0x1460 [ 124.472955][ T3388] ? netif_stacked_transfer_operstate+0x220/0x220 [ 124.479507][ T3388] ? mutex_unlock+0x8f/0x230 [ 124.484130][ T3388] ? __mutex_lock_slowpath+0x10/0x10 [ 124.489447][ T3388] ppp_dev_configure+0x814/0xac0 [ 124.494422][ T3388] ppp_ioctl+0x64b/0x1790 [ 124.498783][ T3388] ? ppp_poll+0x260/0x260 [ 124.503146][ T3388] ? security_file_ioctl+0x84/0xa0 [ 124.508285][ T3388] ? ppp_poll+0x260/0x260 [ 124.512641][ T3388] __se_sys_ioctl+0x121/0x1a0 [ 124.517343][ T3388] __x64_sys_ioctl+0x7b/0x90 [ 124.522101][ T3388] x64_sys_call+0x2f/0x9a0 [ 124.526554][ T3388] do_syscall_64+0x4c/0xa0 [ 124.531000][ T3388] ? clear_bhb_loop+0x50/0xa0 [ 124.535700][ T3388] ? clear_bhb_loop+0x50/0xa0 [ 124.540412][ T3388] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 124.546332][ T3388] RIP: 0033:0x7f8ee2496cb9 [ 124.550773][ T3388] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 124.570405][ T3388] RSP: 002b:00007f8ee0ef3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 124.578842][ T3388] RAX: ffffffffffffffda RBX: 00007f8ee2711fa0 RCX: 00007f8ee2496cb9 [ 124.586831][ T3388] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000003 [ 124.594831][ T3388] RBP: 00007f8ee0ef3090 R08: 0000000000000000 R09: 0000000000000000 [ 124.602842][ T3388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 124.610826][ T3388] R13: 00007f8ee2712038 R14: 00007f8ee2711fa0 R15: 00007ffd8b0f7a08 [ 124.618814][ T3388] [ 125.266523][ T3422] device sit0 left promiscuous mode [ 125.501894][ T3423] device sit0 entered promiscuous mode [ 125.778247][ T3431] FAULT_INJECTION: forcing a failure. [ 125.778247][ T3431] name failslab, interval 1, probability 0, space 0, times 0 [ 125.886573][ T3431] CPU: 1 PID: 3431 Comm: syz.1.951 Not tainted syzkaller #0 [ 125.894005][ T3431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 125.904075][ T3431] Call Trace: [ 125.907366][ T3431] [ 125.910315][ T3431] __dump_stack+0x21/0x30 [ 125.914769][ T3431] dump_stack_lvl+0x110/0x170 [ 125.919466][ T3431] ? show_regs_print_info+0x20/0x20 [ 125.924683][ T3431] ? kernfs_xattr_get+0x81/0x90 [ 125.929553][ T3431] dump_stack+0x15/0x20 [ 125.933721][ T3431] should_fail+0x3c1/0x510 [ 125.938152][ T3431] __should_failslab+0xa4/0xe0 [ 125.942942][ T3431] should_failslab+0x9/0x20 [ 125.947467][ T3431] slab_pre_alloc_hook+0x3b/0xe0 [ 125.952427][ T3431] ? __kernfs_new_node+0xe3/0x6b0 [ 125.957479][ T3431] kmem_cache_alloc+0x44/0x260 [ 125.962292][ T3431] __kernfs_new_node+0xe3/0x6b0 [ 125.967150][ T3431] ? rwsem_write_trylock+0x136/0x300 [ 125.972453][ T3431] ? clear_nonspinnable+0x60/0x60 [ 125.977512][ T3431] ? kernfs_new_node+0x260/0x260 [ 125.982477][ T3431] ? rwsem_write_trylock+0x136/0x300 [ 125.987784][ T3431] ? up_write+0x7b/0x290 [ 125.992138][ T3431] kernfs_new_node+0x150/0x260 [ 125.996915][ T3431] __kernfs_create_file+0x4e/0x270 [ 126.002036][ T3431] sysfs_add_file_mode_ns+0x29a/0x350 [ 126.007426][ T3431] internal_create_group+0x495/0xd00 [ 126.012771][ T3431] ? up_write+0x7b/0x290 [ 126.017025][ T3431] ? sysfs_create_group+0x30/0x30 [ 126.022061][ T3431] ? __kasan_check_write+0x14/0x20 [ 126.027207][ T3431] ? kernfs_put+0x449/0x480 [ 126.031751][ T3431] sysfs_create_groups+0x58/0x120 [ 126.036794][ T3431] device_add_attrs+0x8c/0x700 [ 126.041576][ T3431] device_add+0x5e3/0xed0 [ 126.045924][ T3431] netdev_register_kobject+0x1bc/0x360 [ 126.051402][ T3431] ? raw_notifier_call_chain+0xe9/0x100 [ 126.056974][ T3431] register_netdevice+0xe85/0x1460 [ 126.062105][ T3431] ? netif_stacked_transfer_operstate+0x220/0x220 [ 126.068541][ T3431] ? mutex_unlock+0x8f/0x230 [ 126.073163][ T3431] ? __mutex_lock_slowpath+0x10/0x10 [ 126.078462][ T3431] ppp_dev_configure+0x814/0xac0 [ 126.083426][ T3431] ppp_ioctl+0x64b/0x1790 [ 126.087776][ T3431] ? ppp_poll+0x260/0x260 [ 126.092143][ T3431] ? security_file_ioctl+0x84/0xa0 [ 126.097282][ T3431] ? ppp_poll+0x260/0x260 [ 126.101621][ T3431] __se_sys_ioctl+0x121/0x1a0 [ 126.106311][ T3431] __x64_sys_ioctl+0x7b/0x90 [ 126.110923][ T3431] x64_sys_call+0x2f/0x9a0 [ 126.115357][ T3431] do_syscall_64+0x4c/0xa0 [ 126.119795][ T3431] ? clear_bhb_loop+0x50/0xa0 [ 126.124495][ T3431] ? clear_bhb_loop+0x50/0xa0 [ 126.129199][ T3431] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 126.135121][ T3431] RIP: 0033:0x7f8ee2496cb9 [ 126.139552][ T3431] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 126.159178][ T3431] RSP: 002b:00007f8ee0ef3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 126.167609][ T3431] RAX: ffffffffffffffda RBX: 00007f8ee2711fa0 RCX: 00007f8ee2496cb9 [ 126.175589][ T3431] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000003 [ 126.183561][ T3431] RBP: 00007f8ee0ef3090 R08: 0000000000000000 R09: 0000000000000000 [ 126.191531][ T3431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 126.199502][ T3431] R13: 00007f8ee2712038 R14: 00007f8ee2711fa0 R15: 00007ffd8b0f7a08 [ 126.207529][ T3431] [ 126.359252][ T3451] bond_slave_1: mtu less than device minimum [ 126.377764][ T3453] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.385000][ T3453] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.174490][ T3487] FAULT_INJECTION: forcing a failure. [ 127.174490][ T3487] name failslab, interval 1, probability 0, space 0, times 0 [ 127.260053][ T3487] CPU: 1 PID: 3487 Comm: syz.2.970 Not tainted syzkaller #0 [ 127.267401][ T3487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 127.277498][ T3487] Call Trace: [ 127.280797][ T3487] [ 127.283740][ T3487] __dump_stack+0x21/0x30 [ 127.288096][ T3487] dump_stack_lvl+0x110/0x170 [ 127.292805][ T3487] ? show_regs_print_info+0x20/0x20 [ 127.298009][ T3487] ? kernfs_xattr_get+0x81/0x90 [ 127.302871][ T3487] dump_stack+0x15/0x20 [ 127.307039][ T3487] should_fail+0x3c1/0x510 [ 127.311470][ T3487] __should_failslab+0xa4/0xe0 [ 127.316249][ T3487] should_failslab+0x9/0x20 [ 127.320766][ T3487] slab_pre_alloc_hook+0x3b/0xe0 [ 127.325715][ T3487] ? __kernfs_new_node+0xe3/0x6b0 [ 127.330755][ T3487] kmem_cache_alloc+0x44/0x260 [ 127.335528][ T3487] __kernfs_new_node+0xe3/0x6b0 [ 127.340514][ T3487] ? rwsem_write_trylock+0x136/0x300 [ 127.345831][ T3487] ? clear_nonspinnable+0x60/0x60 [ 127.350874][ T3487] ? kernfs_new_node+0x260/0x260 [ 127.355831][ T3487] ? rwsem_write_trylock+0x136/0x300 [ 127.361146][ T3487] ? up_write+0x7b/0x290 [ 127.365448][ T3487] kernfs_new_node+0x150/0x260 [ 127.370243][ T3487] __kernfs_create_file+0x4e/0x270 [ 127.375375][ T3487] sysfs_add_file_mode_ns+0x29a/0x350 [ 127.380762][ T3487] internal_create_group+0x495/0xd00 [ 127.386094][ T3487] ? up_write+0x7b/0x290 [ 127.390361][ T3487] ? sysfs_create_group+0x30/0x30 [ 127.395399][ T3487] ? __kasan_check_write+0x14/0x20 [ 127.400521][ T3487] ? kernfs_put+0x449/0x480 [ 127.405037][ T3487] sysfs_create_groups+0x58/0x120 [ 127.410265][ T3487] device_add_attrs+0x8c/0x700 [ 127.415053][ T3487] device_add+0x5e3/0xed0 [ 127.419406][ T3487] netdev_register_kobject+0x1bc/0x360 [ 127.424901][ T3487] ? raw_notifier_call_chain+0xe9/0x100 [ 127.430458][ T3487] register_netdevice+0xe85/0x1460 [ 127.435583][ T3487] ? netif_stacked_transfer_operstate+0x220/0x220 [ 127.442001][ T3487] ? mutex_unlock+0x8f/0x230 [ 127.446600][ T3487] ? __mutex_lock_slowpath+0x10/0x10 [ 127.451910][ T3487] ppp_dev_configure+0x814/0xac0 [ 127.456877][ T3487] ppp_ioctl+0x64b/0x1790 [ 127.461227][ T3487] ? ppp_poll+0x260/0x260 [ 127.465659][ T3487] ? security_file_ioctl+0x84/0xa0 [ 127.470788][ T3487] ? ppp_poll+0x260/0x260 [ 127.475127][ T3487] __se_sys_ioctl+0x121/0x1a0 [ 127.479818][ T3487] __x64_sys_ioctl+0x7b/0x90 [ 127.484419][ T3487] x64_sys_call+0x2f/0x9a0 [ 127.488842][ T3487] do_syscall_64+0x4c/0xa0 [ 127.493274][ T3487] ? clear_bhb_loop+0x50/0xa0 [ 127.497961][ T3487] ? clear_bhb_loop+0x50/0xa0 [ 127.502642][ T3487] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 127.508547][ T3487] RIP: 0033:0x7ff7986b8cb9 [ 127.512970][ T3487] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 127.532586][ T3487] RSP: 002b:00007ff797115028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 127.541006][ T3487] RAX: ffffffffffffffda RBX: 00007ff798933fa0 RCX: 00007ff7986b8cb9 [ 127.548990][ T3487] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000003 [ 127.556965][ T3487] RBP: 00007ff797115090 R08: 0000000000000000 R09: 0000000000000000 [ 127.564952][ T3487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 127.572935][ T3487] R13: 00007ff798934038 R14: 00007ff798933fa0 R15: 00007ffde179a6a8 [ 127.580916][ T3487] [ 128.173910][ T3510] device pim6reg1 entered promiscuous mode [ 129.748393][ T30] audit: type=1400 audit(1768848378.368:150): avc: denied { read } for pid=3572 comm="syz.3.998" dev="nsfs" ino=4026532289 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 129.906491][ T30] audit: type=1400 audit(1768848378.388:151): avc: denied { open } for pid=3572 comm="syz.3.998" path="cgroup:[4026532289]" dev="nsfs" ino=4026532289 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 131.984783][ T3625] ªªªªªª: renamed from veth0_vlan [ 132.403577][ T3643] device pim6reg1 entered promiscuous mode [ 133.604083][ T3683] device pim6reg1 entered promiscuous mode [ 135.126496][ T3727] device pim6reg1 entered promiscuous mode [ 135.318079][ T3731] device syzkaller0 entered promiscuous mode [ 135.502803][ T3741] device pim6reg1 entered promiscuous mode [ 136.711223][ T3766] GPL: port 1(erspan0) entered blocking state [ 136.736444][ T3766] GPL: port 1(erspan0) entered disabled state [ 136.756961][ T3766] device erspan0 entered promiscuous mode [ 136.787979][ T3765] GPL: port 1(erspan0) entered blocking state [ 136.794118][ T3765] GPL: port 1(erspan0) entered forwarding state [ 136.823407][ T3770] device pim6reg1 entered promiscuous mode [ 136.944694][ T3778] device syzkaller0 entered