last executing test programs: 2.921921048s ago: executing program 2 (id=2176): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfdef) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000c000000000000000800000004000000bb7f1a004d00feff0000000095d0ffffffffffff"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x4c) 2.385378082s ago: executing program 0 (id=2185): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r2}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r4], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000540), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xcd62b1ab) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYRESHEX, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfeffffff, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2f}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f0, &(0x7f0000000080)) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2.134779133s ago: executing program 0 (id=2190): close(0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={0x0}, 0x18) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffdd5) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB], &(0x7f0000000000)='syzkaller\x00'}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='task_newtask\x00', r1}, 0x12) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) close(r3) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xf71}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x83, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000180), 0x1}, 0x0, 0x0, 0xffffffff, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x9, &(0x7f0000000600), 0x47) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f00000002c0)=r3}, 0x20) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x1, 0x0, 0x64}, 0x1f00) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00'}, 0x10) 2.058432834s ago: executing program 2 (id=2192): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000012c0)=ANY=[@ANYBLOB="1200000001000000040000000200000000000000", @ANYRES32, @ANYBLOB="0000800000000000000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) gettid() bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff85000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='f2fs_write_begin\x00', r2, 0x0, 0xfffffffffffffffc}, 0x18) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x24, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x24, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@ifindex, 0x11, 0x0, 0x8, &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000380)='mm_page_alloc\x00'}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r5 = openat$cgroup_int(r4, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f0000000100), 0x12) syz_clone(0x62005000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffe85, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r6, 0x0, 0x12, 0x300, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0x300, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x2000000, 0x0, 0xe00}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x84000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1}, &(0x7f0000000040), &(0x7f0000000140)=r0}, 0x20) 1.27431363s ago: executing program 0 (id=2203): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000500)='kmem_cache_free\x00', r2}, 0x18) ioctl$TUNSETOFFLOAD(r1, 0x4004743d, 0x110e22fff6) close(r0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) 1.162955301s ago: executing program 4 (id=2206): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000800000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 1.107611471s ago: executing program 2 (id=2209): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800001f1a0068099b3c0000000000001860000000000000824d086bb227733218120000", @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 1.092012202s ago: executing program 0 (id=2210): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x48) socketpair(0x1, 0x2, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_procs(r3, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0xc, &(0x7f0000000680)=@raw=[@map_fd={0x18, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff7}}, @exit], &(0x7f0000000280)='GPL\x00', 0x7f, 0x4c, &(0x7f0000000700)=""/76, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000400)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x0, 0x5, 0x40, 0xde0}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000780)=[{0x2, 0x5, 0xd, 0x4}], 0x10, 0xdd8}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r8}, 0x18) close(r7) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000380)={0x80000001, 0x0}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={@fallback=r9, r4, 0x12, 0x202c, 0x0, @void, @void, @value=r10}, 0x20) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180)=r10, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x7, 0x0, 0x58c5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="180800000000000000000000000c0000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 1.085497802s ago: executing program 4 (id=2211): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x100, 0xc8, 0x2, 0x8, 0x0, 0x10001, 0xa, 0x0, 0x800}, 0x0, 0x5, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100033200fe08000000000200875a65969ff57b00000000000002000000000000ac1414aa"], 0xfdef) 1.070156452s ago: executing program 2 (id=2212): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) 1.054074152s ago: executing program 2 (id=2213): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x100000, 0x0, 0x8, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000005c0)='sched_switch\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0, 0x6}, 0x104101, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55}, 0x48) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f00000004c0), 0x2001, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r8, 0x40047451, &(0x7f0000000180)) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0x33fe0}], 0x1}, 0x0) 933.086952ms ago: executing program 4 (id=2215): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000002c0)='net_dev_start_xmit\x00', r1}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x2037, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x80}, 0x103100, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) 874.658563ms ago: executing program 3 (id=2217): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x18140, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfd, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xffffffff}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r3}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce81ea036c00fe08000000000200875a65969ff57b00000000000000000000000006ac1414aa"], 0xfdef) 862.889163ms ago: executing program 4 (id=2218): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="180000d0000000000000000000000000850000002300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r2, 0x0, 0x500000000000000}, 0x10) 822.299023ms ago: executing program 3 (id=2219): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x8, 0xdd, 0x40}, 0x50) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0x54, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x100, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r1, &(0x7f0000000140), &(0x7f0000000000)=""/6, 0x2}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x75, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x9c}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}]}, &(0x7f0000000000)='GPL\x00'}, 0x80) 757.463634ms ago: executing program 4 (id=2220): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0xa, 0x1, 0x1, 0x0, 0xfffffffffffffffd, 0xc744c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1, 0x6}, 0x314078, 0xc8, 0x0, 0x0, 0x35, 0xe3bb, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x3, 0xffffffffffffffff, 0x9) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0xa, 0x1, 0x1, 0x0, 0xfffffffffffffffd, 0xc744c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1, 0x6}, 0x314078, 0xc8, 0x0, 0x0, 0x35, 0xe3bb, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x3, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x7, 0x6, 0xc}, 0x48) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x7, 0x6, 0xc}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001740)={r7, 0xe0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001480)=[0x0], 0x0, 0x9a, &(0x7f00000014c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001580), &(0x7f00000015c0), 0x8, 0x48, 0x8, 0x8, &(0x7f0000001600)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x16, 0x19, &(0x7f0000001980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@alu={0x4, 0x1, 0xb, 0x6, 0x6, 0x4, 0x4}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x13}, @exit, @btf_id={0x18, 0x5340bab17dc7042a, 0x3, 0x0, 0x1}, @generic={0x8, 0x4, 0x8, 0x7, 0x4}, @exit, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001180)='GPL\x00', 0x1, 0xca, &(0x7f00000011c0)=""/202, 0x82000, 0x8, '\x00', r8, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000001780)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2, 0x9, &(0x7f00000017c0)=[r7, r7, r7, r7, r7, 0xffffffffffffffff, r7, r7], &(0x7f0000001800)=[{0x0, 0x5, 0x3, 0xa}, {0x5, 0x2, 0x1, 0x6}, {0x0, 0x1, 0xc, 0xb}, {0x4, 0x3, 0x5}, {0x0, 0x2, 0x0, 0x1}, {0x4, 0x4, 0x3, 0x8}, {0x3, 0x2, 0xffffffff, 0xa}, {0x3, 0x2, 0x0, 0x3}, {0x3, 0x2, 0xb, 0xd}], 0x10, 0x3}, 0x94) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=r9, 0x17) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x3}, 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r12}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r12}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r6, 0x20, &(0x7f0000000a00)={&(0x7f0000000840)=""/208, 0xd0, 0x0, &(0x7f0000000940)=""/145, 0x91}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x20, 0xc, &(0x7f00000012c0)=ANY=[@ANYBLOB="180000000500000000000000040000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008500000006000000852000000400000095000075793026a359749904009f6178d6845d532f1ed1d5f00000000000"], &(0x7f0000000040)='syzkaller\x00', 0x8, 0x9f, &(0x7f00000002c0)=""/159, 0x41000, 0x9, '\x00', r8, @netfilter, r10, 0x8, &(0x7f00000007c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x2, 0x0, 0x5, 0x6}, 0x10, r13, 0xffffffffffffffff, 0x8, &(0x7f0000000a80), &(0x7f0000000ac0)=[{0x1, 0x4, 0x9, 0x3}, {0x0, 0xffffffc0, 0x9, 0x2}, {0x2, 0x2, 0x1, 0x8}, {0x5, 0x5, 0x1, 0x8}, {0x4, 0x4, 0x8, 0x9}, {0x0, 0x1, 0x1}, {0x2, 0x2, 0x0, 0xa}, {0x5, 0x4, 0xa, 0x5}], 0x10, 0xfffff800}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x20, 0xc, &(0x7f00000012c0)=ANY=[@ANYBLOB="180000000500000000000000040000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000060000008500000006000000852000000400000095000075793026a359749904009f6178d6845d532f1ed1d5f00000000000"], &(0x7f0000000040)='syzkaller\x00', 0x8, 0x9f, &(0x7f00000002c0)=""/159, 0x41000, 0x9, '\x00', r8, @netfilter, r10, 0x8, &(0x7f00000007c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x2, 0x0, 0x5, 0x6}, 0x10, r13, 0xffffffffffffffff, 0x8, &(0x7f0000000a80), &(0x7f0000000ac0)=[{0x1, 0x4, 0x9, 0x3}, {0x0, 0xffffffc0, 0x9, 0x2}, {0x2, 0x2, 0x1, 0x8}, {0x5, 0x5, 0x1, 0x8}, {0x4, 0x4, 0x8, 0x9}, {0x0, 0x1, 0x1}, {0x2, 0x2, 0x0, 0xa}, {0x5, 0x4, 0xa, 0x5}], 0x10, 0xfffff800}, 0x94) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r14}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x1ffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 756.420594ms ago: executing program 1 (id=2221): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r2}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r4], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000540), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xcd62b1ab) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYRESHEX, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2f}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f0, &(0x7f0000000080)) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 756.276934ms ago: executing program 3 (id=2222): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800001f1a0068099b3c0000000000001860000000000000824d086bb227733218120000", @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 721.414114ms ago: executing program 0 (id=2223): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) 704.841954ms ago: executing program 1 (id=2224): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x73, 0x0, 0x0, 0x0, 0x8, 0x8008a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x7}, 0x11101c, 0xc8, 0x0, 0xf, 0x200, 0x511, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0xfe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x100, 0x7}, 0x481a, 0x0, 0x0, 0x7, 0x0, 0x0, 0xf792, 0x0, 0xffffffff, 0x0, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r2, &(0x7f00000004c0)=ANY=[], 0xfdef) 702.925205ms ago: executing program 3 (id=2225): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000020001000900000001000000", @ANYRES32, @ANYBLOB="f8bd5f9605000000000100000000008000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x5, &(0x7f0000000440)=@framed={{}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x833, 0x0, 0x0, 0x0, 0xb}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r0}, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r5, @ANYRES8=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r6}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000980)={0xc}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x10000000000000, 0x88000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x100c, 0xc8, 0xffffffff, 0x0, 0x2, 0x0, 0x3, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x9) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x4d}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce810203320800ff00000000000012000000ac14140a0000000000ff000000000000ac1414aa"], 0xfdef) 679.408235ms ago: executing program 1 (id=2226): bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0a00000001010000fc7f0000cc00000000000000de775a4d7277", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000180"], 0x50) 649.849545ms ago: executing program 0 (id=2227): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xffffffff, 0x4}, 0x0, 0x0, 0x1000, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) syz_clone(0x160480, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000000)='./file0\x00'}, 0x18) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000000)='./file0\x00'}, 0x18) 603.114745ms ago: executing program 1 (id=2228): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000010000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) (async, rerun: 32) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/20], 0x48) (async, rerun: 64) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x2d) (async, rerun: 64) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.threads\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f00000001c0), 0x4) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f0000000180), &(0x7f0000000280)}, 0x20) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r6, 0x0, 0x20000000}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 602.917885ms ago: executing program 1 (id=2229): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000002300)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00083300db5b686158bbcfe8875a0603000011230000000000000000000000fcac1414aa"], 0xfdef) 559.484986ms ago: executing program 3 (id=2230): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000880)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r0, @ANYRES16=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYBLOB="97877bb4f71a4b0420aa5454611eb443ae33e9fa099061b27541616b89c748e596d24acb69e2a6442c41affda077f8e63444e2f1a74c6b74aa834d68c5da07d9e2e7c824866815ef111b984d04f67db27c7f105c8bc2d819139008afc4d7f290adcb22d58d447c373ed8080749feb4035aba0377e7f2ebf5b0bfdf727baa9b975e7b9969a73112dab827b74811fa8e7c997918bfd673a9e9fe111830c1cc5cf031a5ec1ac54f9e5ecb9b88eecd3f8b4101af38dcce3b", @ANYRES64=r3, @ANYBLOB="cfb1a62fdc0d3e9726160385c50909c16e31ca7ece530af66099f9b7a973aecb8c12981fd7ba316e202317ff6e8a0bd1fdb957d60aec4530ae2d5ee64d682cee47b0833f", @ANYRES64=r1], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, 0x0, 0x0) close(r6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) openat$cgroup_int(r8, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r10 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r9, &(0x7f0000000140)=r10, 0x12) openat$cgroup_procs(r8, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 473.739246ms ago: executing program 1 (id=2231): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x80, 0x7}, 0x0, 0x8, 0x0, 0x0, 0x2, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x100}, 0x0, 0x3, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000004800000000000007f"], 0xfdef) 449.768406ms ago: executing program 32 (id=2231): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x80, 0x7}, 0x0, 0x8, 0x0, 0x0, 0x2, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x100}, 0x0, 0x3, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000004800000000000007f"], 0xfdef) 403.168177ms ago: executing program 3 (id=2233): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x10, 0x25, 0x4, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000004f57fe000000000003f19ed10a7fe00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7050000080000008500000007000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b705000008000000850000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x26, 0x0, 0x1}, 0x28) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_freezer_state(r1, 0x0, 0x2, 0x0) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 402.919777ms ago: executing program 33 (id=2233): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x10, 0x25, 0x4, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000004f57fe000000000003f19ed10a7fe00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7050000080000008500000007000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b705000008000000850000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x26, 0x0, 0x1}, 0x28) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_freezer_state(r1, 0x0, 0x2, 0x0) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 6.787ms ago: executing program 2 (id=2234): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x94c, 0x8820, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x3}, 0x0, 0xc8, 0x0, 0x6, 0x2, 0x0, 0x400, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) 6.62672ms ago: executing program 34 (id=2234): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x94c, 0x8820, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x3}, 0x0, 0xc8, 0x0, 0x6, 0x2, 0x0, 0x400, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) 1.67518ms ago: executing program 4 (id=2235): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 0s ago: executing program 35 (id=2235): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.183' (ED25519) to the list of known hosts. [ 19.796467][ T30] audit: type=1400 audit(1761874447.235:64): avc: denied { mounton } for pid=274 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.797851][ T274] cgroup: Unknown subsys name 'net' [ 19.803271][ T30] audit: type=1400 audit(1761874447.235:65): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.811625][ T30] audit: type=1400 audit(1761874447.245:66): avc: denied { unmount } for pid=274 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.811755][ T274] cgroup: Unknown subsys name 'devices' [ 20.002352][ T274] cgroup: Unknown subsys name 'hugetlb' [ 20.007962][ T274] cgroup: Unknown subsys name 'rlimit' [ 20.265664][ T30] audit: type=1400 audit(1761874447.705:67): avc: denied { setattr } for pid=274 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.288937][ T30] audit: type=1400 audit(1761874447.705:68): avc: denied { mounton } for pid=274 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.313708][ T30] audit: type=1400 audit(1761874447.705:69): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.320505][ T276] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 20.345692][ T30] audit: type=1400 audit(1761874447.785:70): avc: denied { relabelto } for pid=276 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.371125][ T30] audit: type=1400 audit(1761874447.785:71): avc: denied { write } for pid=276 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.404067][ T30] audit: type=1400 audit(1761874447.845:72): avc: denied { read } for pid=274 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.429601][ T30] audit: type=1400 audit(1761874447.845:73): avc: denied { open } for pid=274 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.429660][ T274] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.962872][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.969932][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.977465][ T282] device bridge_slave_0 entered promiscuous mode [ 20.984458][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.991601][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.998969][ T282] device bridge_slave_1 entered promiscuous mode [ 21.114386][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.121460][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.128785][ T283] device bridge_slave_0 entered promiscuous mode [ 21.135776][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.142970][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.150243][ T283] device bridge_slave_1 entered promiscuous mode [ 21.181608][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.188640][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.196110][ T289] device bridge_slave_0 entered promiscuous mode [ 21.202981][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.210018][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.217409][ T289] device bridge_slave_1 entered promiscuous mode [ 21.247892][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.254959][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.262351][ T284] device bridge_slave_0 entered promiscuous mode [ 21.269031][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.276098][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.283392][ T284] device bridge_slave_1 entered promiscuous mode [ 21.345255][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.352431][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.359716][ T288] device bridge_slave_0 entered promiscuous mode [ 21.382004][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.389041][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.396436][ T288] device bridge_slave_1 entered promiscuous mode [ 21.451226][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.458254][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.465535][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.472564][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.502076][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.509153][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.516460][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.523497][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.539343][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.546407][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.553683][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.560720][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.601342][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.608377][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.615664][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.622704][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.652630][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.661234][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.670080][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.677226][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.684415][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.691976][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.699099][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.706317][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.714125][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.721548][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.740794][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.748741][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.758933][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.772868][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.785329][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.795185][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.809867][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.818055][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.825113][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.832474][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.840902][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.847923][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.855255][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.863415][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.870443][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.879283][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.887532][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.894558][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.914582][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.922352][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.930625][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.937680][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.945574][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.952948][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.961141][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.968160][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.975496][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.983758][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.990787][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.998073][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.005971][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.013931][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.022103][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.029117][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.041733][ T282] device veth0_vlan entered promiscuous mode [ 22.061102][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.068990][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.077305][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.085483][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.093526][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.101734][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.109656][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.117791][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.126041][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.134084][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.141958][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.150164][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.158497][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.165992][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.179678][ T283] device veth0_vlan entered promiscuous mode [ 22.187133][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.195677][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.204100][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.212187][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.220127][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.228002][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.237527][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.245700][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.256104][ T289] device veth0_vlan entered promiscuous mode [ 22.269419][ T284] device veth0_vlan entered promiscuous mode [ 22.277565][ T282] device veth1_macvtap entered promiscuous mode [ 22.284354][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.292300][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.300111][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.308273][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.316746][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.325319][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.333272][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.341343][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.349628][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.357791][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.365644][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.373179][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.380685][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.389469][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.397695][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.408741][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.417642][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.432824][ T289] device veth1_macvtap entered promiscuous mode [ 22.439674][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.447476][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.455691][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.463986][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.472267][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.485751][ T283] device veth1_macvtap entered promiscuous mode [ 22.495862][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.503622][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.512297][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.521028][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.529093][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.537663][ T284] device veth1_macvtap entered promiscuous mode [ 22.549574][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.557560][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.566631][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.586657][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.595123][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.603647][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.611905][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.620195][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.628628][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.637015][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.645245][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.653504][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.661359][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.669432][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.677007][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.688452][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.696776][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.707231][ T288] device veth0_vlan entered promiscuous mode [ 22.716278][ T282] request_module fs-gadgetfs succeeded, but still no fs? [ 22.727132][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.736254][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.771279][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.780599][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.811170][ T288] device veth1_macvtap entered promiscuous mode [ 22.850266][ C1] hrtimer: interrupt took 23933 ns [ 22.869106][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.877294][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.885796][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.909297][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.922091][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.944886][ T347] GPL: port 1(veth0_to_team) entered blocking state [ 22.960406][ T347] GPL: port 1(veth0_to_team) entered disabled state [ 22.971022][ T347] device veth0_to_team entered promiscuous mode [ 23.096821][ T355] syz.2.3 uses obsolete (PF_INET,SOCK_PACKET) [ 24.746961][ T381] device veth0_vlan left promiscuous mode [ 24.789685][ T381] device veth0_vlan entered promiscuous mode [ 24.888410][ T383] GPL: port 1(veth0_to_team) entered blocking state [ 24.898414][ T383] GPL: port 1(veth0_to_team) entered disabled state [ 24.910921][ T383] device veth0_to_team entered promiscuous mode [ 24.944618][ T387] device sit0 entered promiscuous mode [ 25.678288][ T418] device veth0_vlan left promiscuous mode [ 25.876229][ T418] device veth0_vlan entered promiscuous mode [ 26.173169][ T436] bond_slave_1: mtu less than device minimum [ 26.361112][ T30] kauditd_printk_skb: 33 callbacks suppressed [ 26.361127][ T30] audit: type=1400 audit(1761874453.795:107): avc: denied { create } for pid=445 comm="syz.3.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 26.585615][ T30] audit: type=1400 audit(1761874453.925:108): avc: denied { write } for pid=445 comm="syz.3.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 26.837032][ T30] audit: type=1400 audit(1761874453.975:109): avc: denied { write } for pid=454 comm="syz.4.38" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 26.915816][ T30] audit: type=1400 audit(1761874453.975:110): avc: denied { open } for pid=454 comm="syz.4.38" path="/dev/ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 26.974733][ T480] device sit0 entered promiscuous mode [ 26.982900][ T479] syz.0.47[479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.982967][ T479] syz.0.47[479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.132611][ T30] audit: type=1400 audit(1761874454.575:111): avc: denied { create } for pid=486 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 27.324419][ T30] audit: type=1400 audit(1761874454.765:112): avc: denied { create } for pid=494 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 27.512250][ T513] device veth0_vlan left promiscuous mode [ 27.531056][ T513] device veth0_vlan entered promiscuous mode [ 27.643103][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.651978][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.664370][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.779051][ T30] audit: type=1400 audit(1761874455.215:113): avc: denied { relabelfrom } for pid=527 comm="syz.3.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 27.948504][ T30] audit: type=1400 audit(1761874455.215:114): avc: denied { relabelto } for pid=527 comm="syz.3.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.392395][ T30] audit: type=1400 audit(1761874455.835:115): avc: denied { setopt } for pid=553 comm="syz.4.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.551953][ T30] audit: type=1400 audit(1761874455.995:116): avc: denied { read } for pid=559 comm="syz.2.77" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.935311][ T609] device veth0_vlan left promiscuous mode [ 28.960221][ T609] device veth0_vlan entered promiscuous mode [ 29.918055][ T650] syz.4.114[650] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.918143][ T650] syz.4.114[650] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.546946][ T675] syz.4.122[675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.619490][ T675] syz.4.122[675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.671722][ T686] device sit0 left promiscuous mode [ 30.955184][ T689] device sit0 entered promiscuous mode [ 31.219336][ T718] FAULT_INJECTION: forcing a failure. [ 31.219336][ T718] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 31.232824][ T718] CPU: 1 PID: 718 Comm: syz.3.135 Not tainted syzkaller #0 [ 31.240046][ T718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 31.250096][ T718] Call Trace: [ 31.253368][ T718] [ 31.256294][ T718] __dump_stack+0x21/0x30 [ 31.260624][ T718] dump_stack_lvl+0xee/0x150 [ 31.265204][ T718] ? show_regs_print_info+0x20/0x20 [ 31.270393][ T718] ? stack_trace_save+0x98/0xe0 [ 31.275235][ T718] ? __stack_depot_save+0x34/0x480 [ 31.280338][ T718] dump_stack+0x15/0x20 [ 31.284484][ T718] should_fail+0x3c1/0x510 [ 31.288888][ T718] should_fail_usercopy+0x1a/0x20 [ 31.293900][ T718] _copy_from_user+0x20/0xd0 [ 31.298479][ T718] __copy_msghdr_from_user+0x448/0x5e0 [ 31.303927][ T718] ? _kstrtoull+0x3c0/0x4d0 [ 31.308424][ T718] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 31.313697][ T718] ? kstrtouint_from_user+0x1a0/0x200 [ 31.319065][ T718] ___sys_sendmsg+0x156/0x260 [ 31.323735][ T718] ? __sys_sendmsg+0x250/0x250 [ 31.328491][ T718] ? __fdget+0x1a1/0x230 [ 31.332723][ T718] __x64_sys_sendmsg+0x1e2/0x2a0 [ 31.337653][ T718] ? ___sys_sendmsg+0x260/0x260 [ 31.342503][ T718] ? ksys_write+0x1eb/0x240 [ 31.346998][ T718] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 31.353072][ T718] x64_sys_call+0x4b/0x9a0 [ 31.357476][ T718] do_syscall_64+0x4c/0xa0 [ 31.361882][ T718] ? clear_bhb_loop+0x50/0xa0 [ 31.366556][ T718] ? clear_bhb_loop+0x50/0xa0 [ 31.371249][ T718] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 31.377139][ T718] RIP: 0033:0x7f66bbd21fc9 [ 31.381543][ T718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 31.401142][ T718] RSP: 002b:00007f66ba78a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 31.409549][ T718] RAX: ffffffffffffffda RBX: 00007f66bbf78fa0 RCX: 00007f66bbd21fc9 [ 31.417520][ T718] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000006 [ 31.425482][ T718] RBP: 00007f66ba78a090 R08: 0000000000000000 R09: 0000000000000000 [ 31.433441][ T718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 31.441397][ T718] R13: 00007f66bbf79038 R14: 00007f66bbf78fa0 R15: 00007fffbc6491e8 [ 31.449363][ T718] [ 31.715507][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 31.715522][ T30] audit: type=1400 audit(1761874459.155:119): avc: denied { ioctl } for pid=737 comm="syz.4.145" path="socket:[17719]" dev="sockfs" ino=17719 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.249313][ T757] device veth0_vlan left promiscuous mode [ 32.343542][ T757] device veth0_vlan entered promiscuous mode [ 32.661895][ T740] syz.3.143 (740) used greatest stack depth: 22000 bytes left [ 32.795539][ T787] device sit0 left promiscuous mode [ 32.861552][ T787] device sit0 entered promiscuous mode [ 33.646122][ T835] syz.3.177[835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.646191][ T835] syz.3.177[835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.842385][ T846] device sit0 entered promiscuous mode [ 34.497029][ T854] syz.2.184[854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.497129][ T854] syz.2.184[854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.508593][ T859] ip6_vti0: mtu greater than device maximum [ 34.696409][ T863] FAULT_INJECTION: forcing a failure. [ 34.696409][ T863] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 