last executing test programs: 4.8086887s ago: executing program 3 (id=5328): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYRES32=r2], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x5c6fa8aec5e2d98b, 0x80, 0x0, 0x0, 0x6, 0x9, 0x0, 0x3, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000280), 0x4}, 0x11368, 0xfffffffffffffffc, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00@\x00'/28], 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0xf6ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001400) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xfffffffffffffe1e, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000a00)='fib_table_lookup\x00', r7}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 4.241517539s ago: executing program 3 (id=5333): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r3}, 0x18) recvmsg$unix(r1, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[], 0xfdef) 4.218426689s ago: executing program 3 (id=5334): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00007fffffffffffffff00"/20, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x17) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="190000000400000004000000ffff"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4, 0xc, @void, @value, @void, @value}, 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r7) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 3.219831846s ago: executing program 0 (id=5347): socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0060000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x40, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000e40)=""/4096, 0x1000}], 0x1, 0x0, 0x1800}, 0x0) 3.120141748s ago: executing program 0 (id=5350): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/20], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x2d) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.threads\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000200)=[{0x6, 0x19, 0x5, 0x270c}]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x200, 0x11, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r8, 0x11, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) close(0xffffffffffffffff) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f00000006c0)={&(0x7f00000003c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000580)=""/40, 0x28}], 0x1, &(0x7f0000000600)=""/139, 0x8b}, 0x10000) 2.600934996s ago: executing program 4 (id=5352): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000680)=ANY=[@ANYRESOCT=r1, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x3d}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r8, r7}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b702000008000000bfa300000000000007030000ffffffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000001404000001007d60b7030000600000006a0a00fe40000900850000001f000000b70000000000000095000000000000006623848adf1dc9a764ab51a064caff0c9b27a26293fddf0180000071ff31f1622271d5518193e09483c5a020c334f8c76334d8ce8303b81ddaa52e8756ad60a07d6f27c125e16d024098f755d8583da60f27c162dbba0700002ac9170f50f2568836077b7f711a18ebf608d87b885297b6b6981978d51514b00dcc4a2748b376358c33c9753beab62bdf27dc04e4cb4bc598affd989b1ca58949a54d5827df14feecea46408a05d572077f1252fbb72c3d099c501bc4ded6fca17a3447222c95edb47b770009524edd5fa5c53e9c37251709f1ff7f0000f07bf7f53ce129a9ecd3b4dd15100f2b450f98526a0d8cac7c97fc2f64015306a1bd88345710fb6379b4c53cf55eefb4c0974486a8d25a363adbd83b49e13fbd1757b27020bd9b8cff3f48c9411670c34f23ab8caf7851b290feb3045a1b622f20c4383a0280f040de7667f8b1d0842835e81c35af41e5b5b924275cb1749289b44e9728e7a73f148ac8206afe120c1437490d9900000011000003971b32fdffffffffffffffaf580278e1342aabd1b623f6c4f128858e4eb6b42f2173184c2b99b645f6ec0e14e5d7c95a0008000000f30f6c0000000000ff0000b8f5001a1d2a34dc0973ec302bc23211d3e3b6e6dad65a51e5497a3419cecec38126247b27113ad4c7915c8f82c333a7b350802f0311807010d1ed50c18411aa6900daccc02f4ba4b078f07e41f781eee222c7d071d5a94d82ca9a0846c1af59cee16639b4970f8f0a82c6a712fd5722d677d406160ffaffffffb4e0bde6749aa52c408b74251914c5d3255fd88a42e7ebb69ebcd8eee623e51dbb1f1b548c91a6825c0686fdc16be1cbb72c217fda18bd746253ca66093daf35923300b600000000ac376e0a4649a8a84e1d293a6b109c5e59b366bca5cc3d936c53d4a48c05099e6fc37e5aa23bff8cce0600000000000300a568a8532623d12b40b50ac26f2e8255470a04bfbe7acb581b90991d965a01d1f84cb6b973558e1e3f8118c77ccf0b3c6eb6443870004da10c75723b65f83769ad1f0e4ef6b9ef1cec23264fd8fdac6264af1cb467020bdc12b797b6c156c439105829d2ae1c45f7cfa40df68f536a03353a55a8a8e176e5d48887d31c8e0f77f2c1e68ec7c01bd5a2028a8fc107007f5f4c67600a6ade3deb1f200abe1f753754678dae8b4e3ba3d086d4b95dfc5817e3dafae2d38b522f942cc750399d9029f071fdb1e05882f8a4b8fbd219ccac3a895828b4f22b6527ce31ceb02b7b2b4492510134552f0b076b168394f8417f25cc82ae04007193cbe69de8bf35e4bebd15412426b2020ab1f05fc44ae9ae094c1b81d3ef947692b44d2afb09c7498dedf0f87c38bbcab7357836f03e8a7c392e535694a3ead2de11e6b1781e2a017ac341fda2e563ee95085742f5fee9f95f4741b226e428d20b00bc140000e4b2f5efd0a0b1ceba000830ba8634b5aa26bdbe91614e92fae3c7349531df9bf4c01ebf5d8eb7d53e5f30647661623fbdb3f6c3652c423ce6ecc1be5d4e8133fc32f68ea86a2df1e7df98a0ae216c405d0ae9eed114ff2d6fe27dfdff1cf9194849c4cc0da9533e5983863e526a7dc0d8728f3b573ca4427bdb44df9341e9b8420e896598a156c935c800436a312e7ae3c011e46851ac599f0427729ab9c55ae0ab4c0000000000000000000000000000c87bcc2ac5aed9467b51d92e0993af4beaf1f3d47dcdfab9165f98155d93e383d6b85158b54675c1585037508c1e9461a1c3d1a6e2402045cae150a7016f716eebbdf6afc4414d900be0bdf19f4a273f44f4357380b4387f1c8b104f0e406b2f04e5ed88631be6411f9927fe9f83412b7c5a676ceec8b454ebf6481c98e86b6933a02daea0b4ec0be5b3d916bd70208b4588626c27c318475802e2c62681bd1a331422a6e47bbd40857d52c4894944fae5c5000000000000000000000000e0c47613e950b6aefeae054fc723f62ac7d13941de11b018f1f48ac50335df91c771729f81929128135b2803562c1171ee00a3f4a31281aa363e087d53d86dd85e3ff979a7e72d16fdd7e1a0f07a1c8e6085d280d760f74975ceb3a5be6cfb4da8e0aeb769b8b75f4aad803ed77d34872eed2711aa40a3b38099dc2752e8ec9b520faf39e416752aa0830206736570f5d41a4df848c9052551cf8dcb1be000000000eb2577188e8e96bd825d462350905d3eb916b397d2a46a64081e85661d7a5a2716cc87cb1976d15d9b6418e94f165911803e43830432226c660f4da67bb7c8ceb3755c07197d8b80b8d16b12c2ec63bebe107aa2350a7ae564bf69a6c52a2da1496016dd66a1c1b112"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd, 0x0, 0xffffffffffffffff, 0x28, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r9, 0x0, 0xe, 0x0, &(0x7f0000000040)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x9000, &(0x7f0000000180)="97fac2b0ebd1cdac953b3fa2829782a8a2bb88b1a2272791bc463a3b9720ef3be459931f91f70dacf0d6ad47757b6af0082cdd52d477480179f8", 0x3a, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="ba81835ce9286ab52c592506") perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7907059875f37538e486dd6317ce818203"], 0xfdef) 2.275831162s ago: executing program 4 (id=5354): bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071109f00000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="000000000000000000000073a4f4c5b000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r4, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe6, &(0x7f00000004c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000500), &(0x7f0000000580), 0x8, 0x45, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000880)={0x1b, 0x0, 0x0, 0xc3f, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x13, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b400}, [@btf_id={0x18, 0x17, 0x3, 0x0, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf5}}, @ldst={0x1, 0x3, 0x2, 0x1, 0xb, 0x3585ab36a51a5a51, 0x8}, @map_val={0x18, 0x3, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xff8}, @generic={0x4, 0x1, 0x9, 0x8, 0x400}, @exit]}, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x9, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x5, 0xc, 0x3, 0xffffffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[r6, r3], 0x0, 0x10, 0x5, @void, @value}, 0x94) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/249, 0xf9}], 0x1}, 0x0) close(r9) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r11}, 0x10) sendmsg$tipc(r10, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{r12}, &(0x7f00000006c0), &(0x7f0000000700)='%pS \x00'}, 0x20) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r13}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)}], 0x1, 0x0, 0x0, 0x2044}, 0x60) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r7, 0x40047451, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) 2.197812463s ago: executing program 0 (id=5357): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x4000, 0xc8, 0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) syz_clone(0x40000000, &(0x7f0000000280)="2a30053e1c3176348270ca8b9180188fc835645c38b5c342fa86e88edfa65351a46a96741fb8b27eb7a0bbf51c48d5e453c0f1988ab9e8ce16", 0x39, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x20e, 0xa, 0x0, &(0x7f00000004c0)="b9180bb76003070c009e", 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0xdd, 0x2d, 0x3, 0x0, 0x6, 0x1000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x4, @perf_config_ext={0x7, 0x8}, 0x8000, 0x6, 0x6, 0x0, 0x8, 0x330, 0xdb, 0x0, 0x1cdc, 0x0, 0x3}, 0x0, 0x7, r1, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) 2.023371406s ago: executing program 1 (id=5359): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @call={0x85, 0x0, 0x0, 0x50}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r0}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) 1.937645088s ago: executing program 1 (id=5360): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x12, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r3, @ANYRES32=r2, @ANYBLOB="05"], 0x10) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r3}, &(0x7f0000000500), &(0x7f0000000540)=r2}, 0x20) sendmsg$inet(r4, &(0x7f00000004c0)={&(0x7f0000000280)={0x2, 0x4e24, @private=0xa010101}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000d00)="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", 0x1000}], 0x1, &(0x7f0000000300)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x8001}}, @ip_retopts={{0x94, 0x0, 0x7, {[@rr={0x7, 0x13, 0x29, [@multicast2, @multicast2, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @timestamp_prespec={0x44, 0x44, 0xe1, 0x3, 0x3, [{@rand_addr=0x64010100, 0x1}, {@broadcast, 0x1000}, {@rand_addr=0x64010102, 0xe4}, {@multicast1, 0x1}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffffc16}, {@loopback, 0x200}, {@empty, 0x8}, {@multicast1, 0xfff}]}, @lsrr={0x83, 0x13, 0xa2, [@rand_addr=0x64010102, @multicast1, @rand_addr=0x64010100, @broadcast]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x14, 0x96, 0x3, 0x1, [{@multicast2, 0x6}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}], 0xc8}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) sendmsg(0xffffffffffffffff, 0x0, 0x4890) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000005"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r12, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000a40)="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", 0x5a9}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r11, 0x1, 0x21, &(0x7f0000000540), 0x4) sendmsg$tipc(r12, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0) 1.712124882s ago: executing program 4 (id=5361): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00'}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000580)=ANY=[], 0x36) 1.550604414s ago: executing program 1 (id=5362): bpf$ITER_CREATE(0x21, &(0x7f0000001080), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff, 0xfffffffffffff800}, 0x100, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000020000207b8af8ff00000000bfa200000000ffff07020000f8ff2bff435cd201f344c799ffffb70300000000850000000300000095000000000000001c9a757fa80ca7509af5028eab8b7c667ddc5257267c0889d5c421006c4759b1b569b7a0a79280f1856b090a2c7f9704feca8d43b64e6faa15093933c31c3b876048ebca3d03ba8b5735302d08e464957791dd7ae8dfe9cf3f7371f0c6240bcf4216debb1de041035b98cdf0a6dda252cf00"/195], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x6a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000ef00"/28], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x19, &(0x7f0000000a00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @call={0x85, 0x0, 0x0, 0x23}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000280)={0x8}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0900000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000004bba4e50c0dedf500000000000000362185f39a86d503aede2b91e913a065cf6b9bfcedcfeaec82d6"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="a732d86ddab10042bc2640633777a99fc10a33458fe136f340d72066747081193937898dae099dffc8ec1d6b61f3ed50027633f803f7eb6099258cdcabb88d0a133d89e5668e2eaf26ee7f98e099c313d7d37715f45c4e1fce33b300cfb7770fe664c0544e360b61fd8ac7d078fa5bd19b1d39240b1aa820b87d8ff365c1ae4074a9b4cd73f36e79e405092f1794f78ad19c8ac75a0dd0553e565982199db47be2c6f1287efdac23411190caa24d95f4c62a88c0"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r4, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) mkdir(&(0x7f0000000580)='./file0\x00', 0x80) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x101, 0x7ffc, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRES32=r3, @ANYBLOB="1800000001070000000000000000260018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 1.445379055s ago: executing program 1 (id=5363): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000000c0)='vm_unmapped_area\x00'}, 0x18) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="070000000400f7ffffff0f00df00000000000000c1", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz1\x00', 0x1ff) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYRES16=r0, @ANYRES32=r2, @ANYRES64=r2], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r3}, 0x18) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0a00000004000000040000001200000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000200000000000000000000000000000000000000000a2fe97109dc8c69a4cccc26911b53790a4116b10d18638b6832bbee3454be93c44754d6bb4663b772d81f758f02614066220413610c5e97fc1c48b85f516122b2cfcf5d019a20b8daa366ed384379b4b166d4bcc008930036a819e10dee9f171bb241d4eced1e94b5cb816d8"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x38, 0x0, 0x0, 0x0, 0x80000010, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r7, 0x40047451, &(0x7f0000000180)) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) r9 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r10 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x100000}, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r9, &(0x7f0000000140)=r10, 0x12) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7f, 0x6e, 0x80, 0x3, 0x0, 0xc, 0x42, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x6, 0x5}, 0x1030, 0x3, 0x10000, 0xb, 0x722, 0x81, 0x8, 0x0, 0x1, 0x0, 0xffffffff}, r10, 0xd, r4, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 1.444854366s ago: executing program 4 (id=5364): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000010080)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x61, 0x10, 0x64}, [@ldst={0x6, 0x0, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000007c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x8}, {0x0, [0x30, 0x0, 0x51, 0x2e, 0x5f, 0x61]}}, 0x0, 0x20, 0x0, 0xfffffffc, 0x3ff, 0x0, @void, @value}, 0x28) (rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRESHEX, @ANYBLOB='C'], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES8=r2], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007f6a2b4d0403a9ae36582240904e1e50e1bd166ae8ed65cfccf2ab04b42833fcffffffffffffffe98fcbca5d6e7d23e77a9af1a265c18355d7c0f43646d20a1477d52722f9677a731fab9f50673f162a874cb612926e3add2e464d80b96bf5aff7403900aa685260b2d52b9897b0ff9a22aff51c0263932be254616a93d554d165ceb5afb880c18833a61fddc9ce515eec1796471be450634d16efcdbe7f71bc1ed7acd474e57f3c8c50a7b772837479ac9db53689883f7917c9dc35a86a2f727b27460f2e8925e2106624f89d86fe0c3b7e220f41eaf634c3936fca4e6543fa6ca11c852bfece481bcca4aa9463d76d16b52cea0687d56004f6749fe48cacb30c4118545f5746edaefe6308b12052c30f71c5b35f5f508190"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x1f00, 0x18, 0x19, &(0x7f00000007c0)="9f44948721919580684010a40566", 0x0, 0x7ff, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39", &(0x7f0000000380)="8c5911c525f5cf4c4ecf207ad2ec", 0x0, 0x0, 0xffffffff}, 0x23) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) (async, rerun: 64) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) (async, rerun: 64) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async, rerun: 32) write$cgroup_pid(r6, &(0x7f0000000880), 0x12) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.420865636s ago: executing program 3 (id=5365): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000680)=ANY=[@ANYRESOCT=r1, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x3d}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r8, r7}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd, 0x0, 0xffffffffffffffff, 0x28, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r9, 0x0, 0xe, 0x0, &(0x7f0000000040)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x9000, &(0x7f0000000180)="97fac2b0ebd1cdac953b3fa2829782a8a2bb88b1a2272791bc463a3b9720ef3be459931f91f70dacf0d6ad47757b6af0082cdd52d477480179f8", 0x3a, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="ba81835ce9286ab52c592506") perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7907059875f37538e486dd6317ce818203"], 0xfdef) 719.323788ms ago: executing program 0 (id=5366): socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r2, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000005c0)=r3}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r4, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@volatile={0xc, 