promiscuous mode [ 137.925030][ T3801] FAULT_INJECTION: forcing a failure. [ 137.925030][ T3801] name failslab, interval 1, probability 0, space 0, times 0 [ 137.956471][ T3801] CPU: 1 PID: 3801 Comm: syz.1.1074 Not tainted syzkaller #0 [ 137.963887][ T3801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 137.974217][ T3801] Call Trace: [ 137.977523][ T3801] [ 137.980468][ T3801] __dump_stack+0x21/0x30 [ 137.984831][ T3801] dump_stack_lvl+0x110/0x170 [ 137.989542][ T3801] ? show_regs_print_info+0x20/0x20 [ 137.994784][ T3801] dump_stack+0x15/0x20 [ 137.998955][ T3801] should_fail+0x3c1/0x510 [ 138.003391][ T3801] __should_failslab+0xa4/0xe0 [ 138.008173][ T3801] should_failslab+0x9/0x20 [ 138.012688][ T3801] slab_pre_alloc_hook+0x3b/0xe0 [ 138.017639][ T3801] ? __kernfs_new_node+0xe3/0x6b0 [ 138.022730][ T3801] kmem_cache_alloc+0x44/0x260 [ 138.027533][ T3801] __kernfs_new_node+0xe3/0x6b0 [ 138.032501][ T3801] ? kernfs_new_node+0x260/0x260 [ 138.037456][ T3801] ? from_kuid_munged+0x6b0/0x6b0 [ 138.042521][ T3801] ? kernfs_add_one+0x528/0x650 [ 138.047390][ T3801] ? net_ns_get_ownership+0xf8/0x180 [ 138.052703][ T3801] kernfs_new_node+0x150/0x260 [ 138.057528][ T3801] kernfs_create_dir_ns+0x47/0x130 [ 138.062663][ T3801] internal_create_group+0x21b/0xd00 [ 138.067969][ T3801] ? up_write+0x7b/0x290 [ 138.072237][ T3801] ? sysfs_create_group+0x30/0x30 [ 138.077281][ T3801] ? __kasan_check_write+0x14/0x20 [ 138.082415][ T3801] ? kernfs_put+0x449/0x480 [ 138.086947][ T3801] sysfs_create_groups+0x58/0x120 [ 138.092023][ T3801] device_add_attrs+0x155/0x700 [ 138.096891][ T3801] device_add+0x5e3/0xed0 [ 138.101251][ T3801] netdev_register_kobject+0x1bc/0x360 [ 138.106739][ T3801] ? raw_notifier_call_chain+0xe9/0x100 [ 138.112314][ T3801] register_netdevice+0xe85/0x1460 [ 138.117448][ T3801] ? netif_stacked_transfer_operstate+0x220/0x220 [ 138.123908][ T3801] ? mutex_unlock+0x8f/0x230 [ 138.128522][ T3801] ? __mutex_lock_slowpath+0x10/0x10 [ 138.133866][ T3801] ppp_dev_configure+0x814/0xac0 [ 138.138830][ T3801] ppp_ioctl+0x64b/0x1790 [ 138.143173][ T3801] ? ppp_poll+0x260/0x260 [ 138.147542][ T3801] ? security_file_ioctl+0x84/0xa0 [ 138.152677][ T3801] ? ppp_poll+0x260/0x260 [ 138.157025][ T3801] __se_sys_ioctl+0x121/0x1a0 [ 138.161722][ T3801] __x64_sys_ioctl+0x7b/0x90 [ 138.166333][ T3801] x64_sys_call+0x2f/0x9a0 [ 138.170766][ T3801] do_syscall_64+0x4c/0xa0 [ 138.175209][ T3801] ? clear_bhb_loop+0x50/0xa0 [ 138.179914][ T3801] ? clear_bhb_loop+0x50/0xa0 [ 138.184614][ T3801] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 138.190522][ T3801] RIP: 0033:0x7f8ee2496cb9 [ 138.194948][ T3801] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 138.214568][ T3801] RSP: 002b:00007f8ee0ef3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 138.222994][ T3801] RAX: ffffffffffffffda RBX: 00007f8ee2711fa0 RCX: 00007f8ee2496cb9 [ 138.230984][ T3801] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000003 [ 138.238982][ T3801] RBP: 00007f8ee0ef3090 R08: 0000000000000000 R09: 0000000000000000 [ 138.246964][ T3801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 138.254946][ T3801] R13: 00007f8ee2712038 R14: 00007f8ee2711fa0 R15: 00007ffd8b0f7a08 [ 138.262957][ T3801] [ 139.816392][ T3844] FAULT_INJECTION: forcing a failure. [ 139.816392][ T3844] name failslab, interval 1, probability 0, space 0, times 0 [ 139.836536][ T3844] CPU: 1 PID: 3844 Comm: syz.1.1089 Not tainted syzkaller #0 [ 139.843954][ T3844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 139.854232][ T3844] Call Trace: [ 139.857539][ T3844] [ 139.860488][ T3844] __dump_stack+0x21/0x30 [ 139.864833][ T3844] dump_stack_lvl+0x110/0x170 [ 139.869532][ T3844] ? show_regs_print_info+0x20/0x20 [ 139.874844][ T3844] ? kernfs_xattr_get+0x81/0x90 [ 139.879714][ T3844] dump_stack+0x15/0x20 [ 139.883885][ T3844] should_fail+0x3c1/0x510 [ 139.888415][ T3844] __should_failslab+0xa4/0xe0 [ 139.893209][ T3844] should_failslab+0x9/0x20 [ 139.897730][ T3844] slab_pre_alloc_hook+0x3b/0xe0 [ 139.902689][ T3844] ? __kernfs_new_node+0xe3/0x6b0 [ 139.907720][ T3844] kmem_cache_alloc+0x44/0x260 [ 139.912499][ T3844] __kernfs_new_node+0xe3/0x6b0 [ 139.917384][ T3844] ? rwsem_write_trylock+0x136/0x300 [ 139.922679][ T3844] ? clear_nonspinnable+0x60/0x60 [ 139.927712][ T3844] ? kernfs_new_node+0x260/0x260 [ 139.932658][ T3844] ? rwsem_write_trylock+0x136/0x300 [ 139.937951][ T3844] ? up_write+0x7b/0x290 [ 139.942210][ T3844] kernfs_new_node+0x150/0x260 [ 139.946983][ T3844] __kernfs_create_file+0x4e/0x270 [ 139.952106][ T3844] sysfs_add_file_mode_ns+0x29a/0x350 [ 139.957512][ T3844] internal_create_group+0x495/0xd00 [ 139.962814][ T3844] ? up_write+0x7b/0x290 [ 139.967065][ T3844] ? sysfs_create_group+0x30/0x30 [ 139.972108][ T3844] ? __kasan_check_write+0x14/0x20 [ 139.977229][ T3844] ? kernfs_put+0x449/0x480 [ 139.981736][ T3844] sysfs_create_groups+0x58/0x120 [ 139.986768][ T3844] device_add_attrs+0x8c/0x700 [ 139.991553][ T3844] device_add+0x5e3/0xed0 [ 139.995886][ T3844] netdev_register_kobject+0x1bc/0x360 [ 140.001349][ T3844] ? raw_notifier_call_chain+0xe9/0x100 [ 140.006895][ T3844] register_netdevice+0xe85/0x1460 [ 140.012012][ T3844] ? netif_stacked_transfer_operstate+0x220/0x220 [ 140.018457][ T3844] ? mutex_unlock+0x8f/0x230 [ 140.023054][ T3844] ? __mutex_lock_slowpath+0x10/0x10 [ 140.028442][ T3844] ppp_dev_configure+0x814/0xac0 [ 140.033391][ T3844] ppp_ioctl+0x64b/0x1790 [ 140.037734][ T3844] ? ppp_poll+0x260/0x260 [ 140.042081][ T3844] ? security_file_ioctl+0x84/0xa0 [ 140.047198][ T3844] ? ppp_poll+0x260/0x260 [ 140.051537][ T3844] __se_sys_ioctl+0x121/0x1a0 [ 140.056233][ T3844] __x64_sys_ioctl+0x7b/0x90 [ 140.060832][ T3844] x64_sys_call+0x2f/0x9a0 [ 140.065268][ T3844] do_syscall_64+0x4c/0xa0 [ 140.069698][ T3844] ? clear_bhb_loop+0x50/0xa0 [ 140.074382][ T3844] ? clear_bhb_loop+0x50/0xa0 [ 140.079064][ T3844] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 140.084964][ T3844] RIP: 0033:0x7f8ee2496cb9 [ 140.089386][ T3844] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 140.109007][ T3844] RSP: 002b:00007f8ee0ef3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 140.117438][ T3844] RAX: ffffffffffffffda RBX: 00007f8ee2711fa0 RCX: 00007f8ee2496cb9 [ 140.125561][ T3844] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000003 [ 140.133549][ T3844] RBP: 00007f8ee0ef3090 R08: 0000000000000000 R09: 0000000000000000 [ 140.141537][ T3844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 140.149526][ T3844] R13: 00007f8ee2712038 