34.717262][ T863] CPU: 1 PID: 863 Comm: syz.4.188 Not tainted syzkaller #0 [ 34.724475][ T863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 34.734534][ T863] Call Trace: [ 34.737824][ T863] [ 34.740758][ T863] __dump_stack+0x21/0x30 [ 34.745096][ T863] dump_stack_lvl+0xee/0x150 [ 34.749698][ T863] ? show_regs_print_info+0x20/0x20 [ 34.754901][ T863] ? irqentry_exit+0x37/0x40 [ 34.759496][ T863] dump_stack+0x15/0x20 [ 34.763654][ T863] should_fail+0x3c1/0x510 [ 34.768071][ T863] should_fail_usercopy+0x1a/0x20 [ 34.773091][ T863] _copy_from_user+0x20/0xd0 [ 34.777681][ T863] iovec_from_user+0x1bc/0x2f0 [ 34.782443][ T863] ? __copy_msghdr_from_user+0x302/0x5e0 [ 34.788090][ T863] ? _kstrtoull+0x3c0/0x4d0 [ 34.792594][ T863] __import_iovec+0x71/0x400 [ 34.797189][ T863] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 34.802485][ T863] ? kstrtouint_from_user+0x1a0/0x200 [ 34.807864][ T863] import_iovec+0x7c/0xb0 [ 34.812205][ T863] ___sys_sendmsg+0x1b9/0x260 [ 34.816893][ T863] ? __sys_sendmsg+0x250/0x250 [ 34.821682][ T863] ? __fdget+0x1a1/0x230 [ 34.825934][ T863] __x64_sys_sendmsg+0x1e2/0x2a0 [ 34.830878][ T863] ? ___sys_sendmsg+0x260/0x260 [ 34.835730][ T863] ? ksys_write+0x1eb/0x240 [ 34.840237][ T863] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 34.846338][ T863] x64_sys_call+0x4b/0x9a0 [ 34.850791][ T863] do_syscall_64+0x4c/0xa0 [ 34.855209][ T863] ? clear_bhb_loop+0x50/0xa0 [ 34.859900][ T863] ? clear_bhb_loop+0x50/0xa0 [ 34.864593][ T863] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 34.870619][ T863] RIP: 0033:0x7fabf4f90fc9 [ 34.875051][ T863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.894660][ T863] RSP: 002b:00007fabf39f9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 34.903077][ T863] RAX: ffffffffffffffda RBX: 00007fabf51e7fa0 RCX: 00007fabf4f90fc9 [ 34.911054][ T863] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000006 [ 34.919022][ T863] RBP: 00007fabf39f9090 R08: 0000000000000000 R09: 0000000000000000 [ 34.926991][ T863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 34.934967][ T863] R13: 00007fabf51e8038 R14: 00007fabf51e7fa0 R15: 00007ffdf14f9b98 [ 34.942951][ T863] [ 35.154521][ T880] device pim6reg1 entered promiscuous mode [ 35.656288][ T921] device veth0_vlan left promiscuous mode [ 35.706726][ T921] device veth0_vlan entered promiscuous mode [ 35.885951][ T30] audit: type=1400 audit(1761874463.325:120): avc: denied { create } for pid=924 comm="syz.0.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 36.360816][ T956] syz.0.218[956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.360872][ T956] syz.0.218[956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.640992][ T30] audit: type=1400 audit(1761874464.085:121): avc: denied { cpu } for pid=968 comm="syz.2.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 36.842093][ T979] syz.1.229[979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.842185][ T979] syz.1.229[979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.919243][ T977] device syzkaller0 entered promiscuous mode [ 37.394389][ T1002] syz.4.236[1002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.394448][ T1002] syz.4.236[1002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.584401][ T1013] ref_ctr_offset mismatch. inode: 0x132 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 38.513308][ T1049] ------------[ cut here ]------------ [ 38.535268][ T1049] trace type BPF program uses run-time allocation [ 38.567840][ T1049] WARNING: CPU: 1 PID: 1049 at kernel/bpf/verifier.c:11722 check_map_prog_compatibility+0x6cd/0x870 [ 38.640295][ T1049] Modules linked in: [ 38.644266][ T1049] CPU: 0 PID: 1049 Comm: syz.2.249 Not tainted syzkaller #0 [ 38.654901][ T1049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 38.669429][ T1049] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 38.680965][ T1049] Code: ee ff 48 c7 c6 00 f4 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 46 4b ee ff c6 05 54 99 6b 05 01 48 c7 c7 60 f0 47 85 e8 73 69 25 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 38.708607][ T1049] RSP: 0018:ffffc90000bd7428 EFLAGS: 00010246 [ 38.714918][ T1049] RAX: 3d76bc6c9e52af00 RBX: 0000000000000001 RCX: 0000000000080000 [ 38.760331][ T1049] RDX: ffffc9000230f000 RSI: 0000000000002e36 RDI: 0000000000002e37 [ 38.779984][ T1049] RBP: ffffc90000bd7470 R08: dffffc0000000000 R09: ffffed103ee265e8 [ 38.795789][ T1049] R10: ffffed103ee265e8 R11: 1ffff1103ee265e7 R12: ffff888127934000 [ 38.821590][ T1049] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff8881150c0000 [ 38.853860][ T1049] FS: 00007f1e69b496c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 38.880879][ T1049] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 38.893471][ T1049] CR2: 0000001b2e623ffc CR3: 000000013b609000 CR4: 00000000003506a0 [ 38.910757][ T1049] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 38.930417][ T1049] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 38.982063][ T1049] Call Trace: [ 38.985417][ T1049] [ 39.020473][ T1049] resolve_pseudo_ldimm64+0x685/0x11d0 [ 39.025992][ T1049] ? check_attach_btf_id+0xde0/0xde0 [ 39.035584][ T1049] ? __mark_reg_known+0x1b0/0x1b0 [ 39.109097][ T1049] ? security_capable+0x87/0xb0 [ 39.136673][ T1049] bpf_check+0x2c25/0xf280 [ 39.141459][ T1049] ? 0xffffffffa002a000 [ 39.145659][ T1049] ? is_bpf_text_address+0x177/0x190 [ 39.151233][ T1049] ? bpf_get_btf_vmlinux+0x60/0x60 [ 39.156439][ T1049] ? unwind_get_return_address+0x4d/0x90 [ 39.162320][ T1049] ? stack_trace_save+0xe0/0xe0 [ 39.167242][ T1049] ? arch_stack_walk+0xee/0x140 [ 39.172339][ T1049] ? stack_trace_save+0x98/0xe0 [ 39.177312][ T1049] ? __stack_depot_save+0x34/0x480 [ 39.225372][ T1049] ? __kasan_slab_alloc+0x69/0xf0 [ 39.234802][ T1049] ? _find_next_bit+0x1fa/0x200 [ 39.309210][ T1049] ? __kasan_kmalloc+0xec/0x110 [ 39.314474][ T1049] ? __kasan_kmalloc+0xda/0x110 [ 39.319411][ T1049] ? kmem_cache_alloc_trace+0x119/0x270 [ 39.325246][ T1049] ? selinux_bpf_prog_alloc+0x51/0x140 [ 39.356032][ T1068] FAULT_INJECTION: forcing a failure. [ 39.356032][ T1068] name failslab, interval 1, probability 0, space 0, times 1 [ 39.366719][ T1049] ? security_bpf_prog_alloc+0x62/0x90 [ 39.374572][ T1068] CPU: 0 PID: 1068 Comm: syz.1.256 Not tainted syzkaller #0 [ 39.381875][ T1068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 39.391940][ T1068] Call Trace: [ 39.395222][ T1068] [ 39.398147][ T1068] __dump_stack+0x21/0x30 [ 39.402480][ T1068] dump_stack_lvl+0xee/0x150 [ 39.407086][ T1068] ? show_regs_print_info+0x20/0x20 [ 39.412310][ T1068] ? unwind_get_return_address+0x4d/0x90 [ 39.417954][ T1068] ? stack_trace_save+0xe0/0xe0 [ 39.422803][ T1068] ? arch_stack_walk+0xee/0x140 [ 39.427678][ T1068] dump_stack+0x15/0x20 [ 39.430594][ T1049] ? bpf_prog_load+0x97c/0x1550 [ 39.431839][ T1068] should_fail+0x3c1/0x510 [ 39.436675][ T1049] ? __sys_bpf+0x4c3/0x730 [ 39.441071][ T1068] __should_failslab+0xa4/0xe0 [ 39.441093][ T1068] should_failslab+0x9/0x20 [ 39.454844][ T1068] slab_pre_alloc_hook+0x3b/0xe0 [ 39.459785][ T1068] ? __alloc_skb+0xe0/0x740 [ 39.464290][ T1068] kmem_cache_alloc+0x44/0x260 [ 39.469066][ T1068] __alloc_skb+0xe0/0x740 [ 39.473436][ T1068] tipc_buf_acquire+0x2b/0xe0 [ 39.478117][ T1068] tipc_msg_build+0x544/0xfb0 [ 39.482800][ T1068] __tipc_sendmsg+0x19dd/0x2680 [ 39.487649][ T1068] ? _raw_spin_lock+0xe0/0xe0 [ 39.492342][ T1068] ? local_bh_enable+0x30/0x30 [ 39.497114][ T1068] ? wait_woken+0x170/0x170 [ 39.501631][ T1068] ? avc_has_perm+0x158/0x240 [ 39.506310][ T1068] ? __kasan_check_write+0x14/0x20 [ 39.508232][ T1049] ? __x64_sys_bpf+0x7c/0x90 [ 39.511421][ T1068] ? _raw_spin_lock_bh+0x8e/0xe0 [ 39.511444][ T1068] ? _raw_spin_lock_irq+0xe0/0xe0 [ 39.516015][ T1049] ? x64_sys_call+0x4b9/0x9a0 [ 39.520937][ T1068] ? unwind_get_return_address+0x4d/0x90 [ 39.520961][ T1068] ? stack_trace_save+0xe0/0xe0 [ 39.520980][ T1068] ? __local_bh_enable_ip+0x58/0x80 [ 39.526014][ T1049] ? do_syscall_64+0x4c/0xa0 [ 39.530652][ T1068] ? lock_sock_nested+0x1f1/0x290 [ 39.530673][ T1068] ? sock_init_data+0xc0/0xc0 [ 39.536316][ T1049] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 39.541116][ T1068] ? stack_trace_save+0x98/0xe0 [ 39.541139][ T1068] tipc_sendmsg+0x55/0x70 [ 39.546320][ T1049] ? check_stack_object+0x81/0x140 [ 39.550881][ T1068] ? tipc_recvmsg+0x13a0/0x13a0 [ 39.550901][ T1068] ____sys_sendmsg+0x5a2/0x8c0 [ 39.555938][ T1049] ? memset+0x35/0x40 [ 39.560580][ T1068] ? __sys_sendmsg_sock+0x40/0x40 [ 39.566664][ T1049] ? bpf_obj_name_cpy+0x193/0x1e0 [ 39.571468][ T1068] ? import_iovec+0x7c/0xb0 [ 39.571488][ T1068] ___sys_sendmsg+0x1f0/0x260 [ 39.571507][ T1068] ? __sys_sendmsg+0x250/0x250 [ 39.571531][ T1068] ? __fdget+0x1a1/0x230 [ 39.571549][ T1068] __x64_sys_sendmsg+0x1e2/0x2a0 [ 39.571567][ T1068] ? ___sys_sendmsg+0x260/0x260 [ 39.571583][ T1068] ? ksys_write+0x1eb/0x240 [ 39.571601][ T1068] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 39.576105][ T1049] bpf_prog_load+0x1042/0x1550 [ 39.581013][ T1068] x64_sys_call+0x4b/0x9a0 [ 39.581033][ T1068] do_syscall_64+0x4c/0xa0 [ 39.585908][ T1049] ? map_freeze+0x360/0x360 [ 39.590627][ T1068] ? clear_bhb_loop+0x50/0xa0 [ 39.590644][ T1068] ? clear_bhb_loop+0x50/0xa0 [ 39.594605][ T1049] ? selinux_bpf+0xc7/0xf0 [ 39.599605][ T1068] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 39.604650][ T1049] ? security_bpf+0x82/0xa0 [ 39.609097][ T1068] RIP: 0033:0x7f6cd6124fc9 [ 39.613763][ T1049] __sys_bpf+0x4c3/0x730 [ 39.618491][ T1068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.618507][ T1068] RSP: 002b:00007f6cd4b8d038 EFLAGS: 00000246 [ 39.629102][ T1049] ? bpf_link_show_fdinfo+0x310/0x310 [ 39.632464][ T1068] ORIG_RAX: 000000000000002e [ 39.632473][ T1068] RAX: ffffffffffffffda RBX: 00007f6cd637bfa0 RCX: 00007f6cd6124fc9 [ 39.632488][ T1068] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000006 [ 39.637281][ T1049] ? __kasan_check_write+0x14/0x20 [ 39.643024][ T1068] RBP: 00007f6cd4b8d090 R08: 0000000000000000 R09: 0000000000000000 [ 39.643037][ T1068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 39.643049][ T1068] R13: 00007f6cd637c038 R14: 00007f6cd637bfa0 R15: 00007ffd0dabb5a8 [ 39.648028][ T1049] ? switch_fpu_return+0x15d/0x2c0 [ 39.652189][ T1068] [ 39.784159][ T1049] __x64_sys_bpf+0x7c/0x90 [ 39.788657][ T1049] x64_sys_call+0x4b9/0x9a0 [ 39.794548][ T1049] do_syscall_64+0x4c/0xa0 [ 39.799052][ T1049] ? clear_bhb_loop+0x50/0xa0 [ 39.804285][ T1049] ? clear_bhb_loop+0x50/0xa0 [ 39.809453][ T1049] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 39.815626][ T1049] RIP: 0033:0x7f1e6b0e0fc9 [ 39.820125][ T1049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.840021][ T1049] RSP: 002b:00007f1e69b49038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 39.850481][ T1049] RAX: ffffffffffffffda RBX: 00007f1e6b337fa0 RCX: 00007f1e6b0e0fc9 [ 39.858630][ T1049] RDX: 0000000000000094 RSI: 0000200000000400 RDI: 0000000000000005 [ 39.884733][ T1049] RBP: 00007f1e6b163f91 R08: 0000000000000000 R09: 0000000000000000 [ 39.920476][ T1049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 39.987478][ T1049] R13: 00007f1e6b338038 R14: 00007f1e6b337fa0 R15: 00007ffef3fbf098 [ 40.026617][ T1049] [ 40.029755][ T1049] ---[ end trace a58aa2dc99003fb1 ]--- [ 40.551791][ T1122] device syzkaller0 entered promiscuous mode [ 41.298181][ T1151] GPL: port 1(veth0_to_team) entered blocking state [ 41.305594][ T1151] GPL: port 1(veth0_to_team) entered disabled state [ 41.325027][ T1151] device veth0_to_team entered promiscuous mode [ 42.187275][ T1194] device sit0 left promiscuous mode [ 42.459154][ T1201] device sit0 entered promiscuous mode [ 43.041117][ T1234] FAULT_INJECTION: forcing a failure. [ 43.041117][ T1234] name failslab, interval 1, probability 0, space 0, times 0 [ 43.071086][ T1234] CPU: 0 PID: 1234 Comm: syz.1.313 Tainted: G W syzkaller #0 [ 43.079918][ T1234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 43.089973][ T1234] Call Trace: [ 43.093251][ T1234] [ 43.096189][ T1234] __dump_stack+0x21/0x30 [ 43.100534][ T1234] dump_stack_lvl+0xee/0x150 [ 43.105128][ T1234] ? show_regs_print_info+0x20/0x20 [ 43.110334][ T1234] dump_stack+0x15/0x20 [ 43.114493][ T1234] should_fail+0x3c1/0x510 [ 43.118905][ T1234] ? tipc_buf_acquire+0x2b/0xe0 [ 43.123756][ T1234] __should_failslab+0xa4/0xe0 [ 43.128534][ T1234] should_failslab+0x9/0x20 [ 43.133032][ T1234] slab_pre_alloc_hook+0x3b/0xe0 [ 43.137965][ T1234] ? tipc_buf_acquire+0x2b/0xe0 [ 43.142806][ T1234] ? tipc_buf_acquire+0x2b/0xe0 [ 43.147645][ T1234] __kmalloc_track_caller+0x6c/0x2c0 [ 43.152923][ T1234] ? tipc_buf_acquire+0x2b/0xe0 [ 43.157761][ T1234] ? tipc_buf_acquire+0x2b/0xe0 [ 43.162598][ T1234] __alloc_skb+0x21a/0x740 [ 43.167007][ T1234] tipc_buf_acquire+0x2b/0xe0 [ 43.171671][ T1234] tipc_msg_build+0x544/0xfb0 [ 43.176341][ T1234] __tipc_sendmsg+0x19dd/0x2680 [ 43.181179][ T1234] ? _raw_spin_lock+0xe0/0xe0 [ 43.185869][ T1234] ? local_bh_enable+0x30/0x30 [ 43.190624][ T1234] ? wait_woken+0x170/0x170 [ 43.195115][ T1234] ? avc_has_perm+0x158/0x240 [ 43.199783][ T1234] ? __kasan_check_write+0x14/0x20 [ 43.204884][ T1234] ? _raw_spin_lock_bh+0x8e/0xe0 [ 43.209822][ T1234] ? _raw_spin_lock_irq+0xe0/0xe0 [ 43.214860][ T1234] ? unwind_get_return_address+0x4d/0x90 [ 43.220493][ T1234] ? stack_trace_save+0xe0/0xe0 [ 43.225342][ T1234] ? __local_bh_enable_ip+0x58/0x80 [ 43.230540][ T1234] ? lock_sock_nested+0x1f1/0x290 [ 43.235561][ T1234] ? sock_init_data+0xc0/0xc0 [ 43.240234][ T1234] ? stack_trace_save+0x98/0xe0 [ 43.245091][ T1234] tipc_sendmsg+0x55/0x70 [ 43.249414][ T1234] ? tipc_recvmsg+0x13a0/0x13a0 [ 43.254265][ T1234] ____sys_sendmsg+0x5a2/0x8c0 [ 43.259029][ T1234] ? __sys_sendmsg_sock+0x40/0x40 [ 43.264055][ T1234] ? import_iovec+0x7c/0xb0 [ 43.268581][ T1234] ___sys_sendmsg+0x1f0/0x260 [ 43.273260][ T1234] ? __sys_sendmsg+0x250/0x250 [ 43.278029][ T1234] ? __fdget+0x1a1/0x230 [ 43.282278][ T1234] __x64_sys_sendmsg+0x1e2/0x2a0 [ 43.287221][ T1234] ? ___sys_sendmsg+0x260/0x260 [ 43.292071][ T1234] ? ksys_write+0x1eb/0x240 [ 43.296584][ T1234] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 43.302657][ T1234] x64_sys_call+0x4b/0x9a0 [ 43.307070][ T1234] do_syscall_64+0x4c/0xa0 [ 43.311488][ T1234] ? clear_bhb_loop+0x50/0xa0 [ 43.316166][ T1234] ? clear_bhb_loop+0x50/0xa0 [ 43.320843][ T1234] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 43.326743][ T1234] RIP: 0033:0x7f6cd6124fc9 [ 43.331162][ T1234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.350765][ T1234] RSP: 002b:00007f6cd4b8d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 43.359185][ T1234] RAX: ffffffffffffffda RBX: 00007f6cd637bfa0 RCX: 00007f6cd6124fc9 [ 43.367153][ T1234] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000006 [ 43.375124][ T1234] RBP: 00007f6cd4b8d090 R08: 0000000000000000 R09: 0000000000000000 [ 43.383091][ T1234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.391062][ T1234] R13: 00007f6cd637c038 R14: 00007f6cd637bfa0 R15: 00007ffd0dabb5a8 [ 43.399046][ T1234] [ 43.765046][ T1264] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.826485][ T1275] ref_ctr_offset mismatch. inode: 0x140 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 44.181956][ T1296] device wg2 entered promiscuous mode [ 44.792735][ T1316] sock: sock_timestamping_bind_phc: sock not bind to device [ 44.878986][ T1316] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.461134][ T1360] device veth0_vlan left promiscuous mode [ 45.564674][ T1360] device veth0_vlan entered promiscuous mode [ 46.256313][ T1363] device syzkaller0 entered promiscuous mode [ 46.415637][ T1400] device syzkaller0 entered promiscuous mode [ 46.461751][ T1408] syz.2.374[1408] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.461827][ T1408] syz.2.374[1408] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.723214][ T1420] ref_ctr_offset mismatch. inode: 0x1cc offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 46.744916][ T1422] device syzkaller0 entered promiscuous mode [ 49.338854][ T1524] syz.0.419[1524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.338920][ T1524] syz.0.419[1524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.343500][ T30] audit: type=1400 audit(1761874476.775:122): avc: denied { create } for pid=1517 comm="syz.2.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 49.388915][ T1520] syz.2.417[1520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.388973][ T1520] syz.2.417[1520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.540711][ T1520] syz.2.417[1520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.558961][ T1520] syz.2.417[1520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.668770][ T1536] syz.2.424[1536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.681978][ T1536] syz.2.424[1536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.977452][ T30] audit: type=1400 audit(1761874477.415:123): avc: denied { tracepoint } for pid=1547 comm="syz.2.429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 50.538133][ T1555] device syzkaller0 entered promiscuous mode [ 50.811066][ T1561] device syzkaller0 entered promiscuous mode [ 52.253904][ T1619] device veth0_vlan left promiscuous mode [ 52.278325][ T1619] device veth0_vlan entered promiscuous mode [ 52.366132][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.383385][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 52.464765][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 52.949033][ T1660] syz.4.472[1660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.949093][ T1660] syz.4.472[1660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.995428][ T30] audit: type=1400 audit(1761874480.435:124): avc: denied { read write } for pid=1661 comm="syz.1.473" name="cgroup.subtree_control" dev="cgroup2" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 53.090756][ T1667] FAULT_INJECTION: forcing a failure. [ 53.090756][ T1667] name failslab, interval 1, probability 0, space 0, times 0 [ 53.137460][ T1669] syz.1.476[1669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.137526][ T1669] syz.1.476[1669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.174595][ T1667] CPU: 0 PID: 1667 Comm: syz.4.475 Tainted: G W syzkaller #0 [ 53.194576][ T1667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 53.204620][ T1667] Call Trace: [ 53.207888][ T1667] [ 53.210806][ T1667] __dump_stack+0x21/0x30 [ 53.215137][ T1667] dump_stack_lvl+0xee/0x150 [ 53.219717][ T1667] ? show_regs_print_info+0x20/0x20 [ 53.224904][ T1667] dump_stack+0x15/0x20 [ 53.229050][ T1667] should_fail+0x3c1/0x510 [ 53.233456][ T1667] ? tipc_buf_acquire+0x2b/0xe0 [ 53.238294][ T1667] __should_failslab+0xa4/0xe0 [ 53.243054][ T1667] should_failslab+0x9/0x20 [ 53.247545][ T1667] slab_pre_alloc_hook+0x3b/0xe0 [ 53.252468][ T1667] ? tipc_buf_acquire+0x2b/0xe0 [ 53.257307][ T1667] ? tipc_buf_acquire+0x2b/0xe0 [ 53.262147][ T1667] __kmalloc_track_caller+0x6c/0x2c0 [ 53.267423][ T1667] ? tipc_buf_acquire+0x2b/0xe0 [ 53.272262][ T1667] ? tipc_buf_acquire+0x2b/0xe0 [ 53.277102][ T1667] __alloc_skb+0x21a/0x740 [ 53.281516][ T1667] tipc_buf_acquire+0x2b/0xe0 [ 53.286188][ T1667] tipc_msg_build+0x8f1/0xfb0 [ 53.290863][ T1667] __tipc_sendmsg+0x19dd/0x2680 [ 53.295703][ T1667] ? _raw_spin_lock+0xe0/0xe0 [ 53.300382][ T1667] ? local_bh_enable+0x30/0x30 [ 53.305137][ T1667] ? wait_woken+0x170/0x170 [ 53.309627][ T1667] ? avc_has_perm+0x158/0x240 [ 53.314301][ T1667] ? __kasan_check_write+0x14/0x20 [ 53.319425][ T1667] ? _raw_spin_lock_bh+0x8e/0xe0 [ 53.324361][ T1667] ? _raw_spin_lock_irq+0xe0/0xe0 [ 53.329371][ T1667] ? unwind_get_return_address+0x4d/0x90 [ 53.335012][ T1667] ? stack_trace_save+0xe0/0xe0 [ 53.339858][ T1667] ? __local_bh_enable_ip+0x58/0x80 [ 53.345061][ T1667] ? lock_sock_nested+0x1f1/0x290 [ 53.350075][ T1667] ? sock_init_data+0xc0/0xc0 [ 53.354741][ T1667] ? stack_trace_save+0x98/0xe0 [ 53.359590][ T1667] tipc_sendmsg+0x55/0x70 [ 53.363915][ T1667] ? tipc_recvmsg+0x13a0/0x13a0 [ 53.368762][ T1667] ____sys_sendmsg+0x5a2/0x8c0 [ 53.373534][ T1667] ? __sys_sendmsg_sock+0x40/0x40 [ 53.378556][ T1667] ? import_iovec+0x7c/0xb0 [ 53.383055][ T1667] ___sys_sendmsg+0x1f0/0x260 [ 53.387726][ T1667] ? __sys_sendmsg+0x250/0x250 [ 53.392496][ T1667] ? __fdget+0x1a1/0x230 [ 53.396761][ T1667] __x64_sys_sendmsg+0x1e2/0x2a0 [ 53.401690][ T1667] ? ___sys_sendmsg+0x260/0x260 [ 53.406534][ T1667] ? ksys_write+0x1eb/0x240 [ 53.411031][ T1667] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 53.417107][ T1667] x64_sys_call+0x4b/0x9a0 [ 53.421517][ T1667] do_syscall_64+0x4c/0xa0 [ 53.425942][ T1667] ? clear_bhb_loop+0x50/0xa0 [ 53.430620][ T1667] ? clear_bhb_loop+0x50/0xa0 [ 53.435285][ T1667] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 53.441173][ T1667] RIP: 0033:0x7fabf4f90fc9 [ 53.445576][ T1667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 53.465167][ T1667] RSP: 002b:00007fabf39f9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 53.473567][ T1667] RAX: ffffffffffffffda RBX: 00007fabf51e7fa0 RCX: 00007fabf4f90fc9 [ 53.481530][ T1667] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000006 [ 53.489493][ T1667] RBP: 00007fabf39f9090 R08: 0000000000000000 R09: 0000000000000000 [ 53.497456][ T1667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 53.505417][ T1667] R13: 00007fabf51e8038 R14: 00007fabf51e7fa0 R15: 00007ffdf14f9b98 [ 53.513385][ T1667] [ 53.523644][ T30] audit: type=1400 audit(1761874480.435:125): avc: denied { open } for pid=1661 comm="syz.1.473" path="" dev="cgroup2" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 53.760162][ T1694] ref_ctr_offset mismatch. inode: 0x22e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 53.918837][ T30] audit: type=1400 audit(1761874481.355:126): avc: denied { create } for pid=1707 comm="syz.3.493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 54.428310][ T1726] device syzkaller0 entered promiscuous mode [ 54.785641][ T30] audit: type=1400 audit(1761874482.225:127): avc: denied { create } for pid=1747 comm="syz.0.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 54.872210][ T1745] GPL: port 1(veth0_to_team) entered blocking state [ 54.878868][ T1745] GPL: port 1(veth0_to_team) entered disabled state [ 54.886011][ T1745] device veth0_to_team entered promiscuous mode [ 57.445404][ T1818] device veth0_vlan left promiscuous mode [ 57.461750][ T1818] device veth0_vlan entered promiscuous mode [ 57.532347][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.565048][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.586857][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 58.650279][ C0] sched: RT throttling activated [ 58.701224][ T1841] device veth0_vlan left promiscuous mode [ 58.707172][ T1841] device veth0_vlan entered promiscuous mode [ 58.828428][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 58.844689][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 58.894876][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.392819][ T1888] ref_ctr_offset mismatch. inode: 0x21d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 59.528647][ T1870] device syzkaller0 entered promiscuous mode [ 59.576547][ T1895] device sit0 left promiscuous mode [ 59.748769][ T1899] device sit0 entered promiscuous mode [ 59.776454][ T30] audit: type=1400 audit(1761874487.215:128): avc: denied { create } for pid=1905 comm="syz.0.573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 60.187232][ T1918] device sit0 left promiscuous mode [ 60.234438][ T30] audit: type=1400 audit(1761874487.675:129): avc: denied { create } for pid=1928 comm="syz.3.582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 60.404057][ T1918] device sit0 entered promiscuous mode [ 61.012096][ T1954] device syzkaller0 entered promiscuous mode [ 61.951888][ T2006] GPL: port 1(veth0_to_team) entered blocking state [ 61.993961][ T2006] GPL: port 1(veth0_to_team) entered disabled state [ 62.009618][ T2006] device veth0_to_team entered promiscuous mode [ 62.429938][ T2057] syz.4.632[2057] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.430005][ T2057] syz.4.632[2057] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.703688][ T2063] device syzkaller0 entered promiscuous mode [ 62.730249][ T2065] device veth0_vlan left promiscuous mode [ 62.747281][ T2065] device veth0_vlan entered promiscuous mode [ 62.774263][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.787249][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 62.795002][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 63.076044][ T30] audit: type=1400 audit(1761874490.515:130): avc: denied { create } for pid=2126 comm="syz.2.660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 63.554019][ T2156] device syzkaller0 entered promiscuous mode [ 64.322655][ T2178] device wg2 entered promiscuous mode [ 66.306887][ T2243] device syzkaller0 entered promiscuous mode [ 66.421369][ T2251] device sit0 left promiscuous mode [ 66.500767][ T2254] device sit0 entered promiscuous mode [ 68.211572][ C0] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 68.239064][ T2340] ref_ctr_offset mismatch. inode: 0x34d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 68.849393][ T2394] device sit0 left promiscuous mode [ 69.105410][ T2401] device sit0 entered promiscuous mode [ 69.902914][ T2431] tun0: tun_chr_ioctl cmd 1074025677 [ 69.908446][ T2431] tun0: linktype set to 0 [ 70.672138][ T2448] syz.3.786[2448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.672209][ T2448] syz.3.786[2448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.738481][ T2487] device sit0 left promiscuous mode [ 71.852245][ T2490] device sit0 entered promiscuous mode [ 72.261339][ T2504] ref_ctr_offset mismatch. inode: 0x352 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 72.333209][ T2516] GPL: port 2(veth1_macvtap) entered blocking state [ 72.339842][ T2516] GPL: port 