0x0, 0x0, 0x9, 0x1}, @fwd={0xd}, @float={0x1, 0x0, 0x0, 0x10, 0xc}, @var={0xc, 0x0, 0x0, 0xe, 0x1, 0x2}]}, {0x0, [0x61]}}, &(0x7f0000000640)=""/126, 0x4f, 0x7e, 0x0, 0x8, 0x10000, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x13, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x79c3b4b1, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ldst={0x3, 0x0, 0x7, 0x5, 0xa, 0x18, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0x66}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0x6b, '\x00', r5, 0x0, r6, 0x8, &(0x7f00000006c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x3, 0x2, 0x7, 0x400}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000740)=[r2, r2, r4, r4], &(0x7f0000000780)=[{0x5, 0x5, 0xd, 0x9}, {0x1, 0x5, 0xc, 0x6}, {0x4, 0x1, 0xe, 0xa}, {0x0, 0x5, 0x1, 0x5}, {0x2, 0x5, 0x8, 0x9}, {0x2, 0x5, 0xe, 0x1}, {0x0, 0x4, 0x0, 0xc}], 0x10, 0x7, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$ppp(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) syz_clone(0x630c1100, 0x0, 0xfffffffffffffe41, 0x0, 0x0, 0x0) close(r0) 445.712662ms ago: executing program 2 (id=5368): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000040), &(0x7f0000000180)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="b9ff030f6044238cb89e14f088ca1fff430500001100630377fbac141414e000000162079f4b4d2f87e56dca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) 425.683053ms ago: executing program 4 (id=5369): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 420.653103ms ago: executing program 2 (id=5370): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @call={0x85, 0x0, 0x0, 0x50}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r0}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x70000000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) 353.853884ms ago: executing program 2 (id=5371): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r0) socketpair(0x1, 0x801, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000400), 0x12) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000240)='cpuset.memory_spread_page\x00', 0x2, 0x0) r5 = syz_clone(0x880, &(0x7f0000000140), 0x0, &(0x7f0000000080), 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000200)=r5, 0x12) 349.336514ms ago: executing program 2 (id=5372): bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="850000002e000000660000000000000016dd0000000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x8, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffff4e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) 324.524424ms ago: executing program 1 (id=5373): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x400, 0x0, 0x0, 0x0, 0x2d, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1ff, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 323.860404ms ago: executing program 4 (id=5374): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff7e8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) close(0x3) 302.814725ms ago: executing program 2 (id=5375): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x400, 0x0, 0x0, 0x0, 0x2d, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1ff, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 301.912335ms ago: executing program 3 (id=5376): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x40200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000010010001a00000005"], 0x48) 237.466216ms ago: executing program 0 (id=5377): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10021, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r0, 0x8b19, &(0x7f0000000000)={'wlan0\x00', @random="7cf1e97c9e4f"}) 202.481546ms ago: executing program 2 (id=5378): perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x896b, 0x80206, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000000)=""/3, 0x2}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0xedf0e51957efc755, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000240), &(0x7f0000000380)=r1}, 0x20) 177.614207ms ago: executing program 32 (id=5378): perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x896b, 0x80206, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000000)=""/3, 0x2}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0xedf0e51957efc755, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000240), &(0x7f0000000380)=r1}, 0x20) 64.101929ms ago: executing program 1 (id=5380): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0x1}, 0x4) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8941, &(0x7f0000000080)) 63.966979ms ago: executing program 33 (id=5380): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0x1}, 0x4) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8941, &(0x7f0000000080)) 13.83536ms ago: executing program 3 (id=5381): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63"], 0xfdef) write$cgroup_subtree(r2, &(0x7f0000000000), 0xe) 9.55505ms ago: executing program 34 (id=5381): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63"], 0xfdef) write$cgroup_subtree(r2, &(0x7f0000000000), 0xe) 4.43113ms ago: executing program 0 (id=5382): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var={0x0, 0x0, 0x0, 0xe, 0x0, 0x2}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {0xffffffff}, {}, {}]}, @func, @volatile={0x0, 0x0, 0x0, 0x9, 0x8004}, @volatile={0xb, 0x0, 0x0, 0x9, 0x20000}, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}}, 0x0, 0x96, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x6}, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r1, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001000), 0x8, 0x0, 0x8, 0xd, 0x0}}, 0x10) 0s ago: executing program 35 (id=5382): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var={0x0, 0x0, 0x0, 0xe, 0x0, 0x2}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {0xffffffff}, {}, {}]}, @func, @volatile={0x0, 0x0, 0x0, 0x9, 0x8004}, @volatile={0xb, 0x0, 0x0, 0x9, 0x20000}, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}}, 0x0, 0x96, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x6}, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r1, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001000), 0x8, 0x0, 0x8, 0xd, 0x0}}, 0x10) kernel console output (not intermixed with test programs): 2.663348][ T7131] FAULT_INJECTION: forcing a failure. [ 182.663348][ T7131] name failslab, interval 1, probability 0, space 0, times 0 [ 182.781257][ T7131] CPU: 0 PID: 7131 Comm: syz.2.2431 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 182.791193][ T7131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 182.801258][ T7131] Call Trace: [ 182.804546][ T7131] [ 182.807484][ T7131] __dump_stack+0x21/0x30 [ 182.811826][ T7131] dump_stack_lvl+0xee/0x150 [ 182.816425][ T7131] ? show_regs_print_info+0x20/0x20 [ 182.821629][ T7131] dump_stack+0x15/0x20 [ 182.825791][ T7131] should_fail+0x3c1/0x510 [ 182.830306][ T7131] ? skb_ensure_writable+0x2e7/0x460 [ 182.835596][ T7131] __should_failslab+0xa4/0xe0 [ 182.840363][ T7131] should_failslab+0x9/0x20 [ 182.844878][ T7131] slab_pre_alloc_hook+0x3b/0xe0 [ 182.849816][ T7131] ? skb_ensure_writable+0x2e7/0x460 [ 182.855105][ T7131] ? skb_ensure_writable+0x2e7/0x460 [ 182.860390][ T7131] __kmalloc_track_caller+0x6c/0x2c0 [ 182.865675][ T7131] ? skb_ensure_writable+0x2e7/0x460 [ 182.870963][ T7131] ? skb_ensure_writable+0x2e7/0x460 [ 182.876254][ T7131] pskb_expand_head+0x11b/0x11d0 [ 182.881189][ T7131] ? __copy_skb_header+0x437/0x600 [ 182.886305][ T7131] ? __kasan_check_write+0x14/0x20 [ 182.891416][ T7131] ? __skb_clone+0x47a/0x790 [ 182.896005][ T7131] skb_ensure_writable+0x2e7/0x460 [ 182.901120][ T7131] bpf_clone_redirect+0x10b/0x380 [ 182.906148][ T7131] bpf_prog_6893982b85ceadf7+0x56/0x274 [ 182.911692][ T7131] ? __kasan_slab_alloc+0xcf/0xf0 [ 182.916717][ T7131] ? __kasan_slab_alloc+0xbd/0xf0 [ 182.921749][ T7131] ? slab_post_alloc_hook+0x4f/0x2b0 [ 182.927039][ T7131] ? kmem_cache_alloc+0xf7/0x260 [ 182.931976][ T7131] ? __build_skb+0x2d/0x310 [ 182.936477][ T7131] ? build_skb+0x24/0x200 [ 182.940807][ T7131] ? bpf_prog_test_run_skb+0x279/0x1150 [ 182.946438][ T7131] ? bpf_prog_test_run+0x3d5/0x620 [ 182.951551][ T7131] ? __sys_bpf+0x52c/0x730 [ 182.956060][ T7131] ? __x64_sys_bpf+0x7c/0x90 [ 182.960656][ T7131] ? x64_sys_call+0x4b9/0x9a0 [ 182.965348][ T7131] ? do_syscall_64+0x4c/0xa0 [ 182.969946][ T7131] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 182.976026][ T7131] ? __kasan_check_read+0x11/0x20 [ 182.981057][ T7131] ? bpf_test_timer_continue+0x146/0x4a0 [ 182.986694][ T7131] bpf_test_run+0x33d/0x8d0 [ 182.991210][ T7131] ? convert___skb_to_skb+0x4f0/0x4f0 [ 182.996581][ T7131] ? eth_get_headlen+0x1f0/0x1f0 [ 183.001615][ T7131] ? convert___skb_to_skb+0x41/0x4f0 [ 183.006909][ T7131] bpf_prog_test_run_skb+0x9ec/0x1150 [ 183.012286][ T7131] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 183.018184][ T7131] bpf_prog_test_run+0x3d5/0x620 [ 183.023128][ T7131] ? bpf_prog_query+0x230/0x230 [ 183.027980][ T7131] ? selinux_bpf+0xce/0xf0 [ 183.032398][ T7131] ? security_bpf+0x82/0xa0 [ 183.036899][ T7131] __sys_bpf+0x52c/0x730 [ 183.041149][ T7131] ? bpf_link_show_fdinfo+0x310/0x310 [ 183.046609][ T7131] ? debug_smp_processor_id+0x17/0x20 [ 183.051982][ T7131] __x64_sys_bpf+0x7c/0x90 [ 183.056400][ T7131] x64_sys_call+0x4b9/0x9a0 [ 183.060911][ T7131] do_syscall_64+0x4c/0xa0 [ 183.065325][ T7131] ? clear_bhb_loop+0x50/0xa0 [ 183.070000][ T7131] ? clear_bhb_loop+0x50/0xa0 [ 183.074674][ T7131] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 183.080579][ T7131] RIP: 0033:0x7fbb8fd44929 [ 183.084995][ T7131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 183.104605][ T7131] RSP: 002b:00007fbb8e3ad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 183.113021][ T7131] RAX: ffffffffffffffda RBX: 00007fbb8ff6bfa0 RCX: 00007fbb8fd44929 [ 183.120992][ T7131] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 183.128964][ T7131] RBP: 00007fbb8e3ad090 R08: 0000000000000000 R09: 0000000000000000 [ 183.136934][ T7131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 183.144904][ T7131] R13: 0000000000000000 R14: 00007fbb8ff6bfa0 R15: 00007fffa7c8a5d8 [ 183.152882][ T7131] [ 183.560328][ T7151] device sit0 entered promiscuous mode [ 184.394230][ T7181] ref_ctr_offset mismatch. inode: 0xad4 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 185.113481][ T7200] device sit0 left promiscuous mode [ 185.187352][ T7200] device sit0 entered promiscuous mode [ 185.476053][ T7218] FAULT_INJECTION: forcing a failure. [ 185.476053][ T7218] name failslab, interval 1, probability 0, space 0, times 0 [ 185.537885][ T7218] CPU: 0 PID: 7218 Comm: syz.3.2463 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 185.547852][ T7218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 185.557912][ T7218] Call Trace: [ 185.561183][ T7218] [ 185.564110][ T7218] __dump_stack+0x21/0x30 [ 185.568435][ T7218] dump_stack_lvl+0xee/0x150 [ 185.573016][ T7218] ? show_regs_print_info+0x20/0x20 [ 185.578209][ T7218] dump_stack+0x15/0x20 [ 185.582353][ T7218] should_fail+0x3c1/0x510 [ 185.586766][ T7218] __should_failslab+0xa4/0xe0 [ 185.591527][ T7218] should_failslab+0x9/0x20 [ 185.596023][ T7218] slab_pre_alloc_hook+0x3b/0xe0 [ 185.600955][ T7218] kmem_cache_alloc_trace+0x48/0x270 [ 185.606231][ T7218] ? call_usermodehelper_setup+0x8e/0x210 [ 185.611951][ T7218] call_usermodehelper_setup+0x8e/0x210 [ 185.617489][ T7218] ? __request_module+0x8a0/0x8a0 [ 185.622515][ T7218] __request_module+0x35d/0x8a0 [ 185.627364][ T7218] ? _trace_android_vh_delayacct_thrashing_end+0x110/0x110 [ 185.634564][ T7218] ? cap_capable+0x1aa/0x230 [ 185.639149][ T7218] ? security_capable+0x87/0xb0 [ 185.643995][ T7218] dev_load+0x5b/0xb0 [ 185.647969][ T7218] dev_ioctl+0x2f9/0xd10 [ 185.652206][ T7218] sock_do_ioctl+0x22e/0x300 [ 185.656796][ T7218] ? sock_show_fdinfo+0xa0/0xa0 [ 185.661639][ T7218] ? selinux_file_ioctl+0x377/0x480 [ 185.666834][ T7218] sock_ioctl+0x4bc/0x6b0 [ 185.671154][ T7218] ? sock_poll+0x3d0/0x3d0 [ 185.675565][ T7218] ? __fget_files+0x2c4/0x320 [ 185.680236][ T7218] ? security_file_ioctl+0x84/0xa0 [ 185.685342][ T7218] ? sock_poll+0x3d0/0x3d0 [ 185.689750][ T7218] __se_sys_ioctl+0x121/0x1a0 [ 185.694419][ T7218] __x64_sys_ioctl+0x7b/0x90 [ 185.699005][ T7218] x64_sys_call+0x2f/0x9a0 [ 185.703411][ T7218] do_syscall_64+0x4c/0xa0 [ 185.707826][ T7218] ? clear_bhb_loop+0x50/0xa0 [ 185.712519][ T7218] ? clear_bhb_loop+0x50/0xa0 [ 185.717203][ T7218] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 185.723105][ T7218] RIP: 0033:0x7fe32a9e0929 [ 185.727521][ T7218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.747133][ T7218] RSP: 002b:00007fe329049038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 185.755627][ T7218] RAX: ffffffffffffffda RBX: 00007fe32ac07fa0 RCX: 00007fe32a9e0929 [ 185.763595][ T7218] RDX: 00002000000000c0 RSI: 0000000000008923 RDI: 0000000000000009 [ 185.771561][ T7218] RBP: 00007fe329049090 R08: 0000000000000000 R09: 0000000000000000 [ 185.779625][ T7218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 185.787621][ T7218] R13: 0000000000000000 R14: 00007fe32ac07fa0 R15: 00007ffcfff028a8 [ 185.795598][ T7218] [ 185.829059][ T30] audit: type=1400 audit(1749610111.728:147): avc: denied { sys_module } for pid=7217 comm="syz.3.2463" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 185.885747][ T7221] device veth0_vlan left promiscuous mode [ 185.896851][ T7221] device veth0_vlan entered promiscuous mode [ 185.915364][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.925102][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.937434][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.961936][ T7223] device wg2 entered promiscuous mode [ 186.012596][ T7223] tun0: tun_chr_ioctl cmd 1074812118 [ 186.150173][ T7223] tun0: tun_chr_ioctl cmd 2147767517 [ 186.467565][ T7253] FAULT_INJECTION: forcing a failure. [ 186.467565][ T7253] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 186.484900][ T7253] CPU: 1 PID: 7253 Comm: syz.3.2478 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 186.494836][ T7253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 186.504904][ T7253] Call Trace: [ 186.508200][ T7253] [ 186.511141][ T7253] __dump_stack+0x21/0x30 [ 186.515484][ T7253] dump_stack_lvl+0xee/0x150 [ 186.520088][ T7253] ? show_regs_print_info+0x20/0x20 [ 186.525304][ T7253] ? dump_stack+0x9/0x20 [ 186.529563][ T7253] dump_stack+0x15/0x20 [ 186.533736][ T7253] should_fail+0x3c1/0x510 [ 186.538172][ T7253] should_fail_usercopy+0x1a/0x20 [ 186.543216][ T7253] _copy_to_user+0x20/0x90 [ 186.547656][ T7253] simple_read_from_buffer+0xe9/0x160 [ 186.553041][ T7253] proc_fail_nth_read+0x19a/0x210 [ 186.558088][ T7253] ? proc_fault_inject_write+0x2f0/0x2f0 [ 186.563732][ T7253] ? proc_fault_inject_write+0x2f0/0x2f0 [ 186.569376][ T7253] vfs_read+0x282/0xbe0 [ 186.573543][ T7253] ? kernel_read+0x1f0/0x1f0 [ 186.578141][ T7253] ? __kasan_check_write+0x14/0x20 [ 186.583268][ T7253] ? mutex_lock+0x95/0x1a0 [ 186.587698][ T7253] ? wait_for_completion_killable_timeout+0x10/0x10 [ 186.594293][ T7253] ? __fget_files+0x2c4/0x320 [ 186.598968][ T7253] ? __fdget_pos+0x2d2/0x380 [ 186.603553][ T7253] ? ksys_read+0x71/0x240 [ 186.607877][ T7253] ksys_read+0x140/0x240 [ 186.612116][ T7253] ? vfs_write+0xf70/0xf70 [ 186.616521][ T7253] ? __bpf_trace_sys_enter+0x62/0x70 [ 186.621797][ T7253] __x64_sys_read+0x7b/0x90 [ 186.626293][ T7253] x64_sys_call+0x96d/0x9a0 [ 186.630795][ T7253] do_syscall_64+0x4c/0xa0 [ 186.635201][ T7253] ? clear_bhb_loop+0x50/0xa0 [ 186.639871][ T7253] ? clear_bhb_loop+0x50/0xa0 [ 186.644538][ T7253] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 186.650429][ T7253] RIP: 0033:0x7fe32a9df33c [ 186.654841][ T7253] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 186.674437][ T7253] RSP: 002b:00007fe329049030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 186.682866][ T7253] RAX: ffffffffffffffda RBX: 00007fe32ac07fa0 RCX: 00007fe32a9df33c [ 186.690847][ T7253] RDX: 000000000000000f RSI: 00007fe3290490a0 RDI: 000000000000000a [ 186.698825][ T7253] RBP: 00007fe329049090 R08: 0000000000000000 R09: 0000000000000000 [ 186.706788][ T7253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 186.714749][ T7253] R13: 0000000000000000 R14: 00007fe32ac07fa0 R15: 00007ffcfff028a8 [ 186.722718][ T7253] [ 187.313364][ T7294] FAULT_INJECTION: forcing a failure. [ 187.313364][ T7294] name failslab, interval 1, probability 0, space 0, times 0 [ 187.329281][ T7294] CPU: 1 PID: 7294 Comm: syz.2.2492 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 187.339203][ T7294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 187.349264][ T7294] Call Trace: [ 187.352543][ T7294] [ 187.355478][ T7294] __dump_stack+0x21/0x30 [ 187.359801][ T7294] dump_stack_lvl+0xee/0x150 [ 187.364380][ T7294] ? show_regs_print_info+0x20/0x20 [ 187.369572][ T7294] ? dev_queue_xmit+0x20/0x20 [ 187.374242][ T7294] dump_stack+0x15/0x20 [ 187.378390][ T7294] should_fail+0x3c1/0x510 [ 187.382801][ T7294] __should_failslab+0xa4/0xe0 [ 187.387563][ T7294] should_failslab+0x9/0x20 [ 187.392066][ T7294] slab_pre_alloc_hook+0x3b/0xe0 [ 187.396996][ T7294] ? skb_clone+0x1cf/0x360 [ 187.401403][ T7294] kmem_cache_alloc+0x44/0x260 [ 187.406161][ T7294] skb_clone+0x1cf/0x360 [ 187.410403][ T7294] bpf_clone_redirect+0xa7/0x380 [ 187.415332][ T7294] bpf_prog_6893982b85ceadf7+0x56/0x220 [ 187.420872][ T7294] ? __kasan_slab_alloc+0xcf/0xf0 [ 187.425890][ T7294] ? __kasan_slab_alloc+0xbd/0xf0 [ 187.430903][ T7294] ? slab_post_alloc_hook+0x4f/0x2b0 [ 187.436392][ T7294] ? kmem_cache_alloc+0xf7/0x260 [ 187.441341][ T7294] ? __build_skb+0x2d/0x310 [ 187.445853][ T7294] ? build_skb+0x24/0x200 [ 187.450184][ T7294] ? bpf_prog_test_run_skb+0x279/0x1150 [ 187.455727][ T7294] ? bpf_prog_test_run+0x3d5/0x620 [ 187.460832][ T7294] ? __sys_bpf+0x52c/0x730 [ 187.465250][ T7294] ? __x64_sys_bpf+0x7c/0x90 [ 187.469830][ T7294] ? x64_sys_call+0x4b9/0x9a0 [ 187.474510][ T7294] ? do_syscall_64+0x4c/0xa0 [ 187.479109][ T7294] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 187.485181][ T7294] ? __kasan_check_read+0x11/0x20 [ 187.490221][ T7294] ? bpf_test_timer_continue+0x146/0x4a0 [ 187.495860][ T7294] bpf_test_run+0x33d/0x8d0 [ 187.500533][ T7294] ? convert___skb_to_skb+0x4f0/0x4f0 [ 187.505909][ T7294] ? eth_get_headlen+0x1f0/0x1f0 [ 187.510857][ T7294] ? convert___skb_to_skb+0x41/0x4f0 [ 187.516139][ T7294] bpf_prog_test_run_skb+0x9ec/0x1150 [ 187.521595][ T7294] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 187.527489][ T7294] bpf_prog_test_run+0x3d5/0x620 [ 187.532426][ T7294] ? bpf_prog_query+0x230/0x230 [ 187.537273][ T7294] ? selinux_bpf+0xce/0xf0 [ 187.541687][ T7294] ? security_bpf+0x82/0xa0 [ 187.546181][ T7294] __sys_bpf+0x52c/0x730 [ 187.550412][ T7294] ? bpf_link_show_fdinfo+0x310/0x310 [ 187.555775][ T7294] ? debug_smp_processor_id+0x17/0x20 [ 187.561138][ T7294] __x64_sys_bpf+0x7c/0x90 [ 187.565548][ T7294] x64_sys_call+0x4b9/0x9a0 [ 187.570043][ T7294] do_syscall_64+0x4c/0xa0 [ 187.574457][ T7294] ? clear_bhb_loop+0x50/0xa0 [ 187.579122][ T7294] ? clear_bhb_loop+0x50/0xa0 [ 187.583792][ T7294] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 187.589688][ T7294] RIP: 0033:0x7fbb8fd44929 [ 187.594093][ T7294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 187.613699][ T7294] RSP: 002b:00007fbb8e3ad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 187.622105][ T7294] RAX: ffffffffffffffda RBX: 00007fbb8ff6bfa0 RCX: 00007fbb8fd44929 [ 187.630066][ T7294] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 187.638027][ T7294] RBP: 00007fbb8e3ad090 R08: 0000000000000000 R09: 0000000000000000 [ 187.645989][ T7294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 187.653953][ T7294] R13: 0000000000000000 R14: 00007fbb8ff6bfa0 R15: 00007fffa7c8a5d8 [ 187.661918][ T7294] [ 187.845823][ T7302] device wg2 left promiscuous mode [ 187.882431][ T7302] device wg2 entered promiscuous mode [ 187.890617][ T7302] tun0: tun_chr_ioctl cmd 1074812118 [ 188.105023][ T7323] syz.1.2504[7323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.105115][ T7323] syz.1.2504[7323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.177499][ T30] audit: type=1400 audit(1749610116.078:148): avc: denied { create } for pid=7391 comm="syz.2.2540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 191.293533][ T7432] device wg2 entered promiscuous mode [ 191.592791][ T7438] device wg2 left promiscuous mode [ 192.149502][ T30] audit: type=1400 audit(1749610118.048:149): avc: denied { read } for pid=7447 comm="syz.4.2553" dev="nsfs" ino=4026532375 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 192.350111][ T30] audit: type=1400 audit(1749610118.108:150): avc: denied { open } for pid=7447 comm="syz.4.2553" path="mnt:[4026532375]" dev="nsfs" ino=4026532375 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 193.035153][ T7474] syz.3.2563[7474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.035217][ T7474] syz.3.2563[7474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.153257][ T7520] device veth1_macvtap left promiscuous mode [ 194.994768][ T7540] FAULT_INJECTION: forcing a failure. [ 194.994768][ T7540] name failslab, interval 1, probability 0, space 0, times 0 [ 195.017190][ T7540] CPU: 0 PID: 7540 Comm: syz.4.2585 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 195.027122][ T7540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 195.037192][ T7540] Call Trace: [ 195.040476][ T7540] [ 195.043414][ T7540] __dump_stack+0x21/0x30 [ 195.047841][ T7540] dump_stack_lvl+0xee/0x150 [ 195.052445][ T7540] ? show_regs_print_info+0x20/0x20 [ 195.057666][ T7540] ? dev_queue_xmit+0x20/0x20 [ 195.062355][ T7540] dump_stack+0x15/0x20 [ 195.066515][ T7540] should_fail+0x3c1/0x510 [ 195.071028][ T7540] __should_failslab+0xa4/0xe0 [ 195.075806][ T7540] should_failslab+0x9/0x20 [ 195.080316][ T7540] slab_pre_alloc_hook+0x3b/0xe0 [ 195.085264][ T7540] ? skb_clone+0x1cf/0x360 [ 195.089683][ T7540] kmem_cache_alloc+0x44/0x260 [ 195.094459][ T7540] skb_clone+0x1cf/0x360 [ 195.098709][ T7540] bpf_clone_redirect+0xa7/0x380 [ 195.103669][ T7540] bpf_prog_6893982b85ceadf7+0x56/0x574 [ 195.109321][ T7540] ? __kasan_slab_alloc+0xcf/0xf0 [ 195.114355][ T7540] ? __kasan_slab_alloc+0xbd/0xf0 [ 195.119385][ T7540] ? slab_post_alloc_hook+0x4f/0x2b0 [ 195.124683][ T7540] ? kmem_cache_alloc+0xf7/0x260 [ 195.129641][ T7540] ? __build_skb+0x2d/0x310 [ 195.134160][ T7540] ? build_skb+0x24/0x200 [ 195.138500][ T7540] ? bpf_prog_test_run_skb+0x279/0x1150 [ 195.144051][ T7540] ? bpf_prog_test_run+0x3d5/0x620 [ 195.149173][ T7540] ? __sys_bpf+0x52c/0x730 [ 195.153597][ T7540] ? __x64_sys_bpf+0x7c/0x90 [ 195.158198][ T7540] ? x64_sys_call+0x4b9/0x9a0 [ 195.162882][ T7540] ? do_syscall_64+0x4c/0xa0 [ 195.167479][ T7540] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 195.173560][ T7540] ? __kasan_check_read+0x11/0x20 [ 195.178591][ T7540] ? bpf_test_timer_continue+0x146/0x4a0 [ 195.184408][ T7540] bpf_test_run+0x33d/0x8d0 [ 195.188930][ T7540] ? convert___skb_to_skb+0x4f0/0x4f0 [ 195.194310][ T7540] ? eth_get_headlen+0x1f0/0x1f0 [ 195.199257][ T7540] ? convert___skb_to_skb+0x41/0x4f0 [ 195.204547][ T7540] bpf_prog_test_run_skb+0x9ec/0x1150 [ 195.210031][ T7540] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 195.215941][ T7540] bpf_prog_test_run+0x3d5/0x620 [ 195.220891][ T7540] ? bpf_prog_query+0x230/0x230 [ 195.225761][ T7540] ? selinux_bpf+0xce/0xf0 [ 195.230188][ T7540] ? security_bpf+0x82/0xa0 [ 195.234702][ T7540] __sys_bpf+0x52c/0x730 [ 195.238951][ T7540] ? bpf_link_show_fdinfo+0x310/0x310 [ 195.244337][ T7540] ? debug_smp_processor_id+0x17/0x20 [ 195.249729][ T7540] __x64_sys_bpf+0x7c/0x90 [ 195.254158][ T7540] x64_sys_call+0x4b9/0x9a0 [ 195.258673][ T7540] do_syscall_64+0x4c/0xa0 [ 195.263100][ T7540] ? clear_bhb_loop+0x50/0xa0 [ 195.267788][ T7540] ? clear_bhb_loop+0x50/0xa0 [ 195.272478][ T7540] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 195.278386][ T7540] RIP: 0033:0x7eff08a98929 [ 195.282810][ T7540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 195.302426][ T7540] RSP: 002b:00007eff07101038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 195.310849][ T7540] RAX: ffffffffffffffda RBX: 00007eff08cbffa0 RCX: 00007eff08a98929 [ 195.318826][ T7540] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 195.326816][ T7540] RBP: 00007eff07101090 R08: 0000000000000000 R09: 0000000000000000 [ 195.334801][ T7540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 195.342785][ T7540] R13: 0000000000000000 R14: 00007eff08cbffa0 R15: 00007ffd972ab3a8 [ 195.350775][ T7540] [ 196.579347][ T7588] device syzkaller0 entered promiscuous mode [ 200.560072][ T7732] device veth0_vlan left promiscuous mode [ 200.576219][ T7732] device veth0_vlan entered promiscuous mode [ 200.623929][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 200.660067][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 200.667916][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 201.762414][ T7810] device syzkaller0 entered promiscuous mode [ 204.553059][ T30] audit: type=1400 audit(1749610130.448:151): avc: denied { attach_queue } for pid=7930 comm="syz.2.2713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 206.012794][ T7979] device syzkaller0 entered promiscuous mode [ 208.657473][ T8079] device syzkaller0 entered promiscuous mode [ 209.303720][ T8118] device wg2 left promiscuous mode [ 210.605300][ T8160] ------------[ cut here ]------------ [ 210.611222][ T8160] trace type BPF program uses run-time allocation [ 210.618221][ T8160] WARNING: CPU: 1 PID: 8160 at kernel/bpf/verifier.c:11701 check_map_prog_compatibility+0x6cd/0x870 [ 210.653979][ T8160] Modules linked in: [ 210.670048][ T8160] CPU: 1 PID: 8160 Comm: syz.2.2794 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 210.685669][ T8160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 210.720603][ T8160] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 210.732344][ T8160] Code: ee ff 48 c7 c6 60 e2 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 f6 4b ee ff c6 05 f3 6d 6b 05 01 48 c7 c7 c0 de 47 85 e8 83 12 22 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 210.770926][ T8160] RSP: 0018:ffffc900010e7428 EFLAGS: 00010246 [ 210.789768][ T8160] RAX: d4d149016f342c00 RBX: 0000000000000001 RCX: 0000000000080000 [ 210.840911][ T8160] RDX: ffffc9000236f000 RSI: 0000000000002ba4 RDI: 0000000000002ba5 [ 210.879520][ T8160] RBP: ffffc900010e7470 R08: dffffc0000000000 R09: ffffed103ee24e93 [ 210.914984][ T8160] R10: ffffed103ee24e93 R11: 1ffff1103ee24e92 R12: ffff88812acf0000 [ 210.926956][ T8160] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88810bd78800 [ 210.935802][ T8160] FS: 00007fbb8e3ad6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 210.945193][ T8160] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 210.993305][ T8160] CR2: 0000000100000000 CR3: 000000011dacb000 CR4: 00000000003506a0 [ 211.027618][ T8160] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 211.059421][ T8160] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 211.395451][ T8160] Call Trace: [ 211.398779][ T8160] [ 211.437429][ T8160] resolve_pseudo_ldimm64+0x685/0x11d0 [ 211.443265][ T8160] ? check_attach_btf_id+0xde0/0xde0 [ 211.448755][ T8160] ? __mark_reg_known+0x1b0/0x1b0 [ 211.454145][ T8160] bpf_check+0x2c44/0xf330 [ 211.458594][ T8160] ? syscall_enter_from_user_mode+0x10/0x30 [ 211.464941][ T8160] ? 0xffffffffa002a268 [ 211.469104][ T8160] ? is_bpf_text_address+0x177/0x190 [ 211.474497][ T8160] ? bpf_get_btf_vmlinux+0x60/0x60 [ 211.479666][ T8160] ? unwind_get_return_address+0x4d/0x90 [ 211.485419][ T8160] ? stack_trace_save+0xe0/0xe0 [ 211.490333][ T8160] ? arch_stack_walk+0xee/0x140 [ 211.495254][ T8160] ? stack_trace_save+0x98/0xe0 [ 211.500424][ T8160] ? __stack_depot_save+0x34/0x480 [ 211.510507][ T8160] ? __kasan_slab_alloc+0x69/0xf0 [ 211.515952][ T8160] ? _find_next_bit+0x1fa/0x200 [ 211.539089][ T8160] ? __kasan_kmalloc+0xec/0x110 [ 211.553173][ T8160] ? __kasan_kmalloc+0xda/0x110 [ 211.558297][ T8185] device sit0 left promiscuous mode [ 211.560874][ T8160] ? kmem_cache_alloc_trace+0x119/0x270 [ 211.579583][ T8160] ? selinux_bpf_prog_alloc+0x51/0x140 [ 211.585763][ T8160] ? security_bpf_prog_alloc+0x62/0x90 [ 211.591450][ T8160] ? bpf_prog_load+0x97c/0x1550 [ 211.596352][ T8160] ? __sys_bpf+0x4c3/0x730 [ 211.600803][ T8160] ? __x64_sys_bpf+0x7c/0x90 [ 211.605659][ T8160] ? x64_sys_call+0x4b9/0x9a0 [ 211.611705][ T8160] ? do_syscall_64+0x4c/0xa0 [ 211.616976][ T8190] FAULT_INJECTION: forcing a failure. [ 211.616976][ T8190] name failslab, interval 1, probability 0, space 0, times 0 [ 211.617421][ T8160] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 211.646795][ T8190] CPU: 0 PID: 8190 Comm: syz.1.2805 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 211.656797][ T8190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 211.666860][ T8190] Call Trace: [ 211.670148][ T8190] [ 211.673083][ T8190] __dump_stack+0x21/0x30 [ 211.677440][ T8190] dump_stack_lvl+0xee/0x150 [ 211.682033][ T8190] ? show_regs_print_info+0x20/0x20 [ 211.687329][ T8190] dump_stack+0x15/0x20 [ 211.691617][ T8190] should_fail+0x3c1/0x510 [ 211.696060][ T8190] __should_failslab+0xa4/0xe0 [ 211.700842][ T8190] should_failslab+0x9/0x20 [ 211.705360][ T8190] slab_pre_alloc_hook+0x3b/0xe0 [ 211.710313][ T8190] kmem_cache_alloc_trace+0x48/0x270 [ 211.715602][ T8190] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 211.721299][ T8190] selinux_sk_alloc_security+0x7e/0x1a0 [ 211.726817][ T8190] security_sk_alloc+0x72/0xa0 [ 211.731557][ T8190] sk_prot_alloc+0x108/0x320 [ 211.736303][ T8190] sk_alloc+0x38/0x430 [ 211.740345][ T8190] inet6_create+0x5c4/0x1020 [ 211.740891][ T8160] ? irqentry_exit+0x37/0x40 [ 211.744917][ T8190] __sock_create+0x38d/0x7a0 [ 211.749549][ T8160] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 211.754098][ T8190] __sys_socketpair+0x1a1/0x590 [ 211.754119][ T8190] __x64_sys_socketpair+0x9b/0xb0 [ 211.754137][ T8190] x64_sys_call+0x36/0x9a0 [ 211.761156][ T8160] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 211.764768][ T8190] do_syscall_64+0x4c/0xa0 [ 211.764794][ T8190] ? clear_bhb_loop+0x50/0xa0 [ 211.769935][ T8160] ? memset+0x35/0x40 [ 211.774301][ T8190] ? clear_bhb_loop+0x50/0xa0 [ 211.774320][ T8190] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 211.774342][ T8190] RIP: 0033:0x7f3f56e46929 [ 211.774357][ T8190] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 211.774372][ T8190] RSP: 002b:00007f3f554af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 211.774392][ T8190] RAX: ffffffffffffffda RBX: 00007f3f5706dfa0 RCX: 00007f3f56e46929 [ 211.774405][ T8190] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 211.774416][ T8190] RBP: 00007f3f554af090 R08: 0000000000000000 R09: 0000000000000000 [ 211.774427][ T8190] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.774440][ T8190] R13: 0000000000000000 R14: 00007f3f5706dfa0 R15: 00007ffd58198268 [ 211.781897][ T8160] ? bpf_obj_name_cpy+0x193/0x1e0 [ 211.785094][ T8190] [ 211.789753][ T8160] bpf_prog_load+0x1042/0x1550 [ 211.796482][ T8191] device sit0 entered promiscuous mode [ 211.799363][ T8160] ? map_freeze+0x360/0x360 [ 211.900246][ T8160] ? selinux_bpf+0xc7/0xf0 [ 211.927567][ T8160] ? security_bpf+0x82/0xa0 [ 211.941093][ T8160] __sys_bpf+0x4c3/0x730 [ 211.945406][ T8160] ? bpf_link_show_fdinfo+0x310/0x310 [ 211.995638][ T8160] ? __kasan_check_write+0x14/0x20 [ 212.000794][ T8160] ? switch_fpu_return+0x15d/0x2c0 [ 212.010026][ T8160] __x64_sys_bpf+0x7c/0x90 [ 212.051475][ T8160] x64_sys_call+0x4b9/0x9a0 [ 212.056056][ T8160] do_syscall_64+0x4c/0xa0 [ 212.060603][ T8160] ? clear_bhb_loop+0x50/0xa0 [ 212.461184][ T8160] ? clear_bhb_loop+0x50/0xa0 [ 212.466009][ T8160] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 212.472292][ T8160] RIP: 0033:0x7fbb8fd44929 [ 212.477235][ T8160] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 212.541887][ T8160] RSP: 002b:00007fbb8e3ad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 212.602321][ T8160] RAX: ffffffffffffffda RBX: 00007fbb8ff6bfa0 RCX: 00007fbb8fd44929 [ 212.610633][ T8160] RDX: 0000000000000080 RSI: 0000200000000580 RDI: 0000000000000005 [ 212.618866][ T8160] RBP: 00007fbb8fdc6b39 R08: 0000000000000000 R09: 0000000000000000 [ 212.627136][ T8160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 212.673211][ T8160] R13: 0000000000000000 R14: 00007fbb8ff6bfa0 R15: 00007fffa7c8a5d8 [ 212.681549][ T8160] [ 212.684645][ T8160] ---[ end trace ee6a9acf544d7884 ]--- [ 213.105697][ T8205] device syzkaller0 entered promiscuous mode [ 214.478409][ T8242] FAULT_INJECTION: forcing a failure. [ 214.478409][ T8242] name failslab, interval 1, probability 0, space 0, times 0 [ 214.597460][ T8242] CPU: 0 PID: 8242 Comm: syz.1.2823 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 214.608757][ T8242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 214.618804][ T8242] Call Trace: [ 214.622084][ T8242] [ 214.625016][ T8242] __dump_stack+0x21/0x30 [ 214.629347][ T8242] dump_stack_lvl+0xee/0x150 [ 214.633933][ T8242] ? show_regs_print_info+0x20/0x20 [ 214.639125][ T8242] ? avc_has_perm+0x158/0x240 [ 214.643800][ T8242] dump_stack+0x15/0x20 [ 214.647952][ T8242] should_fail+0x3c1/0x510 [ 214.652364][ T8242] __should_failslab+0xa4/0xe0 [ 214.657124][ T8242] should_failslab+0x9/0x20 [ 214.661619][ T8242] slab_pre_alloc_hook+0x3b/0xe0 [ 214.666648][ T8242] ? sock_alloc_inode+0x1b/0xb0 [ 214.671491][ T8242] kmem_cache_alloc+0x44/0x260 [ 214.676247][ T8242] ? sockfs_init_fs_context+0xb0/0xb0 [ 214.681737][ T8242] sock_alloc_inode+0x1b/0xb0 [ 214.686406][ T8242] ? sockfs_init_fs_context+0xb0/0xb0 [ 214.691773][ T8242] new_inode_pseudo+0x62/0x210 [ 214.696530][ T8242] __sock_create+0x12c/0x7a0 [ 214.701125][ T8242] __sys_socketpair+0x218/0x590 [ 214.705968][ T8242] __x64_sys_socketpair+0x9b/0xb0 [ 214.710990][ T8242] x64_sys_call+0x36/0x9a0 [ 214.715403][ T8242] do_syscall_64+0x4c/0xa0 [ 214.719808][ T8242] ? clear_bhb_loop+0x50/0xa0 [ 214.724477][ T8242] ? clear_bhb_loop+0x50/0xa0 [ 214.729170][ T8242] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 214.735055][ T8242] RIP: 0033:0x7f3f56e46929 [ 214.739469][ T8242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 214.759069][ T8242] RSP: 002b:00007f3f554af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 214.767607][ T8242] RAX: ffffffffffffffda RBX: 00007f3f5706dfa0 RCX: 00007f3f56e46929 [ 214.775672][ T8242] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 214.783640][ T8242] RBP: 00007f3f554af090 R08: 0000000000000000 R09: 0000000000000000 [ 214.791620][ T8242] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 214.799590][ T8242] R13: 0000000000000000 R14: 00007f3f5706dfa0 R15: 00007ffd58198268 [ 214.807567][ T8242] [ 214.820886][ T8242] socket: no more sockets [ 214.936681][ T8251] device syzkaller0 entered promiscuous mode [ 215.252263][ T8268] sock: sock_set_timeout: `syz.3.2833' (pid 8268) tries to set negative timeout [ 216.043104][ T8291] device sit0 left promiscuous mode [ 216.074306][ T8280] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.081437][ T8280] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.089251][ T8280] device bridge_slave_0 entered promiscuous