R14: 00007f8ee2711fa0 R15: 00007ffd8b0f7a08 [ 140.157553][ T3844] [ 140.412831][ T3847] device syzkaller0 entered promiscuous mode [ 141.875123][ T3894] device syzkaller0 entered promiscuous mode [ 142.124646][ T3906] FAULT_INJECTION: forcing a failure. [ 142.124646][ T3906] name failslab, interval 1, probability 0, space 0, times 0 [ 142.218675][ T3906] CPU: 1 PID: 3906 Comm: syz.4.1110 Not tainted syzkaller #0 [ 142.226115][ T3906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 142.236188][ T3906] Call Trace: [ 142.239480][ T3906] [ 142.242421][ T3906] __dump_stack+0x21/0x30 [ 142.246778][ T3906] dump_stack_lvl+0x110/0x170 [ 142.251469][ T3906] ? show_regs_print_info+0x20/0x20 [ 142.256675][ T3906] ? kernfs_xattr_get+0x81/0x90 [ 142.261542][ T3906] dump_stack+0x15/0x20 [ 142.265717][ T3906] should_fail+0x3c1/0x510 [ 142.270180][ T3906] __should_failslab+0xa4/0xe0 [ 142.274962][ T3906] should_failslab+0x9/0x20 [ 142.279472][ T3906] slab_pre_alloc_hook+0x3b/0xe0 [ 142.284421][ T3906] ? __kernfs_new_node+0xe3/0x6b0 [ 142.289463][ T3906] kmem_cache_alloc+0x44/0x260 [ 142.294252][ T3906] __kernfs_new_node+0xe3/0x6b0 [ 142.299107][ T3906] ? rwsem_write_trylock+0x136/0x300 [ 142.304405][ T3906] ? clear_nonspinnable+0x60/0x60 [ 142.309438][ T3906] ? kernfs_new_node+0x260/0x260 [ 142.314376][ T3906] ? rwsem_write_trylock+0x136/0x300 [ 142.319676][ T3906] ? up_write+0x7b/0x290 [ 142.323932][ T3906] kernfs_new_node+0x150/0x260 [ 142.328719][ T3906] __kernfs_create_file+0x4e/0x270 [ 142.333842][ T3906] sysfs_add_file_mode_ns+0x29a/0x350 [ 142.339229][ T3906] internal_create_group+0x495/0xd00 [ 142.344545][ T3906] ? up_write+0x7b/0x290 [ 142.348805][ T3906] ? sysfs_create_group+0x30/0x30 [ 142.353841][ T3906] ? __kasan_check_write+0x14/0x20 [ 142.358955][ T3906] ? kernfs_put+0x449/0x480 [ 142.363466][ T3906] sysfs_create_groups+0x58/0x120 [ 142.368500][ T3906] device_add_attrs+0x155/0x700 [ 142.373361][ T3906] device_add+0x5e3/0xed0 [ 142.377827][ T3906] netdev_register_kobject+0x1bc/0x360 [ 142.383302][ T3906] ? raw_notifier_call_chain+0xe9/0x100 [ 142.388855][ T3906] register_netdevice+0xe85/0x1460 [ 142.393979][ T3906] ? netif_stacked_transfer_operstate+0x220/0x220 [ 142.400401][ T3906] ? mutex_unlock+0x8f/0x230 [ 142.405005][ T3906] ? __mutex_lock_slowpath+0x10/0x10 [ 142.410313][ T3906] ppp_dev_configure+0x814/0xac0 [ 142.415280][ T3906] ppp_ioctl+0x64b/0x1790 [ 142.419616][ T3906] ? ppp_poll+0x260/0x260 [ 142.423949][ T3906] ? security_file_ioctl+0x84/0xa0 [ 142.429068][ T3906] ? ppp_poll+0x260/0x260 [ 142.433399][ T3906] __se_sys_ioctl+0x121/0x1a0 [ 142.438084][ T3906] __x64_sys_ioctl+0x7b/0x90 [ 142.442693][ T3906] x64_sys_call+0x2f/0x9a0 [ 142.447114][ T3906] do_syscall_64+0x4c/0xa0 [ 142.451536][ T3906] ? clear_bhb_loop+0x50/0xa0 [ 142.456231][ T3906] ? clear_bhb_loop+0x50/0xa0 [ 142.460908][ T3906] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 142.466807][ T3906] RIP: 0033:0x7f30d6127cb9 [ 142.471228][ T3906] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 142.490840][ T3906] RSP: 002b:00007f30d4b84028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 142.499266][ T3906] RAX: ffffffffffffffda RBX: 00007f30d63a2fa0 RCX: 00007f30d6127cb9 [ 142.507254][ T3906] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000003 [ 142.515241][ T3906] RBP: 00007f30d4b84090 R08: 0000000000000000 R09: 0000000000000000 [ 142.523227][ T3906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 142.531202][ T3906] R13: 00007f30d63a3038 R14: 00007f30d63a2fa0 R15: 00007ffd721c0718 [ 142.539180][ T3906] [ 154.779899][ T3935] device pim6reg1 entered promiscuous mode [ 155.093911][ T3942] device pim6reg1 entered promiscuous mode [ 155.462906][ T3960] device syzkaller0 entered promiscuous mode [ 156.140069][ T3982] device pim6reg1 entered promiscuous mode [ 156.910184][ T3980] general protection fault, probably for non-canonical address 0xdffffc0000000018: 0000 [#1] PREEMPT SMP KASAN [ 156.921958][ T3980] KASAN: null-ptr-deref in range [0x00000000000000c0-0x00000000000000c7] [ 156.930375][ T3980] CPU: 1 PID: 3980 Comm: syz.1.1135 Not tainted syzkaller #0 [ 156.937766][ T3980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 156.947850][ T3980] RIP: 0010:sk_psock_verdict_data_ready+0x143/0x1d0 [ 156.954484][ T3980] Code: 24 50 48 c7 44 24 48 01 00 00 00 43 80 3c 2e 00 74 08 4c 89 ff e8 cd 1b d1 fd 41 bc c0 00 00 00 4d 03 27 4c 89 e0 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 e7 e8 ae 1b d1 fd 48 8b 7c 24 18 48 8d [ 156.974220][ T3980] RSP: 0018:ffffc90000b477e0 EFLAGS: 00010206 [ 156.980304][ T3980] RAX: 0000000000000018 RBX: 1ffff92000168f00 RCX: 0000000000080000 [ 156.988294][ T3980] RDX: ffffc9000171c000 RSI: 00000000000176a1 RDI: 00000000000176a2 [ 156.996304][ T3980] RBP: ffffc90000b478b0 R08: ffffc90000b4783f R09: ffffc90000b47820 [ 157.004308][ T3980] R10: dffffc0000000000 R11: fffff52000168f08 R12: 00000000000000c0 [ 157.012305][ T3980] R13: dffffc0000000000 R14: 1ffff110253b0584 R15: ffff888129d82c20 [ 157.020293][ T3980] FS: 00007f8ee0ef36c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 157.029249][ T3980] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 157.035846][ T3980] CR2: 0000000100000000 CR3: 00000001b751e000 CR4: 00000000003506a0 [ 157.043833][ T3980] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 157.051818][ T3980] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 157.059802][ T3980] Call Trace: [ 157.063121][ T3980] [ 157.066068][ T3980] ? sk_psock_start_verdict+0xc0/0xc0 [ 157.071449][ T3980] ? _raw_spin_lock+0x94/0xf0 [ 157.076148][ T3980] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 157.081963][ T3980] ? skb_queue_tail+0xcb/0xf0 [ 157.086654][ T3980] unix_stream_sendmsg+0x7d1/0xc90 [ 157.091778][ T3980] ? unix_stream_sendmsg+0x7d1/0xc90 [ 157.097078][ T3980] ? unix_show_fdinfo+0xa0/0xa0 [ 157.101941][ T3980] ? irqentry_exit+0x37/0x40 [ 157.106538][ T3980] ? security_socket_sendmsg+0x82/0xa0 [ 157.112001][ T3980] ? unix_show_fdinfo+0xa0/0xa0 [ 157.116855][ T3980] ____sys_sendmsg+0x5b7/0x8f0 [ 157.121627][ T3980] ? __sys_sendmsg_sock+0x40/0x40 [ 157.126668][ T3980] ? import_iovec+0x7c/0xb0 [ 157.131187][ T3980] ___sys_sendmsg+0x236/0x2e0 [ 157.135889][ T3980] ? __sys_sendmsg+0x280/0x280 [ 157.140671][ T3980] ? __fdget+0x1a1/0x230 [ 157.144923][ T3980] __x64_sys_sendmsg+0x206/0x2f0 [ 157.149870][ T3980] ? ___sys_sendmsg+0x2e0/0x2e0 [ 157.154737][ T3980] ? __kasan_check_write+0x14/0x20 [ 157.159863][ T3980] ? switch_fpu_return+0x15d/0x2c0 [ 