last executing test programs: 2.099065588s ago: executing program 3 (id=4140): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffe00}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001cc0)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a394830f2539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526894aa7fe5e68949a3b304723177d356c4604bca492ecec37e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e230000063afefdb636e56bbaae4e6213657ae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a560f8948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31a09c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d34264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af176a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348c3cafa7176b32416148c85ea787927d3cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730c58d5eac907f09b9695046313f8873522608c6f0100000000000000f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e09d24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc2217db890d89385fcaa00f0f2e524672e6f4c8bedfd5da5b157709b8265cf511dc5846ab1d85916c4a6b2d1b408575982e11230cbac0a9c6eaa03c945645581f678403c2a936c53ae72940aa92bcf22b82c6bc028e0acdddf9fef595f0f7a9f80c0e4c659ced769ec463d26a81e468846761a8e1efd6a031ab7adc8665e267be0065cc315aa23012423ec8b8492d9b50fa4d8c5891959b761eec6dc988532782fda13239c63737039350db59e25c796b79cc04f3d1a5a13000000001e301d827661d0aa6290b458c7109efef12159a741d931de4e8b8c4193e10e97b4cc51789de85eb5b1e5557bddabb82982da282c7b02003df640748eefeede162ef3f5a4708a0b12c4ba62c35c4cbe6a806fe1b0d1282de3df865bc215ede42c5e17ecb21c64cc60e584287159d92569033ca66799fa888b9cd80f7fc33828afab5e0b303a23a4195814b44a7f4d0ecd1e0ffb02cfd3a99dbe0a13032b23326f9d06489a0ba1880bc26660fd5be86b1804c890ae611d20ff15b737dcae99de5bf2f3e8eda549217c4809d7369ae9673cf74a9ee983d94a24ed6297b9ccfd410890024a4e3ddd52aa009b61eff6325dcc2a27d8a893407c2406468d904d4b4946db522c8af32da0e8e0cfaff0b272fb1991b206752c43150408ff821ba464df24ce0fefb866c55806fa45f85124e4db4928a72d26f35a174424e8d764e2d4086843ece85eec1c9fbfe9bede5fbc581b2e67278b9a4f88ba1f7554b156e514020bc81199d5040a477c325bc691d1f01c34ca5c1f083e4700"/2458], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000140)=ANY=[]) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='freezer.state\x00', 0x26e1, 0x0) ioctl$TUNGETSNDBUF(r6, 0x800454d3, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x35, 0x0, 0x3, 0xfffffffd}, {0x48, 0x4, 0x0, 0x3}, {0x44, 0x94}, {}, {0x6}]}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r10, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) close(r9) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r11 = openat$cgroup_ro(r6, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0xc0185879, &(0x7f0000000040)) sendmsg$inet(r2, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) 1.673965133s ago: executing program 0 (id=4146): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x8, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x401c5820, &(0x7f0000000000)=0x8000) close(r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_freezer_state(r8, &(0x7f0000000140), 0x2, 0x0) r10 = openat$cgroup_procs(r8, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r10, &(0x7f0000000380), 0x42) write$cgroup_freezer_state(r9, &(0x7f0000000400)='FROZEN\x00', 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0xb, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000050000000000000000000080852000000400000018200000", @ANYRES32, @ANYBLOB="000000007f0000001866ffff0a000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000030000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000182a0000", @ANYRES32, @ANYBLOB="000000000000000018130000", @ANYRES32, @ANYBLOB="0000000000000000044e0100080000009500000000000000"], &(0x7f0000000400)='syzkaller\x00', 0x7f, 0x11, &(0x7f0000000440)=""/17, 0x41100, 0x20, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000600)=[{}, {0x4, 0x2, 0xe, 0x2}]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r5, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8b, &(0x7f00000005c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x44, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r12}, 0x10) r13 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000880)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x5, '\x00', 0x0, r4, 0x3, 0x5, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x12, &(0x7f0000000b00)=ANY=[@ANYBLOB="184300000700000000000000000000000f5bbd000800000085100000000000000781270c0500000085100000f8ffffff180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000010080000850000000600000018200000", @ANYRES32=r7, @ANYBLOB="000000d8e36e006d00000002b7000000000000252ac122edf0ffa3973aff02"], &(0x7f0000000040)='GPL\x00', 0x5, 0x63, &(0x7f00000004c0)=""/99, 0x40f00, 0x5, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, r11, r12, 0x9, &(0x7f0000000700)=[r13, r4, r4, r4, r0, r0, r1, r0], &(0x7f0000000900)=[{0x4, 0x2, 0xe, 0x6}, {0x2, 0x2, 0xa, 0xc}, {0x2, 0x2, 0x1, 0x4}, {0x0, 0x2, 0xb, 0x6}, {0x3, 0x5, 0x5, 0x3}, {0x4, 0x2, 0x1, 0x7}, {0x0, 0x1, 0x0, 0x1}, {0x4, 0x5, 0x2, 0x1}, {0x3, 0x1, 0x5, 0xc}], 0x10, 0xd14a}, 0x90) write$cgroup_freezer_state(r9, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x402e4080, 0x0, 0xfffffd88, 0x0, 0x0, 0x0) 1.114876578s ago: executing program 4 (id=4152): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r1, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800)=0x600, &(0x7f0000000840)}, 0x20) recvmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) 1.060862693s ago: executing program 4 (id=4153): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x2000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x0, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='track_foreign_dirty\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000880)={0x9}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000940)={0x0, 0x1, 0x10}, 0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x8, 0x8}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r3, 0x0, 0x0}, 0x10) 1.060169023s ago: executing program 3 (id=4155): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x2, 0xc, &(0x7f00000013c0)=ANY=[@ANYBLOB="180200001000000000000000000000001801000020696c2500000000002020207b2af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000087000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff2e, &(0x7f0000000040)=""/210, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xffd4}, 0x70) 985.597849ms ago: executing program 3 (id=4158): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x0, 0x5, 0x1000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f0000000380)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x8, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b00)={{r3}, &(0x7f0000000a80), &(0x7f0000000ac0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1e, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000023"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r7, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2005000, 