mode [ 216.097007][ T8291] device sit0 entered promiscuous mode [ 216.237133][ T8280] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.248612][ T8280] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.256362][ T8280] device bridge_slave_1 entered promiscuous mode [ 216.324562][ T8304] FAULT_INJECTION: forcing a failure. [ 216.324562][ T8304] name failslab, interval 1, probability 0, space 0, times 0 [ 216.347487][ T8304] CPU: 0 PID: 8304 Comm: syz.2.2845 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 216.358894][ T8304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 216.368961][ T8304] Call Trace: [ 216.372257][ T8304] [ 216.375192][ T8304] __dump_stack+0x21/0x30 [ 216.379533][ T8304] dump_stack_lvl+0xee/0x150 [ 216.384126][ T8304] ? show_regs_print_info+0x20/0x20 [ 216.389333][ T8304] dump_stack+0x15/0x20 [ 216.393498][ T8304] should_fail+0x3c1/0x510 [ 216.397920][ T8304] __should_failslab+0xa4/0xe0 [ 216.402690][ T8304] should_failslab+0x9/0x20 [ 216.407201][ T8304] slab_pre_alloc_hook+0x3b/0xe0 [ 216.412152][ T8304] ? security_inode_alloc+0x33/0x110 [ 216.417447][ T8304] kmem_cache_alloc+0x44/0x260 [ 216.422219][ T8304] security_inode_alloc+0x33/0x110 [ 216.427339][ T8304] inode_init_always+0x711/0x990 [ 216.432293][ T8304] new_inode_pseudo+0x91/0x210 [ 216.437068][ T8304] __sock_create+0x12c/0x7a0 [ 216.441665][ T8304] __sys_socketpair+0x218/0x590 [ 216.446529][ T8304] __x64_sys_socketpair+0x9b/0xb0 [ 216.451571][ T8304] x64_sys_call+0x36/0x9a0 [ 216.455996][ T8304] do_syscall_64+0x4c/0xa0 [ 216.460424][ T8304] ? clear_bhb_loop+0x50/0xa0 [ 216.465192][ T8304] ? clear_bhb_loop+0x50/0xa0 [ 216.469880][ T8304] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 216.476046][ T8304] RIP: 0033:0x7fbb8fd44929 [ 216.480467][ T8304] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 216.500222][ T8304] RSP: 002b:00007fbb8e3ad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 216.508658][ T8304] RAX: ffffffffffffffda RBX: 00007fbb8ff6bfa0 RCX: 00007fbb8fd44929 [ 216.516637][ T8304] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 216.524620][ T8304] RBP: 00007fbb8e3ad090 R08: 0000000000000000 R09: 0000000000000000 [ 216.532595][ T8304] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 216.540570][ T8304] R13: 0000000000000000 R14: 00007fbb8ff6bfa0 R15: 00007fffa7c8a5d8 [ 216.548551][ T8304] [ 216.633286][ T8304] socket: no more sockets [ 216.659032][ T30] audit: type=1400 audit(1749610142.558:152): avc: denied { create } for pid=8280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 216.731081][ T30] audit: type=1400 audit(1749610142.558:153): avc: denied { write } for pid=8280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 216.805677][ T30] audit: type=1400 audit(1749610142.558:154): avc: denied { read } for pid=8280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 217.076900][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.126361][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.165117][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.184612][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.195225][ T315] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.202308][ T315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.214891][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.229375][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.237742][ T315] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.244817][ T315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.283715][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.301409][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.309589][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.327331][ T8280] device veth0_vlan entered promiscuous mode [ 217.341407][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.401343][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.418943][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.426572][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.441177][ T8327] device sit0 left promiscuous mode [ 217.638873][ T8280] device veth1_macvtap entered promiscuous mode [ 217.659665][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 217.725098][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 217.758406][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 217.821450][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 217.829876][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 218.109329][ T8345] device veth0_vlan left promiscuous mode [ 218.116664][ T8347] FAULT_INJECTION: forcing a failure. [ 218.116664][ T8347] name failslab, interval 1, probability 0, space 0, times 0 [ 218.130188][ T8345] device veth0_vlan entered promiscuous mode [ 218.140407][ T8347] CPU: 0 PID: 8347 Comm: syz.3.2858 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 218.151717][ T8347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 218.161859][ T8347] Call Trace: [ 218.165132][ T8347] [ 218.168055][ T8347] __dump_stack+0x21/0x30 [ 218.172384][ T8347] dump_stack_lvl+0xee/0x150 [ 218.176966][ T8347] ? show_regs_print_info+0x20/0x20 [ 218.182156][ T8347] dump_stack+0x15/0x20 [ 218.186306][ T8347] should_fail+0x3c1/0x510 [ 218.190717][ T8347] __should_failslab+0xa4/0xe0 [ 218.195560][ T8347] should_failslab+0x9/0x20 [ 218.200054][ T8347] slab_pre_alloc_hook+0x3b/0xe0 [ 218.204983][ T8347] ? sk_prot_alloc+0x5f/0x320 [ 218.209652][ T8347] kmem_cache_alloc+0x44/0x260 [ 218.214412][ T8347] sk_prot_alloc+0x5f/0x320 [ 218.218910][ T8347] sk_alloc+0x38/0x430 [ 218.222969][ T8347] inet6_create+0x5c4/0x1020 [ 218.227555][ T8347] __sock_create+0x38d/0x7a0 [ 218.232139][ T8347] __sys_socketpair+0x218/0x590 [ 218.236981][ T8347] __x64_sys_socketpair+0x9b/0xb0 [ 218.241995][ T8347] x64_sys_call+0x36/0x9a0 [ 218.246405][ T8347] do_syscall_64+0x4c/0xa0 [ 218.250824][ T8347] ? clear_bhb_loop+0x50/0xa0 [ 218.255497][ T8347] ? clear_bhb_loop+0x50/0xa0 [ 218.260162][ T8347] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 218.266046][ T8347] RIP: 0033:0x7f9ffdd43929 [ 218.270453][ T8347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 218.290047][ T8347] RSP: 002b:00007f9ffc3ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 218.298456][ T8347] RAX: ffffffffffffffda RBX: 00007f9ffdf6afa0 RCX: 00007f9ffdd43929 [ 218.306419][ T8347] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 218.314385][ T8347] RBP: 00007f9ffc3ac090 R08: 0000000000000000 R09: 0000000000000000 [ 218.322357][ T8347] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 218.330350][ T8347] R13: 0000000000000000 R14: 00007f9ffdf6afa0 R15: 00007ffe58ea6448 [ 218.338317][ T8347] [ 218.362156][ T953] device bridge_slave_1 left promiscuous mode [ 218.380961][ T953] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.388670][ T953] device bridge_slave_0 left promiscuous mode [ 218.395169][ T953] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.405086][ T953] device veth1_macvtap left promiscuous mode [ 218.412620][ T953] device veth0_vlan left promiscuous mode [ 219.009544][ T8377] FAULT_INJECTION: forcing a failure. [ 219.009544][ T8377] name failslab, interval 1, probability 0, space 0, times 0 [ 219.075648][ T8377] CPU: 1 PID: 8377 Comm: syz.4.2872 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 219.086986][ T8377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 219.097047][ T8377] Call Trace: [ 219.100328][ T8377] [ 219.103278][ T8377] __dump_stack+0x21/0x30 [ 219.107614][ T8377] dump_stack_lvl+0xee/0x150 [ 219.112214][ T8377] ? show_regs_print_info+0x20/0x20 [ 219.117428][ T8377] dump_stack+0x15/0x20 [ 219.121596][ T8377] should_fail+0x3c1/0x510 [ 219.126020][ T8377] __should_failslab+0xa4/0xe0 [ 219.130789][ T8377] should_failslab+0x9/0x20 [ 219.135291][ T8377] slab_pre_alloc_hook+0x3b/0xe0 [ 219.140249][ T8377] kmem_cache_alloc_trace+0x48/0x270 [ 219.145537][ T8377] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 219.151267][ T8377] selinux_sk_alloc_security+0x7e/0x1a0 [ 219.156819][ T8377] security_sk_alloc+0x72/0xa0 [ 219.161593][ T8377] sk_prot_alloc+0x108/0x320 [ 219.166192][ T8377] sk_alloc+0x38/0x430 [ 219.170270][ T8377] inet6_create+0x5c4/0x1020 [ 219.174863][ T8377] __sock_create+0x38d/0x7a0 [ 219.179457][ T8377] __sys_socketpair+0x218/0x590 [ 219.184314][ T8377] __x64_sys_socketpair+0x9b/0xb0 [ 219.189354][ T8377] x64_sys_call+0x36/0x9a0 [ 219.193775][ T8377] do_syscall_64+0x4c/0xa0 [ 219.198191][ T8377] ? clear_bhb_loop+0x50/0xa0 [ 219.202879][ T8377] ? clear_bhb_loop+0x50/0xa0 [ 219.207564][ T8377] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 219.213465][ T8377] RIP: 0033:0x7eff08a98929 [ 219.217883][ T8377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 219.237494][ T8377] RSP: 002b:00007eff07101038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 219.245925][ T8377] RAX: ffffffffffffffda RBX: 00007eff08cbffa0 RCX: 00007eff08a98929 [ 219.253913][ T8377] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 219.261884][ T8377] RBP: 00007eff07101090 R08: 0000000000000000 R09: 0000000000000000 [ 219.269861][ T8377] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 219.277833][ T8377] R13: 0000000000000000 R14: 00007eff08cbffa0 R15: 00007ffd972ab3a8 [ 219.285898][ T8377] [ 220.590135][ T8418] FAULT_INJECTION: forcing a failure. [ 220.590135][ T8418] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 220.712903][ T8418] CPU: 1 PID: 8418 Comm: syz.2.2885 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 220.724475][ T8418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 220.734509][ T8418] Call Trace: [ 220.737772][ T8418] [ 220.740681][ T8418] __dump_stack+0x21/0x30 [ 220.744997][ T8418] dump_stack_lvl+0xee/0x150 [ 220.749607][ T8418] ? show_regs_print_info+0x20/0x20 [ 220.754794][ T8418] dump_stack+0x15/0x20 [ 220.758960][ T8418] should_fail+0x3c1/0x510 [ 220.763369][ T8418] should_fail_usercopy+0x1a/0x20 [ 220.768369][ T8418] _copy_to_user+0x20/0x90 [ 220.772763][ T8418] simple_read_from_buffer+0xe9/0x160 [ 220.778113][ T8418] proc_fail_nth_read+0x19a/0x210 [ 220.783140][ T8418] ? proc_fault_inject_write+0x2f0/0x2f0 [ 220.788768][ T8418] ? security_file_permission+0x83/0xa0 [ 220.794306][ T8418] ? proc_fault_inject_write+0x2f0/0x2f0 [ 220.799917][ T8418] vfs_read+0x282/0xbe0 [ 220.804065][ T8418] ? kernel_read+0x1f0/0x1f0 [ 220.808633][ T8418] ? _raw_spin_lock+0x8e/0xe0 [ 220.813304][ T8418] ? __kasan_check_write+0x14/0x20 [ 220.818391][ T8418] ? mutex_lock+0x95/0x1a0 [ 220.822785][ T8418] ? wait_for_completion_killable_timeout+0x10/0x10 [ 220.829375][ T8418] ? __fget_files+0x2c4/0x320 [ 220.834029][ T8418] ? __fdget_pos+0x2d2/0x380 [ 220.838606][ T8418] ? ksys_read+0x71/0x240 [ 220.842922][ T8418] ksys_read+0x140/0x240 [ 220.847173][ T8418] ? vfs_write+0xf70/0xf70 [ 220.851598][ T8418] ? __bpf_trace_sys_enter+0x62/0x70 [ 220.856893][ T8418] __x64_sys_read+0x7b/0x90 [ 220.861400][ T8418] x64_sys_call+0x96d/0x9a0 [ 220.865907][ T8418] do_syscall_64+0x4c/0xa0 [ 220.870409][ T8418] ? clear_bhb_loop+0x50/0xa0 [ 220.875089][ T8418] ? clear_bhb_loop+0x50/0xa0 [ 220.879771][ T8418] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 220.885670][ T8418] RIP: 0033:0x7fbb8fd4333c [ 220.890088][ T8418] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 220.909702][ T8418] RSP: 002b:00007fbb8e3ad030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 220.918127][ T8418] RAX: ffffffffffffffda RBX: 00007fbb8ff6bfa0 RCX: 00007fbb8fd4333c [ 220.926104][ T8418] RDX: 000000000000000f RSI: 00007fbb8e3ad0a0 RDI: 0000000000000005 [ 220.934077][ T8418] RBP: 00007fbb8e3ad090 R08: 0000000000000000 R09: 0000000000000000 [ 220.942050][ T8418] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 220.950027][ T8418] R13: 0000000000000000 R14: 00007fbb8ff6bfa0 R15: 00007fffa7c8a5d8 [ 220.957998][ T8418] [ 222.700111][ T8448] device veth0_vlan left promiscuous mode [ 222.705943][ T8448] device veth0_vlan entered promiscuous mode [ 222.713447][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.735417][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.748784][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.373415][ T8508] device veth0_vlan left promiscuous mode [ 224.402540][ T8508] device veth0_vlan entered promiscuous mode [ 224.457171][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.496322][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.504974][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 226.030416][ T8582] device veth0_vlan left promiscuous mode [ 226.099443][ T8582] device veth0_vlan entered promiscuous mode [ 226.631346][ T8586] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.638402][ T8586] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.645825][ T8586] device bridge_slave_0 entered promiscuous mode [ 226.652737][ T8586] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.659743][ T8586] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.667182][ T8586] device bridge_slave_1 entered promiscuous mode [ 226.709042][ T8586] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.716100][ T8586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.723421][ T8586] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.730494][ T8586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.747194][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.847974][ T451] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.863574][ T451] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.977626][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.994834][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.001922][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.077617][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.112119][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.119240][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.209998][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 227.220401][ T8593] device bridge_slave_1 left promiscuous mode [ 227.228873][ T8593] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.241877][ T8593] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.354511][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 227.644903][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 227.659140][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 227.786644][ T8586] device veth0_vlan entered promiscuous mode [ 227.842756][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 227.858999][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 227.867107][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 227.879728][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 228.400315][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 228.408621][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 228.418483][ T8586] device veth1_macvtap entered promiscuous mode [ 228.635727][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 228.644058][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 228.833341][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 228.842095][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 229.218407][ T8657] device wg2 entered promiscuous mode [ 229.467467][ T30] audit: type=1400 audit(1749610155.368:155): avc: denied { create } for pid=8669 comm="syz.1.2977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 230.037452][ T953] device erspan0 left promiscuous mode [ 230.043291][ T953] GPL: port 1(erspan0) entered disabled state [ 231.461750][ T953] device veth1_macvtap left promiscuous mode [ 231.581191][ T30] audit: type=1400 audit(1749610157.478:156): avc: denied { create } for pid=8750 comm="syz.2.3007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 231.671269][ T281] syz-executor (281) used greatest stack depth: 21504 bytes left [ 231.995523][ T8736] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.002789][ T8736] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.010281][ T8736] device bridge_slave_0 entered promiscuous mode [ 232.061229][ T8736] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.068358][ T8736] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.078795][ T8736] device bridge_slave_1 entered promiscuous mode [ 232.243540][ T30] audit: type=1400 audit(1749610158.148:157): avc: denied { setattr } for pid=8760 comm="syz.3.3009" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 232.454227][ T8736] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.461329][ T8736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.468632][ T8736] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.475719][ T8736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.554022][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.191772][ T451] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.253634][ T451] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.338052][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.346658][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.355381][ T451] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.362453][ T451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.375673][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.384189][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.395110][ T451] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.402194][ T451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.409859][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 233.426789][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.483893][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.511372][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.602785][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 233.641298][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 