157.165008][ T3980] x64_sys_call+0x4b/0x9a0 [ 157.169452][ T3980] do_syscall_64+0x4c/0xa0 [ 157.173880][ T3980] ? clear_bhb_loop+0x50/0xa0 [ 157.178577][ T3980] ? clear_bhb_loop+0x50/0xa0 [ 157.183355][ T3980] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 157.189280][ T3980] RIP: 0033:0x7f8ee2496cb9 [ 157.193711][ T3980] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 157.213323][ T3980] RSP: 002b:00007f8ee0ef3028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 157.221746][ T3980] RAX: ffffffffffffffda RBX: 00007f8ee2711fa0 RCX: 00007f8ee2496cb9 [ 157.229734][ T3980] RDX: 0000000000000003 RSI: 0000200000000980 RDI: 0000000000000006 [ 157.237708][ T3980] RBP: 00007f8ee2504bf7 R08: 0000000000000000 R09: 0000000000000000 [ 157.245684][ T3980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 157.253652][ T3980] R13: 00007f8ee2712038 R14: 00007f8ee2711fa0 R15: 00007ffd8b0f7a08 [ 157.261641][ T3980] [ 157.264681][ T3980] Modules linked in: [ 157.278439][ T30] audit: type=1400 audit(1768848405.898:152): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 157.346727][ T30] audit: type=1400 audit(1768848405.898:153): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 157.386500][ T30] audit: type=1400 audit(1768848405.898:154): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 157.436461][ T30] audit: type=1400 audit(1768848405.898:155): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 157.488381][ T30] audit: type=1400 audit(1768848405.898:156): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 157.546742][ T30] audit: type=1400 audit(1768848405.898:157): avc: denied { append open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 157.586483][ T3980] ---[ end trace b579b049b91ef681 ]--- [ 157.591990][ T3980] RIP: 0010:sk_psock_verdict_data_ready+0x143/0x1d0 [ 157.602377][ T3980] Code: 24 50 48 c7 44 24 48 01 00 00 00 43 80 3c 2e 00 74 08 4c 89 ff e8 cd 1b d1 fd 41 bc c0 00 00 00 4d 03 27 4c 89 e0 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 e7 e8 ae 1b d1 fd 48 8b 7c 24 18 48 8d [ 157.632246][ T30] audit: type=1400 audit(1768848405.898:158): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 157.643406][ T3980] RSP: 0018:ffffc90000b477e0 EFLAGS: 00010206 [ 157.681184][ T3980] RAX: 0000000000000018 RBX: 1ffff92000168f00 RCX: 0000000000080000 [ 157.698812][ T3980] RDX: ffffc9000171c000 RSI: 00000000000176a1 RDI: 00000000000176a2 [ 157.715569][ T3980] RBP: ffffc90000b478b0 R08: ffffc90000b4783f R09: ffffc90000b47820 [ 157.731370][ T3980] R10: dffffc0000000000 R11: fffff52000168f08 R12: 00000000000000c0 [ 157.749552][ T3980] R13: dffffc0000000000 R14: 1ffff110253b0584 R15: ffff888129d82c20 [ 157.767702][ T3980] FS: 00007f8ee0ef36c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 157.787174][ T3980] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 157.801454][ T3980] CR2: 0000001b32916ff8 CR3: 00000001b751e000 CR4: 00000000003506b0 [ 157.818874][ T3980] DR0: 0100000000000000 DR1: 0100000000000000 DR2: 0000000000000000 [ 157.835702][ T3980] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000050602 [ 157.856455][ T3980] Kernel panic - not syncing: Fatal exception [ 157.862905][ T3980] Kernel Offset: disabled [ 157.867232][ T3980] Rebooting in 86400 seconds..