0x0, 0x0, 0x0, 0x0, 0x0) 925.179924ms ago: executing program 4 (id=4160): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x5d) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r3) 794.341904ms ago: executing program 0 (id=4162): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x116d, 0x1}, 0x48) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20000010) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) close(r0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xf1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x5c, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2, 0x7, 0x18000, 0x1000, r3, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0xfffffffe, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0xe4, &(0x7f00000004c0)=""/228, 0x0, 0x32, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000700)={0x0, 0xc}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000780)=[{0x3, 0x0, 0x0, 0xa}, {0x4, 0x4, 0x0, 0x5}, {}, {0x0, 0x0, 0x2, 0x1}, {0x4, 0x0, 0x0, 0x8}], 0x10, 0xd5a}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e8500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) close(r2) 684.211813ms ago: executing program 3 (id=4168): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000001100000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18080000000000000000000000002200851000000600000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000007900000000000000180000000000000000000000000000009500000000000000d50a0000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) 630.152038ms ago: executing program 3 (id=4170): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) 629.642638ms ago: executing program 2 (id=4172): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x6, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r2}, 0x38) perf_event_open(&(0x7f0000002180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18050000000000000000000000095f362ebd0917bb10b60a5dd8c8ea48b5000095000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1a, 0x9, 0x6418, 0x0, 0x0, r4, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x4}, 0x48) r5 = bpf$PROG_LOAD(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000007126000000000000bf670000000000004501020000ff07ad6706000002000000070200000ee60000bf250000000000002d35000000000000650700000200000007070000000000001f75000000000000bf54000000000000160400000400f9ffbd3001000000000084000000000000004500000001f0ffff95000000000000006e8ad524a56600a5585b7351ca1136aef2e9407e5c2501d11900db85604036883647b1fb3f1403b816f511c8c56e56e40b01005505f8a89dae4293b10f3631b25fc9f189084c7fddccff01361d355f6cce8ec2abcdf1bc9040daef2cfa2046e2091e269f4734ffa55eb2d4e8de20b38c8808b365b46bd54c68cd30139a8c3827a7dd6d6e2b5fea3906f8456b0000000000ff07efffffff0047018ae79db613d2aec070f718ab629b4975320dd7a7da532281fd22c7b835005bf52715396669836db6000000005b4f0591ee7c8cd263dd172b28d01c4d8ddaf2cdad3d1a74a2f078aa6402483856a6e495408d0b33047f06aec2cc590df28efc7dbec6857db922195a271af103f03e1155197e067b2ebf4e2dae06e394c9639564f000fc3cdd05a157544d0200000000000000ee48f5287123a0d246c0c4c00fe979dbc09ed4db22d7172adc6ae8faa5f9ad188e07000000000000008d88a0b4684559d46cae41db1b914e93f1f88e80ef80c6ed3e1ff91ff111000000000000000000e33de432e488ad0e724c2d14a1e770e116984a5700afb8a1f3d47277ef0e33e7e00ec5f74e10937ba0e321346977b7d1b18013f509675b5b0f352e30dffda780e95c301f4fc7d5a76475ace6b128b02bfd71023daffdf748a6bd356fcbacec96373d1101000736ac0bbcb5f4836bddfe8bf86308000000ade9e59fcf271bb98bd0b8b5216b858b414c31682f9f3db2e4d8e5898e445fe55ac56c0ddd932d838ff651023853d42210642986f8bbc7340bc8393f774318c9fc9b05788de2c6e601b50777e8dff581de1d5ae3d801ead7eba31126e2172fa1eadf5f3bec81004d00000000c8e4692e051c731f9ac766b7fd66278d40f0760f23e8c7d1f47cd8e02504e85e152955ad8acd989c0b2eea71414f533f5685c3904bfe1d0011ffc1ba5398f3d68124674478186edd036f15bf847c33f79e1a0ad3d2b5080ecb01420c9f1b534e969fce97ffff07000009000000bfe0ed7c5853a665c0805752dca0e571d75cac5a5d8e4f6e05055b6dec5a9a5696f053a92d81fd9e5f2b9dbbe24f38e745b5a95d45003d0600e413dc623f3e6b096c8b0ad7438c6631388892c55b0671140afbfb83bba415f729fea4c8a8a86189dceedad84cdd17c46bdd847a1f4b0facd3744f5bbb06abb319204fca4bcd4297fe7b4cee75abf43e14fe861224799c0f12702964fc890a176fdafa2c9387280b5693c000c0304cece48642649375dae0b7979b229f708a97349e96e783af9a23cd3980a2c29d3d62875e5319cd51bdd224878a0b25edf0e83c930633bd9a823e28f359608ea326c77a1aa17318f392a0ec6c188916f4149c503027feccfd68ec8278a90252693fb133c4615801077e1d75420017c03990b855fe481a20b4919bb11c6d737b6545ef140a0fc339bb52e7c4e17eb8e68f076c659f56d6c7f97a94d604f45cfe88b30c170000000001000000ef931f137967de563c29d81aacb3d48226a4e4b6670900000000000000fa68bff3693afc44db223f04000000c38f6b6d86a0e56d47a82bad5d2a6dce4c4d353261260c9d7a6bd9f2c872c4172a3d2ac80dfb718cc159e6423065624f1300007d6072f0cf120ad2ba519afdd43a14000000000000000000000000007ef2f3c58d045f0700000094069acbe333aebd2d051cec362a2e7c1482bd9cd4ac10f2118fbfeda3fa5500d52cd5241588d2b68a332edfef6d701c8936a25d68b841f982511392cc0d3a78616f8ce0f2877d099258bf85866d0ee7f803fa50fd41ef62b028d12028a7b497d92f544523290f520b0d000000000000000000007758b1267669ded883b5867c5916a74843b784955108f750c57744c76a09629dd0aaca5cb0f14f49db80a1aa2692c18fbb31cbdb3f2e138e6d5ba3491fc3617b511f24bad26466407e39000000000000d7a1bf4624d31c13a6840f45a7f4e01a50d790132abb36915e35b1ac35bf3921357f638684bba17b8fe1e2123153ecd6d1f76820d4f8fa0b96b50c457ae8d5f2351cdb7bc8170380557bc11cf6ee3395974e37018a2a7473312cb32affb8ff72a253e0d36099e460f13694b9891af526d9608271838e83d17103887f34210dd4c0cf60dec608b4ca5ba2f3037bf381e7b5d5b27820000000000000000000000b719bd34f3244730f708fdd532640edc6b82dd4ad72ecbaccafef806f5447aba2246d56a601bb0000000000000000000000000000000092ce9e1bc8243908566d516006da9a213550dfce70627f5647e7"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff76}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1, 0xc, &(0x7f0000001dc0)=ANY=[@ANYRES8=r6], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) 582.005022ms ago: executing program 4 (id=4174): bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x796, 0x8}, 0xc) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000001180)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYRESDEC=r2], 0x27) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0x8}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x0, 0x40004}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1bc81a00}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x3, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x4}, {}, {0x4, 0x0, 0x9}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0x2, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)=r3}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{}, &(0x7f0000000100), &(0x7f0000000140)=r3}, 0x20) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@fwd={0xf}, @volatile={0x0, 0x0, 0x0, 0x9, 0x4}, @ptr={0xb, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x5f]}}, &(0x7f0000000480)=""/215, 0x3f, 0xd7, 0x1, 