233.696906][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 233.707869][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 233.809802][ T8736] device veth0_vlan entered promiscuous mode [ 233.841097][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 233.891215][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 233.981834][ T8736] device veth1_macvtap entered promiscuous mode [ 233.990949][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 233.999637][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 234.018726][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 234.026549][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 234.034750][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 234.062203][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 234.070615][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 235.301723][ T953] device bridge_slave_1 left promiscuous mode [ 235.307966][ T953] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.339323][ T953] device bridge_slave_0 left promiscuous mode [ 235.362861][ T953] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.749453][ T8828] device syzkaller0 entered promiscuous mode [ 236.899053][ T8872] device sit0 entered promiscuous mode [ 237.037896][ T8886] GPL: port 1(erspan0) entered blocking state [ 237.044028][ T8886] GPL: port 1(erspan0) entered forwarding state [ 237.073131][ T8885] ref_ctr_offset mismatch. inode: 0xbce offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 237.864035][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 238.706553][ T8933] device syzkaller0 entered promiscuous mode [ 238.898181][ T8929] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.905351][ T8929] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.915111][ T8929] device bridge_slave_0 entered promiscuous mode [ 238.923666][ T8929] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.930722][ T8929] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.938187][ T8929] device bridge_slave_1 entered promiscuous mode [ 239.398423][ T8968] device veth1_macvtap left promiscuous mode [ 239.542004][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.559693][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.622797][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.663631][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.688179][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.695273][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.776608][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.813367][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 239.822434][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 239.830243][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 239.838583][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.846562][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.855387][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.863768][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.870799][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.878630][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.886676][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.902865][ T8929] device veth0_vlan entered promiscuous mode [ 239.965526][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 239.982955][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.026308][ T8929] device veth1_macvtap entered promiscuous mode [ 240.083758][ T30] audit: type=1400 audit(1749610165.988:158): avc: denied { create } for pid=8993 comm="syz.1.3089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 240.102692][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 240.118027][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 240.127034][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 240.433807][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 240.450275][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 240.658751][ T9009] bond_slave_1: mtu less than device minimum [ 241.620620][ T9038] bond_slave_1: mtu less than device minimum [ 241.767898][ T9048] device pim6reg1 entered promiscuous mode [ 242.547198][ T9097] device syzkaller0 entered promiscuous mode [ 243.403069][ T9118] device veth1_macvtap left promiscuous mode [ 243.608372][ T9128] device veth1_macvtap entered promiscuous mode [ 243.624528][ T9128] device macsec0 entered promiscuous mode [ 244.005210][ T9149] device syzkaller0 entered promiscuous mode [ 244.607938][ T9182] device veth0_vlan left promiscuous mode [ 244.621194][ T9182] device veth0_vlan entered promiscuous mode [ 244.632221][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 244.651103][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 244.672097][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.406647][ T282] syz-executor (282) used greatest stack depth: 21184 bytes left [ 246.493894][ T9270] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.501063][ T9270] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.508454][ T9270] device bridge_slave_0 entered promiscuous mode [ 246.572751][ T9270] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.579805][ T9270] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.660749][ T9270] device bridge_slave_1 entered promiscuous mode [ 246.739772][ T9287] device veth1_macvtap left promiscuous mode [ 246.857329][ T9287] device veth1_macvtap entered promiscuous mode [ 246.889264][ T9287] device macsec0 entered promiscuous mode [ 247.078870][ T9302] device veth1_macvtap left promiscuous mode [ 247.088406][ T9302] device macsec0 entered promiscuous mode [ 247.268842][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.289216][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.358128][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.379366][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.410512][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.417600][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.425841][ T9317] device pim6reg1 entered promiscuous mode [ 247.471631][ T30] audit: type=1400 audit(1749610173.378:159): avc: denied { create } for pid=9325 comm="syz.0.3206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 247.508080][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.525773][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.534443][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.545425][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.552578][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.561827][ T9321] device veth0_vlan left promiscuous mode [ 247.567841][ T9321] device veth0_vlan entered promiscuous mode [ 247.587939][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 247.596422][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.623149][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 247.631729][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.644640][ T9270] device veth0_vlan entered promiscuous mode [ 247.654997][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 247.664532][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 247.683274][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 247.697574][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.710459][ T9270] device veth1_macvtap entered promiscuous mode [ 247.736670][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.746661][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.777322][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 247.792644][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 247.802083][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 247.813543][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 247.822006][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 247.966425][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 247.976971][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 248.354588][ T953] GPL: port 1(erspan0) entered disabled state [ 248.396361][ T953] device erspan0 left promiscuous mode [ 248.412676][ T953] GPL: port 1(erspan0) entered disabled state [ 248.594691][ T9389] syz.1.3227[9389] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.594766][ T9389] syz.1.3227[9389] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.688662][ T30] audit: type=1400 audit(1749610174.588:160): avc: denied { create } for pid=9390 comm="syz.0.3228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 248.724204][ T9389] device syzkaller0 entered promiscuous mode [ 248.966605][ T30] audit: type=1400 audit(1749610174.868:161): avc: denied { create } for pid=9396 comm="syz.3.3230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 249.096577][ T9397] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.103765][ T9397] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.332698][ T9409] device bridge0 entered promiscuous mode [ 249.878981][ T9435] bond_slave_1: mtu less than device minimum [ 254.252890][ T9608] device syzkaller0 entered promiscuous mode [ 254.262713][ T9614] bond_slave_1: mtu less than device minimum [ 254.835424][ T9640] device syzkaller0 entered promiscuous mode [ 258.441572][ T9695] device wg2 entered promiscuous mode [ 259.954127][ T9766] device syzkaller0 entered promiscuous mode [ 263.858129][ T9908] FAULT_INJECTION: forcing a failure. [ 263.858129][ T9908] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 263.911815][ T9908] CPU: 1 PID: 9908 Comm: syz.2.3406 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 263.923142][ T9908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 263.933208][ T9908] Call Trace: [ 263.936495][ T9908] [ 263.939433][ T9908] __dump_stack+0x21/0x30 [ 263.943773][ T9908] dump_stack_lvl+0xee/0x150 [ 263.948367][ T9908] ? show_regs_print_info+0x20/0x20 [ 263.953571][ T9908] ? __kasan_check_write+0x14/0x20 [ 263.958686][ T9908] ? proc_fail_nth_write+0x17a/0x1f0 [ 263.964020][ T9908] ? proc_fail_nth_read+0x210/0x210 [ 263.969231][ T9908] dump_stack+0x15/0x20 [ 263.973389][ T9908] should_fail+0x3c1/0x510 [ 263.977818][ T9908] should_fail_usercopy+0x1a/0x20 [ 263.982863][ T9908] _copy_from_user+0x20/0xd0 [ 263.987462][ T9908] perf_copy_attr+0x154/0x870 [ 263.992153][ T9908] __se_sys_perf_event_open+0xcb/0x1b80 [ 263.997703][ T9908] ? __kasan_check_write+0x14/0x20 [ 264.002823][ T9908] ? mutex_unlock+0x89/0x220 [ 264.007420][ T9908] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 264.013051][ T9908] ? __ia32_sys_read+0x90/0x90 [ 264.017936][ T9908] __x64_sys_perf_event_open+0xbf/0xd0 [ 264.023392][ T9908] x64_sys_call+0x50d/0x9a0 [ 264.027893][ T9908] do_syscall_64+0x4c/0xa0 [ 264.032302][ T9908] ? clear_bhb_loop+0x50/0xa0 [ 264.037012][ T9908] ? clear_bhb_loop+0x50/0xa0 [ 264.041679][ T9908] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 264.047568][ T9908] RIP: 0033:0x7f5cbb752929 [ 264.051979][ T9908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 264.071579][ T9908] RSP: 002b:00007f5cb9dbb038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 264.079996][ T9908] RAX: ffffffffffffffda RBX: 00007f5cbb979fa0 RCX: 00007f5cbb752929 [ 264.087960][ T9908] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 264.095922][ T9908] RBP: 00007f5cb9dbb090 R08: 0000000000000000 R09: 0000000000000000 [ 264.103883][ T9908] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 264.111849][ T9908] R13: 0000000000000000 R14: 00007f5cbb979fa0 R15: 00007ffffb8a3a58 [ 264.119820][ T9908] [ 265.122149][ T9934] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.129333][ T9934] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.137849][ T9930] bond_slave_1: mtu less than device minimum [ 265.147682][ T9948] device sit0 left promiscuous mode [ 265.187251][ T9949] device sit0 entered promiscuous mode [ 265.232635][ T9957] FAULT_INJECTION: forcing a failure. [ 265.232635][ T9957] name failslab, interval 1, probability 0, space 0, times 0 [ 265.245428][ T9957] CPU: 1 PID: 9957 Comm: syz.2.3422 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 265.256999][ T9957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 265.267169][ T9957] Call Trace: [ 265.270454][ T9957] [ 265.273388][ T9957] __dump_stack+0x21/0x30 [ 265.277731][ T9957] dump_stack_lvl+0xee/0x150 [ 265.282321][ T9957] ? show_regs_print_info+0x20/0x20 [ 265.287579][ T9957] ? avc_has_perm_noaudit+0x2f4/0x460 [ 265.292925][ T9957] dump_stack+0x15/0x20 [ 265.297056][ T9957] should_fail+0x3c1/0x510 [ 265.301457][ T9957] __should_failslab+0xa4/0xe0 [ 265.306208][ T9957] should_failslab+0x9/0x20 [ 265.310707][ T9957] slab_pre_alloc_hook+0x3b/0xe0 [ 265.315622][ T9957] ? perf_event_alloc+0x116/0x1a20 [ 265.320727][ T9957] kmem_cache_alloc+0x44/0x260 [ 265.325793][ T9957] perf_event_alloc+0x116/0x1a20 [ 265.330720][ T9957] ? _raw_spin_unlock+0x4d/0x70 [ 265.335542][ T9957] ? alloc_fd+0x4ba/0x570 [ 265.339869][ T9957] __se_sys_perf_event_open+0x6c5/0x1b80 [ 265.345501][ T9957] ? __kasan_check_write+0x14/0x20 [ 265.350763][ T9957] ? mutex_unlock+0x89/0x220 [ 265.355331][ T9957] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 265.360948][ T9957] ? __ia32_sys_read+0x90/0x90 [ 265.365685][ T9957] __x64_sys_perf_event_open+0xbf/0xd0 [ 265.371119][ T9957] x64_sys_call+0x50d/0x9a0 [ 265.375604][ T9957] do_syscall_64+0x4c/0xa0 [ 265.379994][ T9957] ? clear_bhb_loop+0x50/0xa0 [ 265.384642][ T9957] ? clear_bhb_loop+0x50/0xa0 [ 265.389288][ T9957] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 265.395175][ T9957] RIP: 0033:0x7f5cbb752929 [ 265.399562][ T9957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 265.419142][ T9957] RSP: 002b:00007f5cb9dbb038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 265.427632][ T9957] RAX: ffffffffffffffda RBX: 00007f5cbb979fa0 RCX: 00007f5cbb752929 [ 265.435583][ T9957] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 265.443528][ T9957] RBP: 00007f5cb9dbb090 R08: 0000000000000000 R09: 0000000000000000 [ 265.451492][ T9957] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 265.459444][ T9957] R13: 0000000000000000 R14: 00007f5cbb979fa0 R15: 00007ffffb8a3a58 [ 265.467582][ T9957] [ 265.475774][ T9953] device sit0 entered promiscuous mode [ 265.674693][ T9974] device veth0_vlan left promiscuous mode [ 265.733857][ T30] audit: type=1400 audit(1749610191.638:162): avc: denied { ioctl } for pid=9977 comm="syz.2.3429" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 265.740652][ T9974] device veth0_vlan entered promiscuous mode [ 277.262171][T10042] device veth0_vlan left promiscuous mode [ 277.293667][T10042] device veth0_vlan entered promiscuous mode [ 277.362765][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 277.381375][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 277.401236][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 280.987097][T10147] device veth0_vlan left promiscuous mode [ 280.995800][T10147] device veth0_vlan entered promiscuous mode [ 281.016646][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 281.031516][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 281.039109][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 283.471716][T10199] device veth0_vlan left promiscuous mode [ 283.499885][T10199] device veth0_vlan entered promiscuous mode [ 284.457202][T10220] device wg2 left promiscuous mode [ 287.355848][T10289] device veth0_vlan left promiscuous mode [ 287.362240][T10289] device veth0_vlan entered promiscuous mode [ 287.473712][T10290] device veth0_vlan left promiscuous mode [ 287.479848][T10290] device veth0_vlan entered promiscuous mode [ 288.075416][T10303] FAULT_INJECTION: forcing a failure. [ 288.075416][T10303] name failslab, interval 1, probability 0, space 0, times 0 [ 288.361172][T10303] CPU: 0 PID: 10303 Comm: syz.4.3526 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 288.372569][T10303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 288.382699][T10303] Call Trace: [ 288.385956][T10303] [ 288.388871][T10303] __dump_stack+0x21/0x30 [ 288.393190][T10303] dump_stack_lvl+0xee/0x150 [ 288.397802][T10303] ? show_regs_print_info+0x20/0x20 [ 288.403008][T10303] ? dump_stack+0x9/0x20 [ 288.407266][T10303] dump_stack+0x15/0x20 [ 288.411428][T10303] should_fail+0x3c1/0x510 [ 288.415849][T10303] __should_failslab+0xa4/0xe0 [ 288.420613][T10303] should_failslab+0x9/0x20 [ 288.425100][T10303] slab_pre_alloc_hook+0x3b/0xe0 [ 288.430030][T10303] __kmalloc+0x6d/0x2c0 [ 288.434184][T10303] ? bpf_test_init+0x100/0x1c0 [ 288.438925][T10303] bpf_test_init+0x100/0x1c0 [ 288.443522][T10303] bpf_prog_test_run_skb+0x193/0x1150 [ 288.448906][T10303] ? __kasan_check_write+0x14/0x20 [ 288.454011][T10303] ? fput_many+0x15a/0x1a0 [ 288.458443][T10303] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 288.464354][T10303] bpf_prog_test_run+0x3d5/0x620 [ 288.469292][T10303] ? bpf_prog_query+0x230/0x230 [ 288.474118][T10303] ? selinux_bpf+0xce/0xf0 [ 288.478507][T10303] ? security_bpf+0x82/0xa0 [ 288.482984][T10303] __sys_bpf+0x52c/0x730 [ 288.487211][T10303] ? bpf_link_show_fdinfo+0x310/0x310 [ 288.492559][T10303] __x64_sys_bpf+0x7c/0x90 [ 288.496999][T10303] x64_sys_call+0x4b9/0x9a0 [ 288.501484][T10303] do_syscall_64+0x4c/0xa0 [ 288.505891][T10303] ? clear_bhb_loop+0x50/0xa0 [ 288.510568][T10303] ? clear_bhb_loop+0x50/0xa0 [ 288.515232][T10303] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 288.521116][T10303] RIP: 0033:0x7f314e0e7929 [ 288.525519][T10303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 288.545116][T10303] RSP: 002b:00007f314c750038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 288.553543][T10303] RAX: ffffffffffffffda RBX: 00007f314e30efa0 RCX: 00007f314e0e7929 [ 288.561622][T10303] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 288.569590][T10303] RBP: 