2(veth1_macvtap) entered disabled state [ 72.731331][ T2541] syz.2.820[2541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.731414][ T2541] syz.2.820[2541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.865069][ T2546] ref_ctr_offset mismatch. inode: 0x39b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 72.964479][ T2550] ref_ctr_offset mismatch. inode: 0x379 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 73.406282][ T2593] ref_ctr_offset mismatch. inode: 0x389 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 74.054480][ T2641] device sit0 entered promiscuous mode [ 74.333742][ T2657] device syzkaller0 entered promiscuous mode [ 74.483785][ T2662] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.491070][ T2662] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.544575][ T2673] syz.4.871[2673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.544644][ T2673] syz.4.871[2673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.643427][ T2662] device bridge_slave_1 left promiscuous mode [ 74.687459][ T2662] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.721305][ T2662] device bridge_slave_0 left promiscuous mode [ 74.770353][ T2662] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.045676][ T2690] device veth0_vlan left promiscuous mode [ 75.054746][ T2690] device veth0_vlan entered promiscuous mode [ 75.069865][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.078434][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 75.103274][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 76.029541][ T2736] device veth0_vlan left promiscuous mode [ 76.058065][ T2736] device veth0_vlan entered promiscuous mode [ 76.811233][ T2791] syz.4.915[2791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.811326][ T2791] syz.4.915[2791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.948324][ T2861] ref_ctr_offset mismatch. inode: 0x417 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 78.367137][ T2875] syz.3.947[2875] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.367206][ T2875] syz.3.947[2875] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.380169][ T2900] device veth0_vlan left promiscuous mode [ 79.424739][ T2900] device veth0_vlan entered promiscuous mode [ 80.011812][ T2918] device sit0 left promiscuous mode [ 80.309009][ T2924] device sit0 entered promiscuous mode [ 81.233881][ T2963] bridge0: port 3(gretap0) entered blocking state [ 81.234760][ T30] audit: type=1400 audit(1761874508.675:131): avc: denied { create } for pid=2962 comm="syz.3.982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 81.310485][ T2963] bridge0: port 3(gretap0) entered disabled state [ 81.367842][ T2963] device gretap0 entered promiscuous mode [ 81.413680][ T2963] bridge0: port 3(gretap0) entered blocking state [ 81.420138][ T2963] bridge0: port 3(gretap0) entered forwarding state [ 82.460087][ T3007] ref_ctr_offset mismatch. inode: 0x452 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 83.234100][ T3035] syz.0.1011[3035] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.234162][ T3035] syz.0.1011[3035] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.352253][ T3086] device sit0 left promiscuous mode [ 84.575705][ T3088] device sit0 entered promiscuous mode [ 85.024633][ T30] audit: type=1400 audit(1761874512.465:132): avc: denied { append } for pid=3124 comm="syz.0.1042" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 85.834301][ T3136] syz.2.1046[3136] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.834369][ T3136] syz.2.1046[3136] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.909923][ T3139] device veth0_vlan left promiscuous mode [ 86.052810][ T3139] device veth0_vlan entered promiscuous mode [ 86.980572][ T3170] device syzkaller0 entered promiscuous mode [ 87.747707][ T3192] ref_ctr_offset mismatch. inode: 0x3d7 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 87.867594][ T3202] syz.1.1066[3202] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.867661][ T3202] syz.1.1066[3202] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.422077][ T3220] syz.0.1072[3220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.455121][ T3220] syz.0.1072[3220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.501917][ T3224] device veth0_vlan left promiscuous mode [ 88.623836][ T3224] device veth0_vlan entered promiscuous mode [ 88.746814][ T3224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 88.854312][ T30] audit: type=1400 audit(1761874516.295:133): avc: denied { create } for pid=3231 comm="syz.0.1076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 88.866492][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 88.930677][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 88.937972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 89.369371][ T30] audit: type=1400 audit(1761874516.805:134): avc: denied { create } for pid=3252 comm="syz.2.1082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 89.506535][ T3260] device syzkaller0 entered promiscuous mode [ 89.608347][ T3265] FAULT_INJECTION: forcing a failure. [ 89.608347][ T3265] name failslab, interval 1, probability 0, space 0, times 0 [ 89.680410][ T3265] CPU: 1 PID: 3265 Comm: syz.2.1087 Tainted: G W syzkaller #0 [ 89.689212][ T3265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 89.699398][ T3265] Call Trace: [ 89.702694][ T3265] [ 89.705634][ T3265] __dump_stack+0x21/0x30 [ 89.709975][ T3265] dump_stack_lvl+0xee/0x150 [ 89.714562][ T3265] ? show_regs_print_info+0x20/0x20 [ 89.719760][ T3265] dump_stack+0x15/0x20 [ 89.723913][ T3265] should_fail+0x3c1/0x510 [ 89.728322][ T3265] __should_failslab+0xa4/0xe0 [ 89.733098][ T3265] should_failslab+0x9/0x20 [ 89.737601][ T3265] slab_pre_alloc_hook+0x3b/0xe0 [ 89.742543][ T3265] ? security_inode_alloc+0x33/0x110 [ 89.747828][ T3265] kmem_cache_alloc+0x44/0x260 [ 89.752595][ T3265] security_inode_alloc+0x33/0x110 [ 89.757839][ T3265] inode_init_always+0x711/0x990 [ 89.762784][ T3265] new_inode_pseudo+0x91/0x210 [ 89.767548][ T3265] __sock_create+0x12c/0x7a0 [ 89.772138][ T3265] __sys_socketpair+0x1a1/0x590 [ 89.776992][ T3265] __x64_sys_socketpair+0x9b/0xb0 [ 89.782018][ T3265] x64_sys_call+0x36/0x9a0 [ 89.786429][ T3265] do_syscall_64+0x4c/0xa0 [ 89.790845][ T3265] ? clear_bhb_loop+0x50/0xa0 [ 89.795538][ T3265] ? clear_bhb_loop+0x50/0xa0 [ 89.800203][ T3265] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 89.806106][ T3265] RIP: 0033:0x7f1e6b0e0fc9 [ 89.810520][ T3265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 89.830126][ T3265] RSP: 002b:00007f1e69b49038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 89.838543][ T3265] RAX: ffffffffffffffda RBX: 00007f1e6b337fa0 RCX: 00007f1e6b0e0fc9 [ 89.846518][ T3265] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 89.854483][ T3265] RBP: 00007f1e69b49090 R08: 0000000000000000 R09: 0000000000000000 [ 89.862447][ T3265] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000001 [ 89.870408][ T3265] R13: 00007f1e6b338038 R14: 00007f1e6b337fa0 R15: 00007ffef3fbf098 [ 89.878375][ T3265] [ 89.980376][ T3265] socket: no more sockets [ 90.004932][ T3275] device syzkaller0 entered promiscuous mode [ 90.250309][ T3287] device sit0 left promiscuous mode [ 90.482860][ T3290] device sit0 entered promiscuous mode [ 91.317898][ T3309] ref_ctr_offset mismatch. inode: 0x4a5 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 93.057341][ T3362] FAULT_INJECTION: forcing a failure. [ 93.057341][ T3362] name failslab, interval 1, probability 0, space 0, times 0 [ 93.210418][ T3362] CPU: 1 PID: 3362 Comm: syz.0.1121 Tainted: G W syzkaller #0 [ 93.219221][ T3362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 93.229294][ T3362] Call Trace: [ 93.232584][ T3362] [ 93.235527][ T3362] __dump_stack+0x21/0x30 [ 93.239893][ T3362] dump_stack_lvl+0xee/0x150 [ 93.244517][ T3362] ? show_regs_print_info+0x20/0x20 [ 93.249794][ T3362] ? security_inode_alloc+0x33/0x110 [ 93.255083][ T3362] ? new_inode_pseudo+0x91/0x210 [ 93.260018][ T3362] ? __sock_create+0x12c/0x7a0 [ 93.264776][ T3362] ? __sys_socketpair+0x1a1/0x590 [ 93.269794][ T3362] ? x64_sys_call+0x36/0x9a0 [ 93.274377][ T3362] ? do_syscall_64+0x4c/0xa0 [ 93.278961][ T3362] dump_stack+0x15/0x20 [ 93.283107][ T3362] should_fail+0x3c1/0x510 [ 93.287602][ T3362] __should_failslab+0xa4/0xe0 [ 93.292363][ T3362] should_failslab+0x9/0x20 [ 93.296863][ T3362] slab_pre_alloc_hook+0x3b/0xe0 [ 93.301814][ T3362] ? sk_prot_alloc+0x5f/0x320 [ 93.306483][ T3362] kmem_cache_alloc+0x44/0x260 [ 93.311242][ T3362] sk_prot_alloc+0x5f/0x320 [ 93.315737][ T3362] sk_alloc+0x38/0x430 [ 93.319799][ T3362] tipc_sk_create+0xe6/0x1df0 [ 93.324472][ T3362] ? __kasan_check_write+0x14/0x20 [ 93.329575][ T3362] ? _raw_spin_lock+0x8e/0xe0 [ 93.334252][ T3362] ? _raw_spin_trylock_bh+0x130/0x130 [ 93.339619][ T3362] ? security_inode_alloc+0xc0/0x110 [ 93.344898][ T3362] ? inode_init_always+0x729/0x990 [ 93.350004][ T3362] __sock_create+0x38d/0x7a0 [ 93.354590][ T3362] __sys_socketpair+0x1a1/0x590 [ 93.359442][ T3362] __x64_sys_socketpair+0x9b/0xb0 [ 93.364468][ T3362] x64_sys_call+0x36/0x9a0 [ 93.368879][ T3362] do_syscall_64+0x4c/0xa0 [ 93.373291][ T3362] ? clear_bhb_loop+0x50/0xa0 [ 93.377962][ T3362] ? clear_bhb_loop+0x50/0xa0 [ 93.382630][ T3362] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 93.388519][ T3362] RIP: 0033:0x7ff0e2a4bfc9 [ 93.392935][ T3362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.412537][ T3362] RSP: 002b:00007ff0e14b4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 93.420978][ T3362] RAX: ffffffffffffffda RBX: 00007ff0e2ca2fa0 RCX: 00007ff0e2a4bfc9 [ 93.428951][ T3362] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 93.436930][ T3362] RBP: 00007ff0e14b4090 R08: 0000000000000000 R09: 0000000000000000 [ 93.444911][ T3362] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000001 [ 93.452877][ T3362] R13: 00007ff0e2ca3038 R14: 00007ff0e2ca2fa0 R15: 00007ffd1ff8f0a8 [ 93.460867][ T3362] [ 94.266705][ T3410] device veth0_vlan left promiscuous mode [ 94.296725][ T3410] device veth0_vlan entered promiscuous mode [ 94.325958][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.350987][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.400099][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.793445][ T3485] device syzkaller0 entered promiscuous mode [ 95.909447][ T3502] FAULT_INJECTION: forcing a failure. [ 95.909447][ T3502] name failslab, interval 1, probability 0, space 0, times 0 [ 95.937307][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 95.996361][ T3502] CPU: 0 PID: 3502 Comm: syz.2.1171 Tainted: G W syzkaller #0 [ 96.005167][ T3502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 96.015229][ T3502] Call Trace: [ 96.018515][ T3502] [ 96.021449][ T3502] __dump_stack+0x21/0x30 [ 96.025929][ T3502] dump_stack_lvl+0xee/0x150 [ 96.030543][ T3502] ? show_regs_print_info+0x20/0x20 [ 96.035754][ T3502] dump_stack+0x15/0x20 [ 96.039918][ T3502] should_fail+0x3c1/0x510 [ 96.044346][ T3502] __should_failslab+0xa4/0xe0 [ 96.049131][ T3502] should_failslab+0x9/0x20 [ 96.053535][ T3511] syz.3.1175[3511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.053672][ T3502] slab_pre_alloc_hook+0x3b/0xe0 [ 96.069911][ T3502] kmem_cache_alloc_trace+0x48/0x270 [ 96.075216][ T3502] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 96.080964][ T3502] selinux_sk_alloc_security+0x7e/0x1a0 [ 96.086529][ T3502] security_sk_alloc+0x72/0xa0 [ 96.091308][ T3502] sk_prot_alloc+0x108/0x320 [ 96.095912][ T3502] sk_alloc+0x38/0x430 [ 96.099999][ T3502] tipc_sk_create+0xe6/0x1df0 [ 96.104692][ T3502] ? __kasan_check_write+0x14/0x20 [ 96.109826][ T3502] ? _raw_spin_lock+0x8e/0xe0 [ 96.114526][ T3502] ? _raw_spin_trylock_bh+0x130/0x130 [ 96.119919][ T3502] ? security_inode_alloc+0xc0/0x110 [ 96.125228][ T3502] ? inode_init_always+0x729/0x990 [ 96.130363][ T3502] __sock_create+0x38d/0x7a0 [ 96.135005][ T3502] __sys_socketpair+0x1a1/0x590 [ 96.139880][ T3502] ? __kasan_check_write+0x14/0x20 [ 96.145018][ T3502] __x64_sys_socketpair+0x9b/0xb0 [ 96.150062][ T3502] x64_sys_call+0x36/0x9a0 [ 96.154496][ T3502] do_syscall_64+0x4c/0xa0 [ 96.158930][ T3502] ? clear_bhb_loop+0x50/0xa0 [ 96.163611][ T3502] ? clear_bhb_loop+0x50/0xa0 [ 96.168295][ T3502] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 96.174197][ T3502] RIP: 0033:0x7f1e6b0e0fc9 [ 96.178632][ T3502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 96.198248][ T3502] RSP: 002b:00007f1e69b49038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 96.206684][ T3502] RAX: ffffffffffffffda RBX: 00007f1e6b337fa0 RCX: 00007f1e6b0e0fc9 [ 96.214672][ T3502] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 96.222650][ T3502] RBP: 00007f1e69b49090 R08: 0000000000000000 R09: 0000000000000000 [ 96.230630][ T3502] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000001 [ 96.238694][ T3502] R13: 00007f1e6b338038 R14: 00007f1e6b337fa0 R15: 00007ffef3fbf098 [ 96.246683][ T3502] [ 96.451733][ T3520] syz.4.1177[3520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.451805][ T3520] syz.4.1177[3520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.085985][ T3534] device veth0_vlan left promiscuous mode [ 97.135062][ T3534] device veth0_vlan entered promiscuous mode [ 97.508513][ T3570] syz.1.1196[3570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.508586][ T3570] syz.1.1196[3570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.570700][ T3574] bond_slave_1: mtu less than device minimum [ 97.642796][ T3582] FAULT_INJECTION: forcing a failure. [ 97.642796][ T3582] name failslab, interval 1, probability 0, space 0, times 0 [ 97.675720][ T3582] CPU: 0 PID: 3582 Comm: syz.4.1201 Tainted: G W syzkaller #0 [ 97.684513][ T3582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 97.694574][ T3582] Call Trace: [ 97.697859][ T3582] [ 97.700803][ T3582] __dump_stack+0x21/0x30 [ 97.705156][ T3582] dump_stack_lvl+0xee/0x150 [ 97.709764][ T3582] ? show_regs_print_info+0x20/0x20 [ 97.714993][ T3582] dump_stack+0x15/0x20 [ 97.719153][ T3582] should_fail+0x3c1/0x510 [ 97.723583][ T3582] __should_failslab+0xa4/0xe0 [ 97.728367][ T3582] should_failslab+0x9/0x20 [ 97.732885][ T3582] slab_pre_alloc_hook+0x3b/0xe0 [ 97.737841][ T3582] kmem_cache_alloc_trace+0x48/0x270 [ 97.743161][ T3582] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 97.748899][ T3582] selinux_sk_alloc_security+0x7e/0x1a0 [ 97.754460][ T3582] security_sk_alloc+0x72/0xa0 [ 97.759239][ T3582] sk_prot_alloc+0x108/0x320 [ 97.763926][ T3582] sk_alloc+0x38/0x430 [ 97.768008][ T3582] tipc_sk_create+0xe6/0x1df0 [ 97.772699][ T3582] ? __kasan_check_write+0x14/0x20 [ 97.777825][ T3582] ? _raw_spin_lock+0x8e/0xe0 [ 97.782601][ T3582] ? _raw_spin_trylock_bh+0x130/0x130 [ 97.787987][ T3582] ? security_inode_alloc+0xc0/0x110 [ 97.793307][ T3582] ? inode_init_always+0x729/0x990 [ 97.798435][ T3582] __sock_create+0x38d/0x7a0 [ 97.803048][ T3582] __sys_socketpair+0x1a1/0x590 [ 97.807915][ T3582] __x64_sys_socketpair+0x9b/0xb0 [ 97.812957][ T3582] x64_sys_call+0x36/0x9a0 [ 97.817391][ T3582] do_syscall_64+0x4c/0xa0 [ 97.821830][ T3582] ? clear_bhb_loop+0x50/0xa0 [ 97.826519][ T3582] ? clear_bhb_loop+0x50/0xa0 [ 97.831219][ T3582] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 97.837131][ T3582] RIP: 0033:0x7fabf4f90fc9 [ 97.841567][ T3582] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 97.861273][ T3582] RSP: 002b:00007fabf39f9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 97.869698][ T3582] RAX: ffffffffffffffda RBX: 00007fabf51e7fa0 RCX: 00007fabf4f90fc9 [ 97.877682][ T3582] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 97.885667][ T3582] RBP: 00007fabf39f9090 R08: 0000000000000000 R09: 0000000000000000 [ 97.893649][ T3582] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000001 [ 97.901634][ T3582] R13: 00007fabf51e8038 R14: 00007fabf51e7fa0 R15: 00007ffdf14f9b98 [ 97.909624][ T3582] [ 98.029703][ T3590] device syzkaller0 entered promiscuous mode [ 98.187448][ T3613] FAULT_INJECTION: forcing a failure. [ 98.187448][ T3613] name failslab, interval 1, probability 0, space 0, times 0 [ 98.200462][ T3613] CPU: 1 PID: 3613 Comm: syz.3.1213 Tainted: G W syzkaller #0 [ 98.209240][ T3613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 98.219308][ T3613] Call Trace: [ 98.222593][ T3613] [ 98.225526][ T3613] __dump_stack+0x21/0x30 [ 98.229872][ T3613] dump_stack_lvl+0xee/0x150 [ 98.234476][ T3613] ? show_regs_print_info+0x20/0x20 [ 98.239686][ T3613] ? avc_has_perm+0x158/0x240 [ 98.244374][ T3613] dump_stack+0x15/0x20 [ 98.248544][ T3613] should_fail+0x3c1/0x510 [ 98.252977][ T3613] __should_failslab+0xa4/0xe0 [ 98.257776][ T3613] should_failslab+0x9/0x20 [ 98.262317][ T3613] slab_pre_alloc_hook+0x3b/0xe0 [ 98.267255][ T3613] ? sock_alloc_inode+0x1b/0xb0 [ 98.272110][ T3613] kmem_cache_alloc+0x44/0x260 [ 98.276879][ T3613] ? sockfs_init_fs_context+0xb0/0xb0 [ 98.282255][ T3613] sock_alloc_inode+0x1b/0xb0 [ 98.286935][ T3613] ? sockfs_init_fs_context+0xb0/0xb0 [ 98.292326][ T3613] new_inode_pseudo+0x62/0x210 [ 98.297101][ T3613] __sock_create+0x12c/0x7a0 [ 98.301687][ T3613] __sys_socketpair+0x218/0x590 [ 98.306535][ T3613] __x64_sys_socketpair+0x9b/0xb0 [ 98.311576][ T3613] x64_sys_call+0x36/0x9a0 [ 98.316000][ T3613] do_syscall_64+0x4c/0xa0 [ 98.320420][ T3613] ? clear_bhb_loop+0x50/0xa0 [ 98.325093][ T3613] ? clear_bhb_loop+0x50/0xa0 [ 98.329768][ T3613] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 98.335660][ T3613] RIP: 0033:0x7f66bbd21fc9 [ 98.340071][ T3613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 98.359674][ T3613] RSP: 002b:00007f66ba78a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 98.368086][ T3613] RAX: ffffffffffffffda RBX: 00007f66bbf78fa0 RCX: 00007f66bbd21fc9 [ 98.376067][ T3613] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 98.384034][ T3613] RBP: 00007f66ba78a090 R08: 0000000000000000 R09: 0000000000000000 [ 98.391996][ T3613] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000001 [ 98.399962][ T3613] R13: 00007f66bbf79038 R14: 00007f66bbf78fa0 R15: 00007fffbc6491e8 [ 98.407935][ T3613] [ 99.127206][ T3613] socket: no more sockets [ 100.932134][ T3636] device veth0_vlan left promiscuous mode [ 100.943734][ T3636] device veth0_vlan entered promiscuous mode [ 101.097088][ T3653] ref_ctr_offset mismatch. inode: 0x48e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 102.758916][ T3708] device syzkaller0 entered promiscuous mode [ 102.859215][ T3717] device sit0 left promiscuous mode [ 102.957097][ T3724] device sit0 entered promiscuous mode [ 103.157421][ T3730] device veth0_vlan left promiscuous mode [ 103.175940][ T3730] device veth0_vlan entered promiscuous mode [ 103.211235][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.234362][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.260908][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.563699][ T30] audit: type=1400 audit(1761874531.005:135): avc: denied { ioctl } for pid=3755 comm="syz.2.1265" path="cgroup:[4026532474]" dev="nsfs" ino=4026532474 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 106.448754][ T3769] device pim6reg1 entered promiscuous mode [ 107.344409][ T3823] device veth0_vlan left promiscuous mode [ 107.375842][ T3823] device veth0_vlan entered promiscuous mode [ 107.478823][ T3830] device syzkaller0 entered promiscuous mode [ 107.501813][ T3833] device sit0 left promiscuous mode [ 107.542866][ T3844] device sit0 entered promiscuous mode [ 108.051070][ T3855] device sit0 left promiscuous mode [ 108.204860][ T3855] device sit0 entered promiscuous mode [ 108.678157][ T30] audit: type=1400 audit(1761874536.115:136): avc: denied { create } for pid=3876 comm="syz.1.1310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 109.936649][ T30] audit: type=1400 audit(1761874537.375:137): avc: denied { setattr } for pid=3921 comm="syz.4.1328" path="pipe:[14382]" dev="pipefs" ino=14382 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 110.059651][ T3925] device veth0_vlan left promiscuous mode [ 110.161182][ T3925] device veth0_vlan entered promiscuous mode [ 110.587256][ T3941] FAULT_INJECTION: forcing a failure. [ 110.587256][ T3941] name failslab, interval 1, probability 0, space 0, times 0 [ 110.730351][ T3941] CPU: 1 PID: 3941 Comm: syz.0.1335 Tainted: G W syzkaller #0 [ 110.739152][ T3941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 110.749218][ T3941] Call Trace: [ 110.752495][ T3941] [ 110.755426][ T3941] __dump_stack+0x21/0x30 [ 110.759764][ T3941] dump_stack_lvl+0xee/0x150 [ 110.764356][ T3941] ? show_regs_print_info+0x20/0x20 [ 110.769555][ T3941] ? bpf_trace_run3+0xd1/0x1e0 [ 110.774319][ T3941] dump_stack+0x15/0x20 [ 110.778470][ T3941] should_fail+0x3c1/0x510 [ 110.782880][ T3941] __should_failslab+0xa4/0xe0 [ 110.787640][ T3941] should_failslab+0x9/0x20 [ 110.792140][ T3941] slab_pre_alloc_hook+0x3b/0xe0 [ 110.797108][ T3941] ? __d_alloc+0x2d/0x6a0 [ 110.801438][ T3941] kmem_cache_alloc+0x44/0x260 [ 110.806205][ T3941] __d_alloc+0x2d/0x6a0 [ 110.810355][ T3941] ? tipc_node_get_mtu+0x2b0/0x2b0 [ 110.815460][ T3941] d_alloc_pseudo+0x1d/0x70 [ 110.819955][ T3941] alloc_file_pseudo+0xc8/0x1f0 [ 110.824811][ T3941] ? alloc_empty_file_noaccount+0x80/0x80 [ 110.830541][ T3941] ? tipc_sk_finish_conn+0x571/0x7d0 [ 110.835835][ T3941] sock_alloc_file+0xba/0x260 [ 110.840526][ T3941] __sys_socketpair+0x2c3/0x590 [ 110.845397][ T3941] __x64_sys_socketpair+0x9b/0xb0 [ 110.850422][ T3941] x64_sys_call+0x36/0x9a0 [ 110.854831][ T3941] do_syscall_64+0x4c/0xa0 [ 110.859256][ T3941] ? clear_bhb_loop+0x50/0xa0 [ 110.863947][ T3941] ? clear_bhb_loop+0x50/0xa0 [ 110.868620][ T3941] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 110.874513][ T3941] RIP: 0033:0x7ff0e2a4bfc9 [ 110.878925][ T3941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.898525][ T3941] RSP: 002b:00007ff0e14b4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 110.906941][ T3941] RAX: ffffffffffffffda RBX: 00007ff0e2ca2fa0 RCX: 00007ff0e2a4bfc9 [ 110.914908][ T3941] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 110.922871][ T3941] RBP: 00007ff0e14b4090 R08: 0000000000000000 R09: 0000000000000000 [ 110.930836][ T3941] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000001 [ 110.938803][ T3941] R13: 00007ff0e2ca3038 R14: 00007ff0e2ca2fa0 R15: 00007ffd1ff8f0a8 [ 110.946782][ T3941] [ 111.102038][ T3953] device syzkaller0 entered promiscuous mode [ 111.156012][ T3957] device wg2 left promiscuous mode [ 112.375880][ T3977] device veth0_vlan left promiscuous mode [ 112.412497][ T3977] device veth0_vlan entered promiscuous mode [ 113.613731][ T4030] syz.3.1371[4030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.859454][ T4086] ref_ctr_offset mismatch. inode: 0x537 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 115.275728][ T4096] device sit0 left promiscuous mode [ 115.520897][ T4098] device sit0 entered promiscuous mode [ 119.254775][ T4206] device veth0_vlan left promiscuous mode [ 119.272578][ T4206] device veth0_vlan entered promiscuous mode [ 119.380380][ T693] syzkaller0: tun_net_xmit 90 [ 119.410691][ T4216] ref_ctr_offset mismatch. inode: 0x614 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 119.461571][ T693] syzkaller0: tun_net_xmit 90 [ 120.042555][ T39] syzkaller0: tun_net_xmit 86 [ 120.724213][ T4268] device veth0_vlan left promiscuous mode [ 120.830006][ T4268] device veth0_vlan entered promiscuous mode [ 121.070776][ T333] syzkaller0: tun_net_xmit 90 [ 121.075658][ T333] syzkaller0: tun_net_xmit 70 [ 121.590314][ T39] syzkaller0: tun_net_xmit 90 [ 121.674601][ T4278] device pim6reg1 entered promiscuous mode [ 123.238958][ T4310] device sit0 left promiscuous mode [ 123.498634][ T4312] device sit0 entered promiscuous mode [ 124.734770][ T4335] FAULT_INJECTION: forcing a failure. [ 124.734770][ T4335] name failslab, interval 1, probability 0, space 0, times 0 [ 124.809852][ T4335] CPU: 0 PID: 4335 Comm: syz.3.1481 Tainted: G W syzkaller #0 [ 124.818751][ T4335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 124.828826][ T4335] Call Trace: [ 124.832118][ T4335] [ 124.835066][ T4335] __dump_stack+0x21/0x30 [ 124.839607][ T4335] dump_stack_lvl+0xee/0x150 [ 124.844222][ T4335] ? show_regs_print_info+0x20/0x20 [ 124.849440][ T4335] dump_stack+0x15/0x20 [ 124.853604][ T4335] should_fail+0x3c1/0x510 [ 124.858037][ T4335] __should_failslab+0xa4/0xe0 [ 124.862818][ T4335] should_failslab+0x9/0x20 [ 124.867336][ T4335] slab_pre_alloc_hook+0x3b/0xe0 [ 124.872294][ T4335] ? __alloc_file+0x28/0x2a0 [ 124.876899][ T4335] kmem_cache_alloc+0x44/0x260 [ 124.881676][ T4335] __alloc_file+0x28/0x2a0 [ 124.886105][ T4335] alloc_empty_file+0x97/0x180 [ 124.890897][ T4335] alloc_file+0x59/0x540 [ 124.895171][ T4335] alloc_file_pseudo+0x17a/0x1f0 [ 124.900126][ T4335] ? alloc_empty_file_noaccount+0x80/0x80 [ 124.906016][ T4335] sock_alloc_file+0xba/0x260 [ 124.910729][ T4335] __sys_socketpair+0x386/0x590 [ 124.915602][ T4335] __x64_sys_socketpair+0x9b/0xb0 [ 124.920651][ T4335] x64_sys_call+0x36/0x9a0 [ 124.925087][ T4335] do_syscall_64+0x4c/0xa0 [ 124.929527][ T4335] ? clear_bhb_loop+0x50/0xa0 [ 124.934238][ T4335] ? clear_bhb_loop+0x50/0xa0 [ 124.938929][ T4335] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 124.944843][ T4335] RIP: 0033:0x7f66bbd21fc9 [ 124.949274][ T4335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 124.969010][ T4335] RSP: 002b:00007f66ba78a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 124.977440][ T4335] RAX: ffffffffffffffda RBX: 00007f66bbf78fa0 RCX: 00007f66bbd21fc9 [ 124.985430][ T4335] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 124.993414][ T4335] RBP: 00007f66ba78a090 R08: 0000000000000000 R09: 0000000000000000 [ 125.001398][ T4335] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000002 [ 125.009383][ T4335] R13: 00007f66bbf79038 R14: 00007f66bbf78fa0 R15: 00007fffbc6491e8 [ 125.017385][ T4335] [ 