0xd127}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x676, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a00)={{r0}, 0x0, 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000001640)=[0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1f000000}, @alu={0x4, 0x1, 0xb, 0x6, 0x6, 0x10, 0xfffffffffffffffc}, @map_fd={0x18, 0x0, 0x1, 0x0, r7}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238, 0x40f00}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x1c, 0xc, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}}]}, &(0x7f0000000800)='GPL\x00', 0x6, 0x3a, &(0x7f0000000840)=""/58, 0x41100, 0x0, '\x00', r6, 0x31, r8, 0x8, &(0x7f0000000940)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x10, 0xfffffffe, 0x40}, 0x10, 0x0, r8, 0x7, 0x0, &(0x7f00000009c0)=[{0x1, 0x1, 0xa, 0x8}, {0x3, 0x4, 0x9, 0xc}, {0x3, 0x4, 0x8, 0x6}, {0x5, 0x4, 0xe, 0x9}, {0x5, 0x5, 0x3, 0x9}, {}, {0x5, 0x3}], 0x10, 0x6}, 0x90) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7020000ffff0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000900)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r11, &(0x7f0000000180)=ANY=[], 0xffbf) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x8}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xe, 0x2b, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x86b}, {}, {}, [@generic={0x1, 0x4, 0x8, 0x0, 0x8006}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}, @map_fd={0x18, 0x2, 0x1, 0x0, r4}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @tail_call, @map_fd={0x18, 0x3, 0x1, 0x0, r0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='syzkaller\x00', 0x5, 0x10, &(0x7f0000000200)=""/16, 0x41000, 0x1, '\x00', r6, 0x0, r5, 0x8, &(0x7f00000005c0)={0x8, 0x1}, 0x8}, 0x90) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r13, &(0x7f0000000980), 0x12) 577.557322ms ago: executing program 3 (id=4176): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x8, 0x0, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00', r2}, 0x10) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000400)={0x1b, 0x0, 0x0, 0x10000}, 0x48) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={r3, 0x0, 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[], 0xfffffdef) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r7, &(0x7f0000000000), 0xfffffd26) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0xb}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 521.633827ms ago: executing program 2 (id=4177): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x2, 0xc, &(0x7f00000013c0)=ANY=[@ANYBLOB="180200001000000000000000000000001801000020696c2500000000002020207b2af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000087000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff2e, &(0x7f0000000040)=""/210, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x5f5e0ff}, 0x70) 432.153474ms ago: executing program 2 (id=4178): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x0, 0x0, 0x0, 0x0, 0x8e, &(0x7f0000000200)=""/142}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x80) socketpair(0x1, 0x6, 0x0, &(0x7f0000000000)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x118) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) (async) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xffdd) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000030000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000c8500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x1800}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x2000) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000640)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000005c0)) 313.261644ms ago: executing program 1 (id=4179): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) (async) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0x2000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000010d5013fb3f70cf7b1b3dd", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_ext_remove_space_done\x00', r4}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async) socketpair$unix(0x2, 0x0, 0x0, 0x0) (async) close(r1) (async) perf_event_open(&(0x7f0000002180)={0x2, 0xffffffffffffffbb, 0x4f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x84102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x40}, 0x0, 0x800000000000, 0x0, 0x5, 0x0, 0x0, 0x3a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r5, 0x0, 0x0}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, r6}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r7, &(0x7f0000000300), 0x20000000}, 0x20) close(r5) (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYRES16], 0xfdef) 313.059264ms ago: executing program 0 (id=4180): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) 290.215366ms ago: executing program 1 (id=4181): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000001100000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18080000000000000000000000002200851000000600000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000007900000000000000180000000000000000000000000000009500000000000000d50a0000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) 236.21227ms ago: executing program 0 (id=4182): perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x9c}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001140)={{}, 0x0, &(0x7f0000000840)='%-010d \x00'}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f3ff0000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='rss_stat\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/net\x00') ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x5460, 0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0xf, 0x2f, &(0x7f00000007c0)="9f44948721919580684010a49e66", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1331daa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39", &(0x7f0000000000), 0x0, 0x4}, 0x23) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000900), 0x8) 234.59346ms ago: executing program 1 (id=4183): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair(0x0, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x20001, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xf00}, 0x48) 224.032191ms ago: executing program 2 (id=4184): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00'}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r1, @ANYBLOB], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03076844268cb89e14f008004be0ffff00124000632f77fbac141416ac14141607089f034d2f87e544026aab845013f2325f1a39010702038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x10}) socketpair(0x1d, 0x1, 0x6, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f0, &(0x7f0000000080)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x0, 0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_mballoc_alloc\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x5, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000085000000037e63dc156ca54741000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 201.825893ms ago: executing program 1 (id=4185): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) close(r2) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'\x00', 0x41}) 146.325667ms ago: executing program 0 (id=4186): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x80000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001f4a46d4850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffff, 0x8000, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0xe32b}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) getpid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001500)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='rss_stat\x00', r3}, 0x10) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) write$cgroup_int(r5, &(0x7f00000001c0), 0xfffffdef) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0xb6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x14}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e}, 0x80) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r6}, &(0x7f0000000180), &(0x7f0000000840)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x20, 0x0, 0x0, &(0x7f0000000080)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0x16, 0x0, 0xb161, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r7, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r8, 0x0, &(0x7f0000001780)=""/4096}, 0x20) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0xffffffffffffffff, r2, 0x0, 0x2, &(0x7f00000001c0)='\\\x00', 0x0}, 0x30) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8}, 0x48) r12 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={@map, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000680)={@map=r11, 0xffffffffffffffff, 0x34, 0x0, 0x0, @prog_fd=r12, r13}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000640)={@cgroup=r9, r1, 0x1e, 0x28, 0x0, @prog_id=r10, r13}, 0x20) 143.595097ms ago: executing program 0 (id=4187): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11c, 0x11c, 0xa, [@const={0x1}, @var={0x4, 0x0, 0x0, 0xe, 0x3, 0x1}, @fwd={0xc}, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0x3}, {0x10, 0x2}, {0xf, 0x3}, {0x3, 0x3}, {0x5}, {0xb, 0x4}, {0x7, 0x1}]}, @struct={0xd, 0xa, 0x0, 0x4, 0x1, 0x6, [{0xb, 0x3, 0x7fff}, {0xe, 0x0, 0x7}, {0x1, 0x4, 0x8}, {0x1, 0x4, 0x5}, {0xf, 0x5, 0x7}, {0x5, 0x1, 0x7}, {0x0, 0x5, 0x2}, {0x7, 0x1, 0x9}, {0xf, 0x0, 0x1}, {0x0, 0x2, 0x68ea}]}, @struct={0x3, 0x2, 0x0, 0x4, 0x0, 0x2, [{0x8, 0x3, 0x87b}, {0xd, 0x0, 0xffffc1ae}]}]}, {0x0, [0x0, 0x5f, 0x0, 0x5f, 0x5f, 0x2e, 0x30, 0x2d]}}, &(0x7f0000000040)=""/37, 0x13e, 0x25, 0x2, 0x1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x60, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000088fe508a8500000004000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r3}, 0x10) (async, rerun: 64) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r4}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) (async, rerun: 64) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) (rerun: 64) 112.76582ms ago: executing program 2 (id=4188): bpf$MAP_CREATE(0x0, &(0x7f00000075c0)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x17}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x44, &(0x7f0000000000), 0x4) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1, 0x0, 0x0, 0x0}, 0x90) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000070000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) 72.178784ms ago: executing program 1 (id=4189): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 18.439108ms ago: executing program 4 (id=4190): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r0, 0x58, &(0x7f0000000040)}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f00000002c0)="f6ea090003000060009ba538a44cc2", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 16.503808ms ago: executing program 2 (id=4191): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000bc0)="3d0c308aea321dcdd875a89d863599", 0x20000000}, 0xfffffffffffffff1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x6, 0x4, 0x4, 0x1ff}, 0x18) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00', r5}, 0x10) socketpair(0x0, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_int(r6, 0x0, 0x2, 0x0) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x6, 0xc, &(0x7f0000000680)=@raw=[@jmp={0x5, 0x1, 0xd, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @btf_id, @alu={0x7, 0x0, 0x4, 0x0, 0xb, 0x8}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}], &(0x7f0000000700)='GPL\x00', 0x7, 0xc4, &(0x7f0000000740)=""/196, 0x41100, 0x8, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000840)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000880)={0x1, 0xe, 0x8, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r3]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0x9, &(0x7f00000004c0)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xb65}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x91, &(0x7f0000000580)=""/145, 0x41100, 0x66, '\x00', 0x0, 0x31, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x8, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, r8, 0x6, &(0x7f0000000a40)=[r0], &(0x7f0000000a80)=[{0x3, 0x5, 0x3, 0x9}, {0x0, 0x5, 0xa, 0x2}, {0x2, 0x4, 0x1, 0x1}, {0x3, 0x2, 0xc}, {0x0, 0x5, 0x8, 0xd}, {0x0, 0x2, 0x10}]}, 0x90) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[@ANYBLOB='1\n', @ANYRESHEX], 0x31) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='mlxsw_sp_acl_tcam_vregion_migrate_end\x00', r1}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r11, &(0x7f00000005c0)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) 11.070928ms ago: executing program 1 (id=4193): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) 0s ago: executing program 4 (id=4194): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000001100000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18080000000000000000000000002200851000000600000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000007900000000000000180000000000000000000000000000009500000000000000d50a0000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.228' (ED25519) to the list of known hosts. [ 19.904984][ T24] audit: type=1400 audit(1720107743.240:66): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.906115][ T273] cgroup: Unknown subsys name 'net' [ 19.927483][ T24] audit: type=1400 audit(1720107743.240:67): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.954390][ T24] audit: type=1400 audit(1720107743.270:68): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.954542][ T273] cgroup: Unknown subsys name 'devices' [ 20.099095][ T273] cgroup: Unknown subsys name 'hugetlb' [ 20.104495][ T273] cgroup: Unknown subsys name 'rlimit' [ 20.266111][ T24] audit: type=1400 audit(1720107743.600:69): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.289137][ T24] audit: type=1400 audit(1720107743.600:70): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 20.313629][ T24] audit: type=1400 audit(1720107743.600:71): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.336985][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.345594][ T24] audit: type=1400 audit(1720107743.680:72): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.370851][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.370901][ T24] audit: type=1400 audit(1720107743.680:73): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.404651][ T24] audit: type=1400 audit(1720107743.690:74): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.429934][ T24] audit: type=1400 audit(1720107743.690:75): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.832666][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.839655][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.846738][ T282] device bridge_slave_0 entered promiscuous mode [ 20.855418][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.862336][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.869444][ T282] device bridge_slave_1 entered promiscuous mode [ 20.885289][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.892194][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.899322][ T281] device bridge_slave_0 entered promiscuous mode [ 20.905861][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.912838][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.919939][ T281] device bridge_slave_1 entered promiscuous mode [ 20.969071][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.975913][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.983278][ T283] device bridge_slave_0 entered promiscuous mode [ 20.992188][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.999069][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.006206][ T283] device bridge_slave_1 entered promiscuous mode [ 21.027904][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.034741][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.041988][ T284] device bridge_slave_0 entered promiscuous mode [ 21.050360][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.057185][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.064379][ T284] device bridge_slave_1 entered promiscuous mode [ 21.091504][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.098370][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.105536][ T285] device bridge_slave_0 entered promiscuous mode [ 21.114119][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.121081][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.128099][ T285] device bridge_slave_1 entered promiscuous mode [ 21.202045][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.208924][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.216016][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.222817][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.258332][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.265374][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.272495][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.279273][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.294765][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.301844][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.308884][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.315799][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.323610][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.330765][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.376152][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.385095][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.391939][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.399518][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.407387][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.414176][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.421303][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.428948][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.436576][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.443699][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.450857][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.458781][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.465596][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.472860][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.480873][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.487713][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.494814][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.502493][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.528513][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.536779][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.544222][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.552211][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.559034][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.566137][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.574152][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.581002][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.588200][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.595870][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.611422][ T284] device veth0_vlan entered promiscuous mode [ 21.617957][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.625443][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.633631][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.641321][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.648730][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.655907][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.663781][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.671107][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.688875][ T281] device veth0_vlan entered promiscuous mode [ 21.695632][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.704503][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.712227][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.719407][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.726556][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.733891][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.741792][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.748545][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.755638][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.763549][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.770379][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.777490][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.785224][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.797856][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.805920][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.814186][ T282] device veth0_vlan entered promiscuous mode [ 21.827943][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.835972][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.844063][ T53] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.850895][ T53] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.858491][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.866373][ T53] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.873140][ T53] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.880410][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.890491][ T283] device veth0_vlan entered promiscuous mode [ 21.897684][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.905319][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.919938][ T282] device veth1_macvtap entered promiscuous mode [ 21.926975][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.934723][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.942209][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.950015][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.957680][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.966022][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.973794][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.981776][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.989603][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.999685][ T281] device veth1_macvtap entered promiscuous mode [ 22.009277][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.017512][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.025826][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.033454][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.041386][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.052376][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.060766][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.069017][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.076905][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.085599][ T283] device veth1_macvtap entered promiscuous mode [ 22.100142][ T284] device veth1_macvtap entered promiscuous mode [ 22.110358][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.118183][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.126383][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.135080][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.143412][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.151562][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.159610][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.167405][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.174864][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.182935][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.191010][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.198944][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.217547][ T285] device veth0_vlan entered promiscuous mode [ 22.223958][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.232519][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.241317][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.249262][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.256871][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.265071][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.273256][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.280614][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.293220][ T282] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 22.317104][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.325393][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.333865][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.342733][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.357839][ T285] device veth1_macvtap entered promiscuous mode [ 22.374873][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.383487][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.391841][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.430837][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.452088][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.498127][ T324] cgroup: syz.0.1 (324) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 22.514512][ T324] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 22.571005][ C0] hrtimer: interrupt took 27130 ns [ 22.735566][ T360] syz.1.15[360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 22.735616][ T360] syz.1.15[360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 22.808301][ T367] syz.4.17[367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 22.843071][ T367] syz.4.17[367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 22.922230][ T367] syz.4.17[367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 22.948385][ T367] syz.4.17[367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 23.010585][ T377] geneve1: tun_chr_ioctl cmd 2147767521 [ 23.347751][ T393] device pim6reg1 entered promiscuous mode [ 23.779717][ T413] device syzkaller0 entered promiscuous mode [ 24.500639][ T482] device syzkaller0 entered promiscuous mode [ 26.538936][ T594] syz.2.99[594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.538989][ T594] syz.2.99[594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.568469][ T597] syz.3.102[597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.594613][ T594] syz.2.99[594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.060715][ T24] kauditd_printk_skb: 40 callbacks suppressed [ 27.060726][ T24] audit: type=1400 audit(1720107750.400:116): avc: denied { relabelfrom } for pid=628 comm="syz.2.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 27.096870][ T24] audit: type=1400 audit(1720107750.400:117): avc: denied { relabelto } for pid=628 comm="syz.2.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 27.264108][ T643] device pim6reg1 entered promiscuous mode [ 27.595643][ T663] device veth0_macvtap entered promiscuous mode [ 28.289548][ T695] tap0: tun_chr_ioctl cmd 1074025677 [ 28.294673][ T695] tap0: linktype set to 805 [ 29.320086][ T737] tap0: tun_chr_ioctl cmd 1074025677 [ 29.325226][ T737] tap0: linktype set to 805 [ 29.386687][ T24] audit: type=1400 audit(1720107752.720:118): avc: denied { create } for pid=758 comm="syz.4.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 29.486618][ T777] device veth0_vlan left promiscuous mode [ 29.559780][ T777] device veth0_vlan entered promiscuous mode [ 29.900060][ T799] tap0: tun_chr_ioctl cmd 1074025677 [ 29.906216][ T799] tap0: linktype set to 805 [ 30.472887][ T837] tap0: tun_chr_ioctl cmd 1074025677 [ 30.489337][ T837] tap0: linktype set to 805 [ 30.513844][ T846] device pim6reg1 entered promiscuous mode [ 30.704032][ T873] device syzkaller0 entered promiscuous mode [ 30.783490][ T875] device veth0_vlan left promiscuous mode [ 30.824146][ T875] device veth0_vlan entered promiscuous mode [ 32.729967][ T24] audit: type=1400 audit(1720107756.070:119): avc: denied { create } for pid=1047 comm="syz.1.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 33.040425][ T24] audit: type=1400 audit(1720107756.370:120): avc: denied { create } for pid=1073 comm="syz.1.