00007f314c750090 R08: 0000000000000000 R09: 0000000000000000 [ 288.577552][T10303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 288.585519][T10303] R13: 0000000000000000 R14: 00007f314e30efa0 R15: 00007ffe6df10758 [ 288.593490][T10303] [ 289.035898][T10326] device veth0_vlan left promiscuous mode [ 289.049363][T10326] device veth0_vlan entered promiscuous mode [ 289.247672][T10345] FAULT_INJECTION: forcing a failure. [ 289.247672][T10345] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 289.304448][T10345] CPU: 1 PID: 10345 Comm: syz.3.3543 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 289.315858][T10345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 289.325924][T10345] Call Trace: [ 289.329212][T10345] [ 289.332148][T10345] __dump_stack+0x21/0x30 [ 289.336487][T10345] dump_stack_lvl+0xee/0x150 [ 289.341091][T10345] ? show_regs_print_info+0x20/0x20 [ 289.346313][T10345] dump_stack+0x15/0x20 [ 289.350474][T10345] should_fail+0x3c1/0x510 [ 289.354897][T10345] should_fail_usercopy+0x1a/0x20 [ 289.359926][T10345] _copy_from_user+0x20/0xd0 [ 289.364526][T10345] bpf_test_init+0x13d/0x1c0 [ 289.369119][T10345] bpf_prog_test_run_skb+0x193/0x1150 [ 289.374500][T10345] ? __kasan_check_write+0x14/0x20 [ 289.379620][T10345] ? fput_many+0x15a/0x1a0 [ 289.384050][T10345] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 289.389964][T10345] bpf_prog_test_run+0x3d5/0x620 [ 289.394923][T10345] ? bpf_prog_query+0x230/0x230 [ 289.399788][T10345] ? __sys_bpf+0x2b1/0x730 [ 289.404223][T10345] ? __sanitizer_cov_trace_switch+0x85/0xe0 [ 289.410130][T10345] __sys_bpf+0x52c/0x730 [ 289.414377][T10345] ? bpf_link_show_fdinfo+0x310/0x310 [ 289.419766][T10345] ? debug_smp_processor_id+0x17/0x20 [ 289.425151][T10345] __x64_sys_bpf+0x7c/0x90 [ 289.429574][T10345] x64_sys_call+0x4b9/0x9a0 [ 289.434084][T10345] do_syscall_64+0x4c/0xa0 [ 289.438511][T10345] ? clear_bhb_loop+0x50/0xa0 [ 289.443213][T10345] ? clear_bhb_loop+0x50/0xa0 [ 289.447900][T10345] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 289.453923][T10345] RIP: 0033:0x7f9ffdd43929 [ 289.458352][T10345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 289.477964][T10345] RSP: 002b:00007f9ffc3ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 289.486384][T10345] RAX: ffffffffffffffda RBX: 00007f9ffdf6afa0 RCX: 00007f9ffdd43929 [ 289.494352][T10345] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 289.502322][T10345] RBP: 00007f9ffc3ac090 R08: 0000000000000000 R09: 0000000000000000 [ 289.510286][T10345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 289.518254][T10345] R13: 0000000000000000 R14: 00007f9ffdf6afa0 R15: 00007ffe58ea6448 [ 289.526238][T10345] [ 290.493052][T10389] device veth0_vlan left promiscuous mode [ 290.541466][T10389] device veth0_vlan entered promiscuous mode [ 290.553655][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.594324][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 290.700527][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 291.232526][T10412] FAULT_INJECTION: forcing a failure. [ 291.232526][T10412] name failslab, interval 1, probability 0, space 0, times 0 [ 291.279817][T10412] CPU: 1 PID: 10412 Comm: syz.1.3567 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 291.291223][T10412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 291.301287][T10412] Call Trace: [ 291.304574][T10412] [ 291.307514][T10412] __dump_stack+0x21/0x30 [ 291.311853][T10412] dump_stack_lvl+0xee/0x150 [ 291.316449][T10412] ? show_regs_print_info+0x20/0x20 [ 291.321743][T10412] dump_stack+0x15/0x20 [ 291.325912][T10412] should_fail+0x3c1/0x510 [ 291.330343][T10412] __should_failslab+0xa4/0xe0 [ 291.335130][T10412] should_failslab+0x9/0x20 [ 291.339637][T10412] slab_pre_alloc_hook+0x3b/0xe0 [ 291.344582][T10412] __kmalloc+0x6d/0x2c0 [ 291.348753][T10412] ? sk_prot_alloc+0xed/0x320 [ 291.353445][T10412] ? check_stack_object+0x81/0x140 [ 291.358565][T10412] sk_prot_alloc+0xed/0x320 [ 291.363087][T10412] sk_alloc+0x38/0x430 [ 291.367170][T10412] bpf_prog_test_run_skb+0x24b/0x1150 [ 291.372552][T10412] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 291.378721][T10412] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 291.384628][T10412] ? bpf_prog_test_run+0x3c7/0x620 [ 291.389748][T10412] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 291.395652][T10412] bpf_prog_test_run+0x3d5/0x620 [ 291.400613][T10412] ? _copy_from_user+0x71/0xd0 [ 291.405386][T10412] ? bpf_prog_query+0x230/0x230 [ 291.410232][T10412] ? selinux_bpf+0xce/0xf0 [ 291.414648][T10412] ? security_bpf+0x82/0xa0 [ 291.419147][T10412] __sys_bpf+0x52c/0x730 [ 291.423393][T10412] ? bpf_link_show_fdinfo+0x310/0x310 [ 291.428767][T10412] ? debug_smp_processor_id+0x17/0x20 [ 291.434133][T10412] __x64_sys_bpf+0x7c/0x90 [ 291.438553][T10412] x64_sys_call+0x4b9/0x9a0 [ 291.443061][T10412] do_syscall_64+0x4c/0xa0 [ 291.447557][T10412] ? clear_bhb_loop+0x50/0xa0 [ 291.452232][T10412] ? clear_bhb_loop+0x50/0xa0 [ 291.456906][T10412] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 291.462812][T10412] RIP: 0033:0x7f1c16e75929 [ 291.467232][T10412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 291.486830][T10412] RSP: 002b:00007f1c154de038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 291.495238][T10412] RAX: ffffffffffffffda RBX: 00007f1c1709cfa0 RCX: 00007f1c16e75929 [ 291.503210][T10412] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 291.511193][T10412] RBP: 00007f1c154de090 R08: 0000000000000000 R09: 0000000000000000 [ 291.519187][T10412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 291.527168][T10412] R13: 0000000000000000 R14: 00007f1c1709cfa0 R15: 00007ffc55fd47a8 [ 291.535140][T10412] [ 291.590759][T10424] device syzkaller0 entered promiscuous mode [ 292.156074][T10437] device veth0_vlan left promiscuous mode [ 292.176384][T10437] device veth0_vlan entered promiscuous mode [ 292.194909][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 292.211497][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 292.250528][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 293.779099][T10524] device veth1_macvtap entered promiscuous mode [ 293.798305][T10524] device macsec0 entered promiscuous mode [ 293.812855][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 294.352996][T10541] device pim6reg1 entered promiscuous mode [ 295.521291][T10591] bond_slave_1: mtu less than device minimum [ 295.802710][T10596] device veth0_vlan left promiscuous mode [ 295.819503][T10596] device veth0_vlan entered promiscuous mode [ 296.010758][T10603] device veth1_macvtap left promiscuous mode [ 296.017110][T10603] device macsec0 left promiscuous mode [ 296.117731][T10608] device syzkaller0 entered promiscuous mode [ 296.849734][T10655] device syzkaller0 entered promiscuous mode [ 297.436115][T10679] FAULT_INJECTION: forcing a failure. [ 297.436115][T10679] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 297.449760][T10679] CPU: 0 PID: 10679 Comm: syz.3.3665 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 297.461269][T10679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 297.471347][T10679] Call Trace: [ 297.474641][T10679] [ 297.477584][T10679] __dump_stack+0x21/0x30 [ 297.481925][T10679] dump_stack_lvl+0xee/0x150 [ 297.486532][T10679] ? show_regs_print_info+0x20/0x20 [ 297.491751][T10679] dump_stack+0x15/0x20 [ 297.495920][T10679] should_fail+0x3c1/0x510 [ 297.500360][T10679] should_fail_usercopy+0x1a/0x20 [ 297.505397][T10679] _copy_to_user+0x20/0x90 [ 297.509830][T10679] bpf_test_finish+0x15a/0x3b0 [ 297.514690][T10679] ? convert_skb_to___skb+0x360/0x360 [ 297.520069][T10679] ? convert___skb_to_skb+0x19/0x4f0 [ 297.525372][T10679] ? __sanitizer_cov_trace_pc+0x1/0x60 [ 297.530860][T10679] ? convert_skb_to___skb+0x203/0x360 [ 297.536241][T10679] bpf_prog_test_run_skb+0xbba/0x1150 [ 297.541625][T10679] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 297.547531][T10679] bpf_prog_test_run+0x3d5/0x620 [ 297.552480][T10679] ? bpf_prog_query+0x230/0x230 [ 297.557335][T10679] ? __sys_bpf+0x2b1/0x730 [ 297.561770][T10679] ? __sanitizer_cov_trace_switch+0x61/0xe0 [ 297.567674][T10679] __sys_bpf+0x52c/0x730 [ 297.571933][T10679] ? bpf_link_show_fdinfo+0x310/0x310 [ 297.577312][T10679] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 297.583470][T10679] __x64_sys_bpf+0x7c/0x90 [ 297.587893][T10679] x64_sys_call+0x4b9/0x9a0 [ 297.592397][T10679] do_syscall_64+0x4c/0xa0 [ 297.596812][T10679] ? clear_bhb_loop+0x50/0xa0 [ 297.601488][T10679] ? clear_bhb_loop+0x50/0xa0 [ 297.606166][T10679] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 297.612065][T10679] RIP: 0033:0x7f9ffdd43929 [ 297.616484][T10679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 297.636189][T10679] RSP: 002b:00007f9ffc3ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 297.644671][T10679] RAX: ffffffffffffffda RBX: 00007f9ffdf6afa0 RCX: 00007f9ffdd43929 [ 297.652650][T10679] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 297.660632][T10679] RBP: 00007f9ffc3ac090 R08: 0000000000000000 R09: 0000000000000000 [ 297.668604][T10679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 297.676576][T10679] R13: 0000000000000000 R14: 00007f9ffdf6afa0 R15: 00007ffe58ea6448 [ 297.684553][T10679] [ 298.888900][T10714] device veth0_vlan left promiscuous mode [ 298.953961][T10714] device veth0_vlan entered promiscuous mode [ 299.005625][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 299.029431][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 299.061098][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 300.848370][T10738] device veth0_vlan left promiscuous mode [ 300.858292][T10738] device veth0_vlan entered promiscuous mode [ 300.935278][ T30] audit: type=1400 audit(1749610226.838:163): avc: denied { create } for pid=10730 comm="syz.4.3681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 301.864311][T10749] device veth0_vlan left promiscuous mode [ 301.904263][T10749] device veth0_vlan entered promiscuous mode [ 302.050966][T10761] device veth0_vlan left promiscuous mode [ 302.184878][T10761] device veth0_vlan entered promiscuous mode [ 303.792619][T10783] FAULT_INJECTION: forcing a failure. [ 303.792619][T10783] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 304.606916][T10783] CPU: 1 PID: 10783 Comm: syz.3.3697 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 304.618336][T10783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 304.628442][T10783] Call Trace: [ 304.631718][T10783] [ 304.634642][T10783] __dump_stack+0x21/0x30 [ 304.638973][T10783] dump_stack_lvl+0xee/0x150 [ 304.643569][T10783] ? show_regs_print_info+0x20/0x20 [ 304.648758][T10783] ? vfs_write+0xc17/0xf70 [ 304.653167][T10783] dump_stack+0x15/0x20 [ 304.657314][T10783] should_fail+0x3c1/0x510 [ 304.661727][T10783] should_fail_usercopy+0x1a/0x20 [ 304.666748][T10783] _copy_from_user+0x20/0xd0 [ 304.671332][T10783] __sys_bpf+0x233/0x730 [ 304.675572][T10783] ? bpf_link_show_fdinfo+0x310/0x310 [ 304.680939][T10783] ? debug_smp_processor_id+0x17/0x20 [ 304.686305][T10783] __x64_sys_bpf+0x7c/0x90 [ 304.690715][T10783] x64_sys_call+0x4b9/0x9a0 [ 304.695212][T10783] do_syscall_64+0x4c/0xa0 [ 304.699621][T10783] ? clear_bhb_loop+0x50/0xa0 [ 304.704290][T10783] ? clear_bhb_loop+0x50/0xa0 [ 304.708957][T10783] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 304.714846][T10783] RIP: 0033:0x7f9ffdd43929 [ 304.719253][T10783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 304.738863][T10783] RSP: 002b:00007f9ffc3ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 304.747287][T10783] RAX: ffffffffffffffda RBX: 00007f9ffdf6afa0 RCX: 00007f9ffdd43929 [ 304.755353][T10783] RDX: 0000000000000028 RSI: 00002000000000c0 RDI: 000000000000000a [ 304.763336][T10783] RBP: 00007f9ffc3ac090 R08: 0000000000000000 R09: 0000000000000000 [ 304.771304][T10783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 304.779276][T10783] R13: 0000000000000000 R14: 00007f9ffdf6afa0 R15: 00007ffe58ea6448 [ 304.787244][T10783] [ 305.416918][T10807] device veth0_vlan left promiscuous mode [ 305.427427][T10807] device veth0_vlan entered promiscuous mode [ 306.870983][T10839] device veth0_vlan left promiscuous mode [ 306.877326][T10839] device veth0_vlan entered promiscuous mode [ 308.711080][T10869] syz.2.3734[10869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.711176][T10869] syz.2.3734[10869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.901091][T10880] device syzkaller0 entered promiscuous mode [ 308.962951][T10882] device veth0_vlan left promiscuous mode [ 308.974055][T10882] device veth0_vlan entered promiscuous mode [ 308.996948][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 309.005341][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 309.013124][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 310.876667][T10927] device veth0_vlan left promiscuous mode [ 310.916773][T10927] device veth0_vlan entered promiscuous mode [ 311.284444][T10938] device veth0_vlan left promiscuous mode [ 311.297185][T10938] device veth0_vlan entered promiscuous mode [ 311.318579][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 311.361891][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 311.420356][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 312.338376][T10951] device syzkaller0 entered promiscuous mode [ 313.340856][T10974] device veth0_vlan left promiscuous mode [ 313.368639][T10974] device veth0_vlan entered promiscuous mode [ 314.494089][T10982] device veth0_vlan left promiscuous mode [ 314.502895][T10982] device veth0_vlan entered promiscuous mode [ 314.515336][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.523715][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.531686][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 314.765916][T10990] device bridge0 entered promiscuous mode [ 315.640965][T10997] device veth0_vlan left promiscuous mode [ 315.653974][T10997] device veth0_vlan entered promiscuous mode [ 315.664489][ T953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.678504][ T953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 315.686737][ T953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 316.881543][T11017] device veth0_vlan left promiscuous mode [ 316.887512][T11017] device veth0_vlan entered promiscuous mode [ 316.920687][ T953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 316.929808][ T953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 316.943044][ T953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 317.009638][T11021] device veth0_vlan left promiscuous mode [ 317.035858][T11021] device veth0_vlan entered promiscuous mode [ 317.072987][T11023] device veth0_vlan left promiscuous mode [ 317.094457][T11023] device veth0_vlan entered promiscuous mode [ 317.678589][T11041] device veth0_vlan left promiscuous mode [ 317.685098][T11041] device veth0_vlan entered promiscuous mode [ 318.207011][T11075] device veth0_vlan left promiscuous mode [ 318.245370][T11075] device veth0_vlan entered promiscuous mode [ 318.281177][ T30] audit: type=1400 audit(1749610244.178:164): avc: denied { create } for pid=11066 comm="syz.2.3802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 318.324069][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 318.342456][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 318.371353][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 318.559345][T11089] device veth0_vlan left promiscuous mode [ 318.600002][T11089] device veth0_vlan entered promiscuous mode [ 319.013439][T11103] device wg2 entered promiscuous mode [ 319.043147][T11102] bond_slave_1: mtu less than device minimum [ 319.997776][T11140] device veth0_vlan left promiscuous mode [ 320.008790][T11140] device veth0_vlan entered promiscuous mode [ 320.536673][T11149] device syzkaller0 entered promiscuous mode [ 320.545056][T11159] ref_ctr_offset mismatch. inode: 0x2a7 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 320.653642][T11162] GPL: port 1(erspan0) entered blocking state [ 320.660263][T11162] GPL: port 1(erspan0) entered disabled state [ 320.667073][T11162] device erspan0 entered promiscuous mode [ 325.204132][T11187] device veth0_vlan left promiscuous mode [ 325.210419][T11187] device veth0_vlan entered promiscuous mode [ 325.334885][T11205] FAULT_INJECTION: forcing a failure. [ 325.334885][T11205] name failslab, interval 1, probability 0, space 0, times 0 [ 325.348384][T11205] CPU: 0 PID: 11205 Comm: syz.0.3845 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 325.359895][T11205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 325.369965][T11205] Call Trace: [ 325.373245][T11205] [ 325.376158][T11205] __dump_stack+0x21/0x30 [ 325.380464][T11205] dump_stack_lvl+0xee/0x150 [ 325.385042][T11205] ? show_regs_print_info+0x20/0x20 [ 325.390227][T11205] dump_stack+0x15/0x20 [ 325.394356][T11205] should_fail+0x3c1/0x510 [ 325.398744][T11205] __should_failslab+0xa4/0xe0 [ 325.403495][T11205] should_failslab+0x9/0x20 [ 325.408013][T11205] slab_pre_alloc_hook+0x3b/0xe0 [ 325.412967][T11205] ? sk_prot_alloc+0x5f/0x320 [ 325.417661][T11205] kmem_cache_alloc+0x44/0x260 [ 325.422445][T11205] sk_prot_alloc+0x5f/0x320 [ 325.426961][T11205] sk_alloc+0x38/0x430 [ 325.431043][T11205] inet6_create+0x5c4/0x1020 [ 325.435650][T11205] __sock_create+0x38d/0x7a0 [ 325.440377][T11205] __sys_socketpair+0x1a1/0x590 [ 325.445248][T11205] __x64_sys_socketpair+0x9b/0xb0 [ 325.450288][T11205] x64_sys_call+0x36/0x9a0 [ 325.454710][T11205] do_syscall_64+0x4c/0xa0 [ 325.459127][T11205] ? clear_bhb_loop+0x50/0xa0 [ 325.463802][T11205] ? clear_bhb_loop+0x50/0xa0 [ 325.468471][T11205] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 