125.570560][ T4356] device sit0 left promiscuous mode [ 125.751131][ T4352] device wg2 entered promiscuous mode [ 125.798200][ T4356] device sit0 entered promiscuous mode [ 126.137342][ T4390] device veth0_vlan left promiscuous mode [ 126.160109][ T4390] device veth0_vlan entered promiscuous mode [ 126.207456][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.253640][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 126.302425][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 128.323323][ T4491] ref_ctr_offset mismatch. inode: 0x5e9 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 128.639600][ T4498] device veth0_vlan left promiscuous mode [ 128.740464][ T4498] device veth0_vlan entered promiscuous mode [ 128.985968][ T30] audit: type=1400 audit(1761874556.425:138): avc: denied { create } for pid=4510 comm="syz.0.1550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 129.060721][ T4516] ref_ctr_offset mismatch. inode: 0x635 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 130.887268][ T4616] device veth0_vlan left promiscuous mode [ 130.940226][ T4616] device veth0_vlan entered promiscuous mode [ 130.964420][ T4623] syz.3.1597[4623] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.964490][ T4623] syz.3.1597[4623] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.839545][ T4656] ref_ctr_offset mismatch. inode: 0x655 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 132.512524][ T4694] device pim6reg1 entered promiscuous mode [ 133.767215][ T4735] syz.1.1642[4735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.767276][ T4735] syz.1.1642[4735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.928680][ T4745] device syzkaller0 entered promiscuous mode [ 133.965314][ T4739] device pim6reg1 entered promiscuous mode [ 134.183025][ T4763] ref_ctr_offset mismatch. inode: 0x67a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 134.279826][ T30] audit: type=1400 audit(1761874561.715:139): avc: denied { create } for pid=4766 comm="syz.1.1654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 135.189904][ T30] audit: type=1400 audit(1761874562.625:140): avc: denied { create } for pid=4786 comm="syz.0.1663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 136.400540][ T4823] device sit0 entered promiscuous mode [ 136.546126][ T4826] ref_ctr_offset mismatch. inode: 0x694 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 136.712119][ T4832] device wg2 entered promiscuous mode [ 136.997638][ T4849] syz.4.1685[4849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.997703][ T4849] syz.4.1685[4849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.250993][ T4857] device sit0 left promiscuous mode [ 137.434942][ T4861] device sit0 entered promiscuous mode [ 137.787524][ T4869] device syzkaller0 entered promiscuous mode [ 138.265197][ T4887] ref_ctr_offset mismatch. inode: 0x6a5 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 138.614341][ T4905] device pim6reg1 entered promiscuous mode [ 139.237978][ T4929] device veth0_vlan left promiscuous mode [ 139.280223][ T4929] device veth0_vlan entered promiscuous mode [ 139.291749][ T4940] syz.0.1717[4940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.291805][ T4940] syz.0.1717[4940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.411243][ T4943] syz.1.1718[4943] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.530544][ T4943] syz.1.1718[4943] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.597179][ T4952] device sit0 left promiscuous mode [ 139.838463][ T4964] device sit0 entered promiscuous mode [ 140.072784][ T5004] syz.3.1737[5004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.072842][ T5004] syz.3.1737[5004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.141020][ T5004] syz.3.1737[5004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.164053][ T5004] syz.3.1737[5004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.515609][ T5078] device sit0 left promiscuous mode [ 141.777790][ T5089] device sit0 entered promiscuous mode [ 142.168557][ T5115] syz.3.1780[5115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.168621][ T5115] syz.3.1780[5115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.263749][ T5119] ref_ctr_offset mismatch. inode: 0x786 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 143.063399][ T5149] device syzkaller0 entered promiscuous mode [ 143.148760][ T5152] device veth0_vlan left promiscuous mode [ 143.163432][ T5152] device veth0_vlan entered promiscuous mode [ 143.214151][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.222544][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.234814][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 143.487233][ T5172] device wg2 left promiscuous mode [ 144.551870][ T5215] device syzkaller0 entered promiscuous mode [ 144.750033][ T5220] device sit0 left promiscuous mode [ 144.940920][ T5222] device sit0 entered promiscuous mode [ 145.312553][ T5230] device sit0 left promiscuous mode [ 145.445043][ T5230] device sit0 entered promiscuous mode [ 147.234611][ T5302] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.241838][ T5302] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.438386][ T5308] device syzkaller0 entered promiscuous mode [ 147.501908][ T5302] device bridge_slave_1 left promiscuous mode [ 147.509257][ T5302] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.566961][ T5302] device bridge_slave_0 left promiscuous mode [ 147.590914][ T5302] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.142140][ T5339] device sit0 left promiscuous mode [ 148.360694][ T5351] device syzkaller0 entered promiscuous mode [ 148.380878][ T5344] device sit0 entered promiscuous mode [ 150.046910][ T5415] device veth0_vlan left promiscuous mode [ 150.074331][ T5415] device veth0_vlan entered promiscuous mode [ 150.748897][ T30] audit: type=1400 audit(1761874578.185:141): avc: denied { create } for pid=5451 comm="syz.3.1900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 153.237459][ T5547] device veth1_macvtap left promiscuous mode [ 153.244809][ T5547] device macsec0 entered promiscuous mode [ 153.906795][ T5631] syz.2.1964[5631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.906864][ T5631] syz.2.1964[5631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.993142][ T5622] device pim6reg1 entered promiscuous mode [ 154.153408][ T5641] device veth0_vlan left promiscuous mode [ 154.185076][ T5641] device veth0_vlan entered promiscuous mode [ 154.207045][ T5641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.225724][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.260957][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 154.281613][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.530910][ T5654] device syzkaller0 entered promiscuous mode [ 155.668122][ T5717] device veth0_vlan left promiscuous mode [ 155.696255][ T5717] device veth0_vlan entered promiscuous mode [ 155.761919][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.878646][ T5735] syz.0.2005[5735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.878714][ T5735] syz.0.2005[5735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.277001][ T5763] device sit0 left promiscuous mode [ 156.500318][ T5765] device sit0 entered promiscuous mode [ 156.887950][ T5772] device sit0 left promiscuous mode [ 157.428282][ T5787] device veth0_vlan left promiscuous mode [ 157.437424][ T5787] device veth0_vlan entered promiscuous mode [ 158.065665][ T5812] ref_ctr_offset mismatch. inode: 0x81d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 158.289979][ T5825] ref_ctr_offset mismatch. inode: 0x86e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 158.356244][ T5833] device syzkaller0 entered promiscuous mode [ 158.643319][ T5852] device veth0_vlan left promiscuous mode [ 158.719415][ T5852] device veth0_vlan entered promiscuous mode [ 158.886208][ T5864] ref_ctr_offset mismatch. inode: 0x808 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 159.353887][ T5886] bond_slave_1: mtu less than device minimum [ 159.789986][ T5911] : renamed from veth0_vlan [ 159.846387][ T5914] device syzkaller0 entered promiscuous mode [ 160.335576][ T30] audit: type=1400 audit(1761874587.775:142): avc: denied { create } for pid=5937 comm="syz.2.2081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 160.405849][ T30] audit: type=1400 audit(1761874587.775:143): avc: denied { create } for pid=5930 comm="syz.3.2080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 160.927637][ T5968] device sit0 left promiscuous mode [ 160.929053][ T5966] ref_ctr_offset mismatch. inode: 0x85a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 161.003513][ T5971] device sit0 entered promiscuous mode [ 161.182026][ T30] audit: type=1400 audit(1761874588.615:144): avc: denied { create } for pid=5988 comm="syz.1.2101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 162.435483][ T6022] device sit0 left promiscuous mode [ 162.862684][ T6029] device sit0 entered promiscuous mode [ 162.877905][ T30] audit: type=1400 audit(1761874590.315:145): avc: denied { create } for pid=6027 comm="syz.0.2117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 163.192270][ T6046] tap0: tun_chr_ioctl cmd 1074025675 [ 163.227145][ T6046] tap0: persist enabled [ 163.398442][ T6069] syzkaller0: refused to change device tx_queue_len [ 163.447741][ T6069] device pim6reg1 entered promiscuous mode [ 164.493501][ T6118] syz.2.2152[6118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.493569][ T6118] syz.2.2152[6118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.656758][ T6123] device veth0_vlan left promiscuous mode [ 164.717024][ T6123] device veth0_vlan entered promiscuous mode [ 164.743956][ T6123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 164.785446][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 164.809134][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 164.848957][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 164.917242][ T6130] syz.2.2157[6130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.917370][ T6130] syz.2.2157[6130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.142508][ T6177] device wg2 left promiscuous mode [ 167.743758][ T6250] syz.1.2207[6250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.743850][ T6250] syz.1.2207[6250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.190149][ T6287] device veth0_vlan left promiscuous mode [ 168.265808][ T6287] device veth0_vlan entered promiscuous mode [ 168.382111][ T282] syz-executor (282) used greatest stack depth: 20704 bytes left SYZFAIL: repeatedly failed to execute the program proc=5 req=2232 state=1 status=7 (errno 9: Bad file descriptor) [ 168.906604][ T30] audit: type=1400 audit(1761874596.345:146): avc: denied { write } for pid=274 comm="syz-executor" path="pipe:[13245]" dev="pipefs" ino=13245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 169.351432][ T406] bridge0: port 3(gretap0) entered disabled state [ 169.358844][ T406] device gretap0 left promiscuous mode [ 169.364349][ T406] bridge0: port 3(gretap0) entered disabled state [ 169.591407][ T406] device veth0_to_team left promiscuous mode [ 169.597467][ T406] GPL: port 1(veth0_to_team) entered disabled state [ 169.604956][ T406] device bridge_slave_1 left promiscuous mode [ 169.611090][ T406] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.618509][ T406] device bridge_slave_0 left promiscuous mode [ 169.624669][ T406] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.632350][ T406] device veth0_to_team left promiscuous mode [ 169.638351][ T406] GPL: port 1(veth0_to_team) entered disabled state [ 169.645796][ T406] device bridge_slave_1 left promiscuous mode [ 169.651898][ T406] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.659254][ T406] device bridge_slave_0 left promiscuous mode [ 169.665546][ T406] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.673553][ T406] device veth1_macvtap left promiscuous mode [ 169.679549][ T406] device veth0_vlan left promiscuous mode [ 169.685573][ T406] device veth1_macvtap left promiscuous mode [ 172.191495][ T406] device veth0_to_team left promiscuous mode [ 172.197550][ T406] GPL: port 1(veth0_to_team) entered disabled state [ 172.205440][ T406] device veth0_to_team left promiscuous mode [ 172.211507][ T406] GPL: port 1(veth0_to_team) entered disabled state [ 172.219082][ T406] device veth0_to_team left promiscuous mode [ 172.225135][ T406] GPL: port 1(veth0_to_team) entered disabled state [ 172.232529][ T406] device bridge_slave_1 left promiscuous mode [ 172.238619][ T406] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.246276][ T406] device bridge_slave_0 left promiscuous mode [ 172.252431][ T406] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.260767][ T406] device veth1_macvtap left promiscuous mode [ 172.266752][ T406] device veth0_vlan left promiscuous mode [ 172.272741][ T406] device veth1_macvtap left promiscuous mode