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 33.316588][ T1098] tap0: tun_chr_ioctl cmd 1074025677 [ 33.337691][ T1098] tap0: linktype set to 805 [ 33.431635][ T1105] device syzkaller0 entered promiscuous mode [ 33.649794][ T1142] tap0: tun_chr_ioctl cmd 1074025677 [ 33.654911][ T1142] tap0: linktype set to 805 [ 34.114851][ T1194] tap0: tun_chr_ioctl cmd 1074025677 [ 34.135197][ T1194] tap0: linktype set to 805 [ 34.636208][ T1240] tap0: tun_chr_ioctl cmd 1074025677 [ 34.645953][ T1240] tap0: linktype set to 805 [ 35.308174][ T1290] tap0: tun_chr_ioctl cmd 1074025677 [ 35.313295][ T1290] tap0: linktype set to 805 [ 35.910934][ T1332] tap0: tun_chr_ioctl cmd 1074025677 [ 35.937161][ T1332] tap0: linktype set to 805 [ 36.463256][ T1360] device wlan0 entered promiscuous mode [ 36.490776][ T1365] tap0: tun_chr_ioctl cmd 1074025677 [ 36.495900][ T1365] tap0: linktype set to 805 [ 36.882694][ T1391] bpf_get_probe_write_proto: 2 callbacks suppressed [ 36.882703][ T1391] syz.3.405[1391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.890645][ T1391] syz.3.405[1391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.903828][ T1391] syz.3.405[1391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.929198][ T1391] syz.3.405[1391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.994152][ T1391] device syzkaller0 entered promiscuous mode [ 37.169979][ T1407] tap0: tun_chr_ioctl cmd 1074025677 [ 37.207740][ T1407] tap0: linktype set to 805 [ 37.774554][ T1485] tap0: tun_chr_ioctl cmd 1074025677 [ 37.787718][ T1485] tap0: linktype set to 805 [ 39.042899][ T1549] device pim6reg1 entered promiscuous mode [ 39.409220][ T1559] syz.3.470[1559] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.409269][ T1559] syz.3.470[1559] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.448340][ T1562] device pim6reg1 entered promiscuous mode [ 41.190389][ T24] audit: type=1400 audit(1720107764.530:121): avc: denied { ioctl } for pid=1652 comm="syz.0.505" path="socket:[18318]" dev="sockfs" ino=18318 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 42.367048][ T1700] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 42.378935][ T1700] device syzkaller0 entered promiscuous mode [ 42.637486][ T1730] ------------[ cut here ]------------ [ 42.647780][ T1730] trace type BPF program uses run-time allocation [ 42.654077][ T1730] WARNING: CPU: 0 PID: 1730 at kernel/bpf/verifier.c:10480 check_map_prog_compatibility+0x65b/0x7c0 [ 42.718341][ T1730] Modules linked in: [ 42.722074][ T1730] CPU: 0 PID: 1730 Comm: syz.0.534 Not tainted 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 42.797752][ T1730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 42.817699][ T1730] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 42.825349][ T1730] Code: c8 e9 84 fe ff ff e8 44 f5 ee ff 31 db e9 85 fe ff ff e8 38 f5 ee ff c6 05 8e ef 64 05 01 48 c7 c7 e0 71 45 85 e8 55 7f c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 42.867521][ T1730] RSP: 0018:ffffc90000f26f90 EFLAGS: 00010246 [ 42.880010][ T1730] RAX: f6a18ec8be0d2b00 RBX: ffff8881228db800 RCX: ffff88810cc4e2c0 [ 42.897568][ T1730] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 42.915185][ T1730] RBP: ffffc90000f26fd0 R08: ffffffff81521de8 R09: ffffed103ee04e8b [ 42.930591][ T1730] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 42.948175][ T1730] R13: 1ffff92000017a04 R14: ffff888106d80000 R15: ffffc900000bd020 [ 42.965900][ T1730] FS: 00007fc7f7bee6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 42.984444][ T1730] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 42.999531][ T1730] CR2: 0000000000000000 CR3: 000000010c3ee000 CR4: 00000000003506a0 [ 43.014932][ T1730] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 43.032496][ T1730] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 43.050114][ T1730] Call Trace: [ 43.056534][ T1730] ? show_regs+0x58/0x60 [ 43.066081][ T1730] ? __warn+0x160/0x2f0 [ 43.074412][ T1730] ? check_map_prog_compatibility+0x65b/0x7c0 [ 43.087919][ T1730] ? report_bug+0x3d9/0x5b0 [ 43.096589][ T1730] ? check_map_prog_compatibility+0x65b/0x7c0 [ 43.110201][ T1730] ? handle_bug+0x41/0x70 [ 43.118745][ T1730] ? exc_invalid_op+0x1b/0x50 [ 43.128702][ T1730] ? asm_exc_invalid_op+0x12/0x20 [ 43.138990][ T1730] ? wake_up_klogd+0xb8/0xf0 [ 43.149988][ T1730] ? check_map_prog_compatibility+0x65b/0x7c0 [ 43.161332][ T1730] ? __fdget+0x1bc/0x240 [ 43.170823][ T1730] resolve_pseudo_ldimm64+0x586/0x1020 [ 43.182661][ T1730] ? bpf_check+0xf2b0/0xf2b0 [ 43.192481][ T1730] ? kvmalloc_node+0x82/0x130 [ 43.197033][ T1730] bpf_check+0xaf21/0xf2b0 [ 43.228252][ T1730] ? stack_depot_save+0xe/0x10 [ 43.242565][ T1730] ? __se_sys_bpf+0x9856/0x11cb0 [ 43.252764][ T1730] ? sched_clock+0x3a/0x40 [ 43.264510][ T1730] ? 0xffffffffa002a7bc [ 43.271849][ T1730] ? bpf_get_btf_vmlinux+0x60/0x60 [ 43.282198][ T1730] ? __kernel_text_address+0x9b/0x110 [ 43.313407][ T1730] ? unwind_get_return_address+0x4d/0x90 [ 43.327839][ T1730] ? arch_stack_walk+0xf3/0x140 [ 43.340256][ T1730] ? stack_trace_save+0x113/0x1c0 [ 43.349443][ T1730] ? stack_trace_snprint+0xf0/0xf0 [ 43.385154][ T1730] ? stack_trace_snprint+0xf0/0xf0 [ 43.406857][ T1730] ? selinux_bpf_prog_alloc+0x51/0x140 [ 43.430035][ T1730] ? selinux_bpf_prog_alloc+0x51/0x140 [ 43.450500][ T1730] ? ____kasan_kmalloc+0xed/0x110 [ 43.464001][ T1730] ? ____kasan_kmalloc+0xdb/0x110 [ 43.477519][ T1730] ? __kasan_kmalloc+0x9/0x10 [ 43.490846][ T1730] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 43.526739][ T1730] ? selinux_bpf_prog_alloc+0x51/0x140 [ 43.580431][ T1730] ? security_bpf_prog_alloc+0x62/0x90 [ 43.598110][ T1730] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 43.611000][ T1730] ? __x64_sys_bpf+0x7b/0x90 [ 43.615647][ T1730] ? do_syscall_64+0x34/0x70 [ 43.620427][ T1730] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.626511][ T1730] ? __kasan_kmalloc+0x9/0x10 [ 43.642455][ T1730] __se_sys_bpf+0x107a2/0x11cb0 [ 43.647135][ T1730] ? __kasan_check_write+0x14/0x20 [ 43.667129][ T1730] ? __x64_sys_bpf+0x90/0x90 [ 43.671844][ T1730] ? futex_wake+0x630/0x790 [ 43.676177][ T1730] ? do_futex+0x13c5/0x17b0 [ 43.680743][ T1730] ? __kasan_check_write+0x14/0x20 [ 43.685960][ T1730] ? put_vma+0x8f/0xb0 [ 43.693507][ T1730] ? __handle_speculative_fault+0x102e/0x1ec0 [ 43.707003][ T1730] ? futex_exit_release+0x1e0/0x1e0 [ 43.714252][ T1730] ? finish_fault+0xaf0/0xaf0 [ 43.726949][ T1730] ? set_current_blocked+0x40/0x40 [ 43.732746][ T1730] ? __se_sys_futex+0x355/0x470 [ 43.797892][ T1730] ? fpu__clear_all+0x20/0x20 [ 43.802423][ T1730] ? __kasan_check_read+0x11/0x20 [ 43.807266][ T1730] __x64_sys_bpf+0x7b/0x90 [ 43.837766][ T1730] do_syscall_64+0x34/0x70 [ 43.842016][ T1730] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.854385][ T1730] RIP: 0033:0x7fc7f898dbd9 [ 43.859067][ T1730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.888315][ T1730] RSP: 002b:00007fc7f7bee048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 43.898956][ T1730] RAX: ffffffffffffffda RBX: 00007fc7f8b1c038 RCX: 00007fc7f898dbd9 [ 43.908903][ T1730] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 43.931972][ T1730] RBP: 00007fc7f89fcaa1 