325.474359][T11205] RIP: 0033:0x7fa8cbaa9929 [ 325.478767][T11205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 325.498371][T11205] RSP: 002b:00007fa8ca112038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 325.506791][T11205] RAX: ffffffffffffffda RBX: 00007fa8cbcd0fa0 RCX: 00007fa8cbaa9929 [ 325.514760][T11205] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 325.522726][T11205] RBP: 00007fa8ca112090 R08: 0000000000000000 R09: 0000000000000000 [ 325.530692][T11205] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 325.538657][T11205] R13: 0000000000000000 R14: 00007fa8cbcd0fa0 R15: 00007ffee239bac8 [ 325.546632][T11205] [ 325.589956][T11209] device veth0_vlan left promiscuous mode [ 325.596677][T11209] device veth0_vlan entered promiscuous mode [ 325.604295][T11211] device wg2 left promiscuous mode [ 325.751569][T11227] device sit0 entered promiscuous mode [ 325.921346][T11234] device pim6reg1 entered promiscuous mode [ 326.400988][T11245] FAULT_INJECTION: forcing a failure. [ 326.400988][T11245] name failslab, interval 1, probability 0, space 0, times 0 [ 326.471825][T11245] CPU: 1 PID: 11245 Comm: syz.3.3859 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 326.483501][T11245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 326.493568][T11245] Call Trace: [ 326.496853][T11245] [ 326.499796][T11245] __dump_stack+0x21/0x30 [ 326.504134][T11245] dump_stack_lvl+0xee/0x150 [ 326.508745][T11245] ? show_regs_print_info+0x20/0x20 [ 326.513965][T11245] dump_stack+0x15/0x20 [ 326.518133][T11245] should_fail+0x3c1/0x510 [ 326.522589][T11245] __should_failslab+0xa4/0xe0 [ 326.527367][T11245] should_failslab+0x9/0x20 [ 326.531884][T11245] slab_pre_alloc_hook+0x3b/0xe0 [ 326.536831][T11245] kmem_cache_alloc_trace+0x48/0x270 [ 326.542133][T11245] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 326.547867][T11245] selinux_sk_alloc_security+0x7e/0x1a0 [ 326.553427][T11245] security_sk_alloc+0x72/0xa0 [ 326.558211][T11245] sk_prot_alloc+0x108/0x320 [ 326.562812][T11245] sk_alloc+0x38/0x430 [ 326.566888][T11245] inet6_create+0x5c4/0x1020 [ 326.571490][T11245] __sock_create+0x38d/0x7a0 [ 326.576093][T11245] __sys_socketpair+0x1a1/0x590 [ 326.580952][T11245] __x64_sys_socketpair+0x9b/0xb0 [ 326.585981][T11245] x64_sys_call+0x36/0x9a0 [ 326.590407][T11245] do_syscall_64+0x4c/0xa0 [ 326.594830][T11245] ? clear_bhb_loop+0x50/0xa0 [ 326.599512][T11245] ? clear_bhb_loop+0x50/0xa0 [ 326.604195][T11245] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 326.610097][T11245] RIP: 0033:0x7f9ffdd43929 [ 326.614519][T11245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 326.634129][T11245] RSP: 002b:00007f9ffc3ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 326.642560][T11245] RAX: ffffffffffffffda RBX: 00007f9ffdf6afa0 RCX: 00007f9ffdd43929 [ 326.650528][T11245] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 326.658491][T11245] RBP: 00007f9ffc3ac090 R08: 0000000000000000 R09: 0000000000000000 [ 326.666459][T11245] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 326.674423][T11245] R13: 0000000000000000 R14: 00007f9ffdf6afa0 R15: 00007ffe58ea6448 [ 326.682393][T11245] [ 326.995964][T11262] device wg2 entered promiscuous mode [ 328.083186][T11285] FAULT_INJECTION: forcing a failure. [ 328.083186][T11285] name failslab, interval 1, probability 0, space 0, times 0 [ 328.095874][T11285] CPU: 0 PID: 11285 Comm: syz.0.3871 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 328.107257][T11285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 328.117324][T11285] Call Trace: [ 328.120593][T11285] [ 328.123520][T11285] __dump_stack+0x21/0x30 [ 328.127845][T11285] dump_stack_lvl+0xee/0x150 [ 328.132429][T11285] ? show_regs_print_info+0x20/0x20 [ 328.137618][T11285] ? avc_has_perm+0x158/0x240 [ 328.142300][T11285] dump_stack+0x15/0x20 [ 328.146450][T11285] should_fail+0x3c1/0x510 [ 328.150863][T11285] __should_failslab+0xa4/0xe0 [ 328.155627][T11285] should_failslab+0x9/0x20 [ 328.160167][T11285] slab_pre_alloc_hook+0x3b/0xe0 [ 328.165105][T11285] ? sock_alloc_inode+0x1b/0xb0 [ 328.169951][T11285] kmem_cache_alloc+0x44/0x260 [ 328.174709][T11285] ? sockfs_init_fs_context+0xb0/0xb0 [ 328.180074][T11285] sock_alloc_inode+0x1b/0xb0 [ 328.184748][T11285] ? sockfs_init_fs_context+0xb0/0xb0 [ 328.190111][T11285] new_inode_pseudo+0x62/0x210 [ 328.194870][T11285] __sock_create+0x12c/0x7a0 [ 328.199456][T11285] __sys_socketpair+0x218/0x590 [ 328.204322][T11285] __x64_sys_socketpair+0x9b/0xb0 [ 328.209338][T11285] x64_sys_call+0x36/0x9a0 [ 328.213747][T11285] do_syscall_64+0x4c/0xa0 [ 328.218165][T11285] ? clear_bhb_loop+0x50/0xa0 [ 328.222834][T11285] ? clear_bhb_loop+0x50/0xa0 [ 328.227506][T11285] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 328.233394][T11285] RIP: 0033:0x7fa8cbaa9929 [ 328.237806][T11285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 328.257404][T11285] RSP: 002b:00007fa8ca112038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 328.265823][T11285] RAX: ffffffffffffffda RBX: 00007fa8cbcd0fa0 RCX: 00007fa8cbaa9929 [ 328.273793][T11285] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 328.281757][T11285] RBP: 00007fa8ca112090 R08: 0000000000000000 R09: 0000000000000000 [ 328.289718][T11285] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 328.297681][T11285] R13: 0000000000000000 R14: 00007fa8cbcd0fa0 R15: 00007ffee239bac8 [ 328.305648][T11285] [ 328.322318][T11285] socket: no more sockets [ 328.389223][T11283] device pim6reg1 entered promiscuous mode [ 328.574300][T11295] ref_ctr_offset mismatch. inode: 0x3b9 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 328.913341][T11306] device veth0_vlan left promiscuous mode [ 328.945219][T11306] device veth0_vlan entered promiscuous mode [ 330.003867][ T30] audit: type=1400 audit(1749610255.908:165): avc: denied { create } for pid=11344 comm="syz.1.3892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 330.429669][T11367] device veth0_vlan left promiscuous mode [ 330.438650][T11367] device veth0_vlan entered promiscuous mode [ 330.504754][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 330.515908][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 330.523667][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 330.888018][T11384] device veth0_vlan left promiscuous mode [ 330.897570][T11384] device veth0_vlan entered promiscuous mode [ 331.011765][T11392] device veth0_vlan left promiscuous mode [ 331.027406][T11392] device veth0_vlan entered promiscuous mode [ 331.184268][T11407] device veth0_vlan left promiscuous mode [ 331.208419][T11407] device veth0_vlan entered promiscuous mode [ 331.277020][T11405] device veth0_vlan left promiscuous mode [ 331.301404][T11405] device veth0_vlan entered promiscuous mode [ 332.091382][T11442] device veth0_vlan left promiscuous mode [ 332.100047][T11442] device veth0_vlan entered promiscuous mode [ 332.118201][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 332.129956][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 332.182880][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 332.267337][T11449] device veth0_vlan left promiscuous mode [ 332.280163][T11449] device veth0_vlan entered promiscuous mode [ 332.473870][T11457] device syzkaller0 entered promiscuous mode [ 335.825779][T11577] FAULT_INJECTION: forcing a failure. [ 335.825779][T11577] name failslab, interval 1, probability 0, space 0, times 0 [ 335.914902][T11577] CPU: 0 PID: 11577 Comm: syz.3.3970 Tainted: G W 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 335.926312][T11577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 335.936383][T11577] Call Trace: [ 335.939673][T11577] [ 335.942608][T11577] __dump_stack+0x21/0x30 [ 335.946945][T11577] dump_stack_lvl+0xee/0x150 [ 335.951539][T11577] ? show_regs_print_info+0x20/0x20 [ 335.956744][T11577] ? irqentry_exit+0x37/0x40 [ 335.961345][T11577] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 335.967158][T11577] dump_stack+0x15/0x20 [ 335.971319][T11577] should_fail+0x3c1/0x510 [ 335.975755][T11577] __should_failslab+0xa4/0xe0 [ 335.980532][T11577] should_failslab+0x9/0x20 [ 335.985047][T11577] slab_pre_alloc_hook+0x3b/0xe0 [ 335.990003][T11577] __kmalloc+0x6d/0x2c0 [ 335.994165][T11577] ? security_prepare_creds+0x4e/0x140 [ 335.999637][T11577] security_prepare_creds+0x4e/0x140 [ 336.004934][T11577] prepare_creds+0x456/0x640 [ 336.009535][T11577] copy_creds+0xe4/0x640 [ 336.013791][T11577] copy_process+0x799/0x3210 [ 336.018397][T11577] ? timerqueue_add+0x20e/0x230 [ 336.023258][T11577] ? __pidfd_prepare+0x150/0x150 [ 336.028223][T11577] ? enqueue_hrtimer+0xc9/0x240 [ 336.033087][T11577] kernel_clone+0x23f/0x940 [ 336.037603][T11577] ? create_io_thread+0x130/0x130 [ 336.042643][T11577] __x64_sys_clone+0x176/0x1d0 [ 336.047423][T11577] ? __ia32_sys_vfork+0xf0/0xf0 [ 336.052296][T11577] ? debug_smp_processor_id+0x17/0x20 [ 336.057677][T11577] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 336.063754][T11577] x64_sys_call+0x41f/0x9a0 [ 336.068269][T11577] do_syscall_64+0x4c/0xa0 [ 336.072693][T11577] ? clear_bhb_loop+0x50/0xa0 [ 336.077384][T11577] ? clear_bhb_loop+0x50/0xa0 [ 336.082072][T11577] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 336.087980][T11577] RIP: 0033:0x7f9ffdd43929 [ 336.092402][T11577] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 336.112021][T11577] RSP: 002b:00007f9ffc3abfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 336.120456][T11577] RAX: ffffffffffffffda RBX: 00007f9ffdf6afa0 RCX: 00007f9ffdd43929 [ 336.128528][T11577] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000042164000 [ 336.136510][T11577] RBP: 00007f9ffc3ac090 R08: 0000000000000000 R09: 0000000000000000 [ 336.144492][T11577] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 336.152469][T11577] R13: 0000000000000000 R14: 00007f9ffdf6afa0 R15: 00007ffe58ea6448 [ 336.160453][T11577] [ 337.335800][T11613] device sit0 entered promiscuous mode [ 342.677642][T11644] ref_ctr_offset mismatch. inode: 0x455 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 342.754689][T11642] device veth0_vlan left promiscuous mode [ 342.783160][T11642] device veth0_vlan entered promiscuous mode [ 342.826657][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 342.841204][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 342.851387][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 342.869551][T11644] GPL: port 1(erspan0) entered blocking state [ 342.876316][T11644] GPL: port 1(erspan0) entered disabled state [ 342.887380][T11644] device erspan0 entered promiscuous mode [ 342.898280][T11644] GPL: port 1(erspan0) entered blocking state [ 342.904599][T11644] GPL: port 1(erspan0) entered forwarding state [ 343.452942][T11664] device pim6reg1 entered promiscuous mode [ 343.647122][T11677] device wg2 left promiscuous mode [ 343.721849][T11677] device wg2 entered promiscuous mode [ 343.903653][T11683] device veth0_vlan left promiscuous mode [ 343.926480][T11683] device veth0_vlan entered promiscuous mode [ 344.153234][ T30] audit: type=1400 audit(1749610270.058:166): avc: denied { create } for pid=11699 comm="syz.4.4012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 344.181592][T11694] device veth0_vlan left promiscuous mode [ 344.193888][T11694] device veth0_vlan entered promiscuous mode [ 344.308353][T11700] device veth0_vlan left promiscuous mode [ 344.317394][T11700] device veth0_vlan entered promiscuous mode [ 344.913612][T11738] device veth1_macvtap left promiscuous mode [ 345.207148][T11761] GPL: port 1(erspan0) entered blocking state [ 345.214529][T11761] GPL: port 1(erspan0) entered disabled state [ 345.221333][T11761] device erspan0 entered promiscuous mode [ 345.468930][T11768] device veth0_vlan left promiscuous mode [ 345.480389][T11768] device veth0_vlan entered promiscuous mode [ 345.508134][T11770] device syzkaller0 entered promiscuous mode [ 345.532327][T11772] device lo entered promiscuous mode [ 345.751708][T11776] device veth0_vlan left promiscuous mode [ 345.767601][T11776] device veth0_vlan entered promiscuous mode [ 345.843348][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 345.853094][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 345.860715][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 346.162887][T11806] device sit0 left promiscuous mode [ 346.221368][T11806] device sit0 entered promiscuous mode [ 350.988872][T11842] device veth0_vlan left promiscuous mode [ 350.995306][T11842] device veth0_vlan entered promiscuous mode [ 351.150882][T11859] tap0: tun_chr_ioctl cmd 1074025677 [ 351.156188][T11859] tap0: linktype set to 769 [ 351.321249][T11878] device sit0 left promiscuous mode [ 351.363726][T11878] device sit0 entered promiscuous mode [ 351.440942][ T30] audit: type=1400 audit(1749610277.338:167): avc: denied { create } for pid=11885 comm="syz.2.4067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 351.508014][T11893] device sit0 left promiscuous mode [ 351.603262][T11888] device bridge_slave_1 left promiscuous mode [ 351.610683][T11888] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.643876][T11888] device bridge_slave_0 left promiscuous mode [ 351.650445][T11888] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.719712][T11893] device sit0 entered promiscuous mode [ 352.718633][T11916] device veth0_vlan left promiscuous mode [ 352.737200][T11916] device veth0_vlan entered promiscuous mode [ 353.468165][T11975] device syzkaller0 entered promiscuous mode [ 353.539466][T11995] device bridge_slave_1 left promiscuous mode [ 353.547152][T11995] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.583455][T11995] device bridge_slave_0 left promiscuous mode [ 353.590534][T11995] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.839913][T12012] device sit0 left promiscuous mode [ 353.861142][T12013] device vlan1 entered promiscuous mode [ 353.985922][ T30] audit: type=1400 audit(1749610279.888:168): avc: denied { create } for pid=12023 comm="syz.0.4109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 354.194727][T12026] device syzkaller0 entered promiscuous mode [ 354.457911][T12036] syz.0.4113[12036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.458009][T12036] syz.0.4113[12036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.172378][T12083] device wg2 left promiscuous mode [ 358.069671][T12154] device syzkaller0 entered promiscuous mode [ 358.311521][T12172] @ÿ: renamed from bond_slave_0 [ 359.088483][T12195] device syzkaller0 entered promiscuous mode [ 361.984126][T12288] device wg2 left promiscuous mode [ 362.056450][T12288] device wg2 entered promiscuous mode [ 362.842771][T12318] syz.0.4199 (12318) used obsolete PPPIOCDETACH ioctl [ 362.938843][T12322] tap0: tun_chr_ioctl cmd 2147767517 [ 364.279185][T12356] device veth0_vlan left promiscuous mode [ 364.315905][T12356] device veth0_vlan entered promiscuous mode [ 364.796082][T12369] bond_slave_1: mtu less than device minimum [ 364.906565][T12386] device wg2 entered promiscuous mode [ 365.826109][T12428] device wg2 entered promiscuous mode [ 365.882626][T12430] bond_slave_1: mtu less than device minimum [ 365.901867][T12435] device veth0_vlan left promiscuous mode [ 365.950776][T12435] device veth0_vlan entered promiscuous mode [ 366.040945][ T953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 366.062706][ T953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 366.091175][ T953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 366.864200][T12482] -1: renamed from syzkaller0 [ 373.708547][T12627] device veth0_vlan left promiscuous mode [ 373.714771][T12627] device veth0_vlan entered promiscuous mode [ 374.025330][T12630] syzkaller: port 1(erspan0) entered blocking state [ 374.051906][T12630] syzkaller: port 1(erspan0) entered disabled state [ 374.058939][T12630] device erspan0 entered promiscuous mode [ 374.228604][T12659] device pim6reg1 entered promiscuous mode [ 374.558806][T12679] device syzkaller0 entered promiscuous mode [ 376.494452][T12754] device veth0_vlan left promiscuous mode [ 376.582899][T12754] device veth0_vlan entered promiscuous mode [ 378.387693][T12825] bond_slave_1: mtu less than device minimum [ 379.757871][T12870] device syzkaller0 entered promiscuous mode [ 380.965859][T12917] device veth0_vlan left promiscuous mode [ 381.001924][T12917] device veth0_vlan entered promiscuous mode [ 381.990610][T12956] bond_slave_1: mtu less than device minimum [ 382.401258][T12966] device syzkaller0 entered promiscuous mode [ 382.860417][T12995] device syzkaller0 entered promiscuous mode [ 382.889969][T12997] device wg2 left promiscuous mode [ 382.904478][T12997] device wg2 entered promiscuous mode [ 383.116993][T13011] device veth0_vlan left promiscuous mode [ 383.128473][T13011] device veth0_vlan entered promiscuous mode [ 383.161824][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 383.171468][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 383.200187][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 383.368886][T13041] device veth0_vlan left promiscuous mode [ 383.381541][T13041] device veth0_vlan entered promiscuous mode [ 383.412205][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 383.429702][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 383.447613][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 383.659511][T13086] device wg2 left promiscuous mode [ 384.584659][T13105] device veth0_vlan left promiscuous mode [ 384.619515][T13105] device veth0_vlan entered promiscuous mode [ 384.964630][T13123] GPL: port 1(erspan0) entered blocking state [ 384.976820][T13123] GPL: port 1(erspan0) entered disabled state [ 384.995704][T13123] device erspan0 entered promiscuous mode [ 385.240559][T13132] device veth0_vlan left promiscuous mode [ 385.264617][T13132] device veth0_vlan entered promiscuous mode [ 387.146688][T13186] device syzkaller0 entered promiscuous mode [ 388.196221][T13242] device syzkaller0 entered promiscuous mode [ 388.709231][T13259] device syzkaller0 entered promiscuous mode [ 389.085661][T13284] device veth0_vlan left promiscuous mode [ 389.097065][T13284] device veth0_vlan entered promiscuous mode [ 389.213201][T13290] device sit0 left promiscuous mode [ 389.246520][T13293] device pim6reg1 entered promiscuous mode [ 390.244489][T13371] device sit0 entered promiscuous mode [ 390.836998][T13429] cgroup: fork rejected by pids controller in /syz3 [ 390.990363][T13440] tap0: tun_chr_ioctl cmd 1074025673 [ 392.138860][T13451] device veth0_vlan left promiscuous mode [ 392.150808][T13451] device veth0_vlan entered promiscuous mode [ 392.252744][ T30] audit: type=1400 audit(1749610318.158:169): avc: denied { mounton } for pid=13456 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 392.397008][T13456] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.405387][T13456] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.414908][T13456] device bridge_slave_0 entered promiscuous mode [ 392.445175][T13456] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.452328][T13456] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.459923][T13456] device bridge_slave_1 entered promiscuous mode [ 392.620452][T13456] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.627580][T13456] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.634884][T13456] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.641923][T13456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.851793][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 392.862146][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.871184][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.899165][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 392.914325][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 392.958712][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.965823][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.001778][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 393.010455][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 393.029825][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.037001][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 393.062040][ T315] device erspan0 left promiscuous mode [ 393.069742][ T315] GPL: port 1(erspan0) entered disabled state [ 393.087247][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 393.107029][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 393.145467][T13456] device veth0_vlan entered promiscuous mode [ 393.158322][T13456] device veth1_macvtap entered promiscuous mode [ 393.228295][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 393.236649][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 393.274461][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 393.283666][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 393.292314][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 393.300362][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 393.309057][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 393.317746][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 393.326532][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 393.334614][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 393.343353][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 393.352124][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 393.360459][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 393.409327][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 393.421184][ T30] audit: type=1400 audit(1749610319.328:170): avc: denied { unmount } for pid=13456 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 393.454715][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 393.769738][ T315] device veth1_macvtap left promiscuous mode [ 393.790930][ T315] device veth0_vlan left promiscuous mode [ 394.110724][T13524] device veth0_vlan left promiscuous mode [ 394.131040][T13524] device veth0_vlan entered promiscuous mode [ 394.182003][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 394.192509][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 394.200711][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 394.322694][T13532] device sit0 left promiscuous mode [ 401.014023][T13601] »»»»»»: renamed from vlan1 [ 401.959161][T13615] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.966430][T13615] bridge0: port 1(bridge_slave_0) entered disabled state [ 402.401678][T13626] ªªªªªª: renamed from vlan0 [ 403.873593][T13657] device pim6reg1 entered promiscuous mode [ 404.168131][T13674] device sit0 entered promiscuous mode [ 404.409397][T13683] ÿ: renamed from bond_slave_0 [ 404.865484][T13707] bond_slave_1: mtu less than device minimum [ 405.063916][T13711] device syzkaller0 entered promiscuous mode [ 405.609664][T13731] device sit0 left promiscuous mode [ 405.900044][T13736] device sit0 entered promiscuous mode [ 406.200787][T13744] device veth0_vlan left promiscuous mode [ 406.208985][T13744] device veth0_vlan entered promiscuous mode [ 407.177217][T13784] device sit0 entered promiscuous mode [ 407.354154][T13799] device sit0 left promiscuous mode [ 407.429019][T13799] device sit0 entered promiscuous mode [ 407.726094][T13812] syz.0.4669[13812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.726214][T13812] syz.0.4669[13812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 408.586597][T13807] device bridge_slave_1 left promiscuous mode [ 408.653787][T13807] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.681213][T13807] device bridge_slave_0 left promiscuous mode [ 408.687559][T13807] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.124797][T13856] device syzkaller0 entered promiscuous mode [ 412.139069][T13942] device pim6reg1 entered promiscuous mode [ 413.149867][T13996] device veth0_vlan left promiscuous mode [ 413.203032][T13996] device veth0_vlan entered promiscuous mode [ 413.209902][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 413.228425][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 413.281197][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 415.789866][T14107] syz.1.4762[14107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.789940][T14107] syz.1.4762[14107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.233852][T14128] device syzkaller0 entered promiscuous mode [ 416.595614][T14171] device veth0_vlan left promiscuous mode [ 416.602527][T14171] device veth0_vlan entered promiscuous mode [ 416.612232][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 416.620574][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 416.628513][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): »»»»»»: link becomes ready [ 417.216262][T14198] device veth1_macvtap left promiscuous mode [ 419.010034][T14256] device sit0 entered promiscuous mode [ 420.864919][T14293] bond_slave_1: mtu less than device minimum [ 421.243313][T14298] device pim6reg1 entered promiscuous mode [ 422.211166][T14306] device veth0_vlan left promiscuous mode [ 422.389743][T14306] device veth0_vlan entered promiscuous mode [ 423.402043][T14331] device sit0 left promiscuous mode [ 423.873240][T14333] device sit0 entered promiscuous mode [ 427.205208][T14377] device veth0_vlan left promiscuous mode [ 427.253375][T14377] device veth0_vlan entered promiscuous mode [ 427.546400][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 427.565965][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 427.621488][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 428.963133][T14415] device veth0_vlan left promiscuous mode [ 428.970377][T14415] device veth0_vlan entered promiscuous mode [ 429.006250][T14419] device pim6reg1 entered promiscuous mode [ 429.753994][T14463] device syzkaller0 entered promiscuous mode [ 430.057095][ T30] audit: type=1400 audit(1749610355.958:171): avc: denied { create } for pid=14468 comm="syz.0.4871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 430.468739][T14494] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 430.525201][T14494] device syzkaller0 entered promiscuous mode [ 432.870640][ T101] udevd[101]: worker [13567] terminated by signal 33 (Unknown signal 33) [ 432.886315][ T101] udevd[101]: worker [13567] failed while handling '/devices/virtual/block/loop2' [ 435.320127][T14697] device pim6reg1 entered promiscuous mode [ 436.479994][T14755] »»»»»»: renamed from vlan1 [ 437.941469][T14787] ªªªªªª: renamed from vlan0 [ 438.668315][T14806] device veth0_vlan left promiscuous mode [ 438.691416][T14806] device veth0_vlan entered promiscuous mode [ 438.721779][T14809] device veth0_vlan left promiscuous mode [ 438.732476][T14809] device veth0_vlan entered promiscuous mode [ 438.844951][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 438.852991][T14813] syz.3.4986[14813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.853068][T14813] syz.3.4986[14813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.869783][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 438.914753][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): »»»»»»: link becomes ready [ 439.037829][T14814] syz.3.4986[14814] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.507570][T14829] tun0: tun_chr_ioctl cmd 2147767511 [ 440.241404][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 440.261261][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 440.309332][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 441.616218][T14881] device veth0_vlan left promiscuous mode [ 441.646434][T14881] device veth0_vlan entered promiscuous mode [ 441.986188][T14893] device sit0 left promiscuous mode [ 442.539101][T14896] device sit0 entered promiscuous mode [ 442.781468][T14921] device macsec0 entered promiscuous mode [ 443.430341][T14940] device veth0_vlan left promiscuous mode [ 443.460638][T14940] device veth0_vlan entered promiscuous mode [ 443.883844][T14966] bond_slave_1: mtu less than device minimum [ 445.009453][T14984] device veth0_vlan left promiscuous mode [ 445.192000][T14984] device veth0_vlan entered promiscuous mode [ 445.658804][T14998] device sit0 left promiscuous mode [ 446.086383][T15032] device veth0_vlan left promiscuous mode [ 446.096250][T15032] device veth0_vlan entered promiscuous mode [ 446.109571][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 446.118518][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 446.126056][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 447.860506][T15087] device veth0_vlan left promiscuous mode [ 447.869784][T15087] device veth0_vlan entered promiscuous mode [ 447.886922][T15087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 447.906576][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 447.916742][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 447.950643][ T451] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 448.227700][T15102] device syzkaller0 entered promiscuous mode [ 448.313653][T15104] device syzkaller0 entered promiscuous mode [ 448.542514][T15119] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.549716][T15119] bridge0: port 1(bridge_slave_0) entered disabled state [ 448.603579][T15121] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.610814][T15121] bridge0: port 1(bridge_slave_0) entered disabled state [ 448.619358][T15121] device bridge0 left promiscuous mode [ 448.857835][T15125] device sit0 entered promiscuous mode [ 448.928628][T15127] device bridge_slave_1 left promiscuous mode [ 448.934915][T15127] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.951955][T15127] device bridge_slave_0 left promiscuous mode [ 448.958179][T15127] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.408766][T15123] device bridge_slave_1 left promiscuous mode [ 449.451204][T15123] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.500972][T15123] device bridge_slave_0 left promiscuous mode [ 449.531160][T15123] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.832511][T15147] device sit0 left promiscuous mode [ 450.396704][T15154] device sit0 entered promiscuous mode [ 450.726328][T15157] device sit0 entered promiscuous mode [ 451.856154][T15201] device veth0_vlan left promiscuous mode [ 451.867017][T15201] device veth0_vlan entered promiscuous mode [ 452.128116][T15206] device syzkaller0 entered promiscuous mode [ 452.296828][T15213] device sit0 left promiscuous mode [ 452.689489][T15233] device veth0_vlan left promiscuous mode [ 452.707931][T15233] device veth0_vlan entered promiscuous mode [ 452.954053][T15240] device veth0_vlan left promiscuous mode [ 452.984669][T15240] device veth0_vlan entered promiscuous mode [ 453.533111][T15270] device veth0_vlan left promiscuous mode [ 453.562668][T15270] device veth0_vlan entered promiscuous mode [ 453.620358][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 453.632893][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 453.648259][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): »»»»»»: link becomes ready [ 456.873978][T15403] device veth0_vlan left promiscuous mode [ 456.880454][T15403] device veth0_vlan entered promiscuous mode [ 457.542025][T15423] syz.2.5192[15423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 457.542129][T15423] syz.2.5192[15423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 457.569068][T15416] device veth0_vlan left promiscuous mode [ 457.589728][T15416] device veth0_vlan entered promiscuous mode [ 457.626614][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 457.637937][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 457.645869][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 458.106052][T15441] device pim6reg1 entered promiscuous mode [ 458.831604][T15486] device sit0 left promiscuous mode [ 458.942283][T15486] device sit0 entered promiscuous mode [ 459.817392][T15520] device veth0_vlan left promiscuous mode [ 459.874380][T15520] device veth0_vlan entered promiscuous mode [ 460.473836][T15560] device pim6reg1 entered promiscuous mode [ 460.612647][T15582] device sit0 left promiscuous mode [ 460.624599][T15582] device sit0 entered promiscuous mode [ 460.714921][T15594] device syzkaller0 entered promiscuous mode [ 460.722640][T15592] device lo entered promiscuous mode [ 460.977686][T15599] device sit0 entered promiscuous mode [ 461.085942][T15605] device veth0_vlan left promiscuous mode [ 461.106636][T15605] device veth0_vlan entered promiscuous mode [ 461.136733][T15605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 461.177710][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 461.190602][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 461.205796][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 462.683844][T15694] device veth0_vlan left promiscuous mode [ 462.695472][T15694] device veth0_vlan entered promiscuous mode [ 462.702120][T15694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 462.710148][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 462.731287][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 462.738562][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 464.553924][T15796] device veth0_vlan left promiscuous mode [ 464.565579][T15796] device veth0_vlan entered promiscuous mode [ 464.788658][T15810] device pim6reg1 entered promiscuous mode [ 465.213452][T15827] GPL: port 1(erspan0) entered blocking state [ 465.227180][T15827] GPL: port 1(erspan0) entered disabled state [ 465.248211][T15827] device erspan0 entered promiscuous mode [ 465.322159][T15831] GPL: port 1(erspan0) entered blocking state [ 465.328296][T15831] GPL: port 1(erspan0) entered forwarding state [ 465.937456][T15857] device syzkaller0 entered promiscuous mode [ 466.921077][T15887] device syzkaller0 entered promiscuous mode [ 466.995672][T15881] device veth0_vlan left promiscuous mode [ 467.017191][T15881] device veth0_vlan entered promiscuous mode [ 467.574575][T15908] device sit0 left promiscuous mode [ 467.619941][T15908] device sit0 entered promiscuous mode SYZFAIL: repeatedly failed to execute the program proc=6 req=5389 state=1 status=7 (errno 9: Bad file descriptor) [ 469.816915][ T30] audit: type=1400 audit(1749610395.718:172): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[367]" dev="pipefs" ino=367 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 470.652526][ T8] GPL: port 1(erspan0) entered disabled state [ 470.659421][ T8] GPL: port 1(erspan0) entered disabled state [ 470.666450][ T8] device erspan0 left promiscuous mode [ 470.671940][ T8] GPL: port 1(erspan0) entered disabled state [ 470.679097][ T8] device erspan0 left promiscuous mode [ 470.684599][ T8] syzkaller: port 1(erspan0) entered disabled state [ 470.692164][ T8] device erspan0 left promiscuous mode [ 470.697644][ T8] GPL: port 1(erspan0) entered disabled state [ 470.705010][ T8] device erspan0 left promiscuous mode [ 470.710457][ T8] GPL: port 1(erspan0) entered disabled state [ 471.133926][ T8] device bridge_slave_1 left promiscuous mode [ 471.140030][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.147461][ T8] device bridge_slave_0 left promiscuous mode [ 471.153620][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 471.162485][ T8] device veth0_vlan left promiscuous mode [ 471.168393][ T8] device veth1_macvtap left promiscuous mode [ 471.174681][ T8] device veth0_vlan left promiscuous mode [ 473.771888][ T8] device erspan0 left promiscuous mode [ 473.777358][ T8] GPL: port 1(erspan0) entered disabled state [ 474.091556][ T8] device veth0_vlan left promiscuous mode