R08: 0000000000000000 R09: 0000000000000000 [ 43.950407][ T1730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 43.967457][ T1730] R13: 000000000000000b R14: 00007fc7f8b1c038 R15: 00007ffe2bbf9b58 [ 43.996671][ T1730] ---[ end trace 804620b5bae2b9db ]--- [ 44.617383][ T24] audit: type=1400 audit(1720107767.950:122): avc: denied { attach_queue } for pid=1835 comm="syz.1.569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 44.942193][ T1866] device syzkaller0 entered promiscuous mode [ 45.253686][ T24] audit: type=1400 audit(1720107768.590:123): avc: denied { create } for pid=1874 comm="syz.3.584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 45.586857][ T1920] device wg2 entered promiscuous mode [ 45.843770][ T24] audit: type=1400 audit(1720107769.180:124): avc: denied { create } for pid=1933 comm="syz.2.603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 45.888651][ T24] audit: type=1400 audit(1720107769.230:125): avc: denied { read } for pid=75 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 46.090828][ T24] audit: type=1400 audit(1720107769.430:126): avc: denied { create } for pid=1972 comm="syz.1.616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 46.179070][ T24] audit: type=1400 audit(1720107769.520:127): avc: denied { write } for pid=1980 comm="syz.1.619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 46.219418][ T24] audit: type=1400 audit(1720107769.540:128): avc: denied { read } for pid=1980 comm="syz.1.619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 46.558945][ T2023] device wg2 entered promiscuous mode [ 46.775444][ T24] audit: type=1400 audit(1720107770.110:129): avc: denied { setopt } for pid=2030 comm="syz.3.637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 46.797170][ T2031] syz.3.637[2031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.797216][ T2031] syz.3.637[2031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.320977][ T24] audit: type=1400 audit(1720107770.660:130): avc: denied { create } for pid=2047 comm="syz.0.644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 49.033335][ T24] audit: type=1400 audit(1720107772.370:131): avc: denied { cpu } for pid=2112 comm="syz.0.667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 49.469959][ T2140] device syzkaller0 entered promiscuous mode [ 50.250344][ T2159] device syzkaller0 entered promiscuous mode [ 51.780097][ T2192] tap0: tun_chr_ioctl cmd 1074025677 [ 51.787221][ T2192] tap0: linktype set to 805 [ 52.499554][ T2219] syz.2.705[2219] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.499603][ T2219] syz.2.705[2219] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.606682][ T2228] device syzkaller0 entered promiscuous mode [ 52.677325][ T2235] tap0: tun_chr_ioctl cmd 1074025677 [ 52.687751][ T2235] tap0: linktype set to 805 [ 52.692088][ T2230] tap0: tun_chr_ioctl cmd 1074025677 [ 52.705396][ T2230] tap0: linktype set to 805 [ 52.970809][ T2267] tap0: tun_chr_ioctl cmd 1074025677 [ 52.975928][ T2267] tap0: linktype set to 805 [ 53.372651][ T2307] tap0: tun_chr_ioctl cmd 1074025677 [ 53.380829][ T2307] tap0: linktype set to 805 [ 53.872867][ T2339] tap0: tun_chr_ioctl cmd 1074025677 [ 53.879323][ T2339] tap0: linktype set to 805 [ 53.963369][ T2342] device sit0 entered promiscuous mode [ 54.462889][ T24] audit: type=1400 audit(1720107777.800:132): avc: denied { create } for pid=2383 comm="syz.3.763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 55.347885][ T2408] tap0: tun_chr_ioctl cmd 1074025677 [ 55.353095][ T2408] tap0: linktype set to 805 [ 55.493073][ T2414] device syzkaller0 entered promiscuous mode [ 57.081366][ T24] audit: type=1400 audit(1720107780.420:133): avc: denied { create } for pid=2504 comm="syz.0.805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 58.291671][ T2602] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 60.229066][ T2795] syz.3.886[2795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.229098][ T2795] syz.3.886[2795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.381283][ T2809] cgroup: fork rejected by pids controller in /syz0 [ 60.639216][ T2939] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.649698][ T2939] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.656948][ T2939] device bridge_slave_0 entered promiscuous mode [ 60.666824][ T2939] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.673868][ T2939] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.684307][ T2939] device bridge_slave_1 entered promiscuous mode [ 60.742757][ T2939] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.749634][ T2939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.756714][ T2939] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.763523][ T2939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.786880][ T595] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.796379][ T595] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.836140][ T595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.843692][ T595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.862690][ T595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.881337][ T595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.890223][ T595] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.897064][ T595] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.905195][ T595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.915137][ T595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.923299][ T595] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.930155][ T595] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.937322][ T595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 60.945448][ T595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.953387][ T595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 60.961380][ T595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.042876][ T2975] device syzkaller0 entered promiscuous mode [ 61.086975][ T2988] tap0: tun_chr_ioctl cmd 1074025678 [ 61.092164][ T2988] tap0: group set to 0 [ 61.098276][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 61.106532][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 61.120914][ T2939] device veth0_vlan entered promiscuous mode [ 61.127009][ T1434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 61.135139][ T1434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 61.143303][ T1434] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 61.150962][ T1434] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 61.171447][ T2939] device veth1_macvtap entered promiscuous mode [ 61.180245][ T1434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 61.189857][ T1434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 61.198936][ T1434] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 61.216048][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 61.225147][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 61.233510][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 61.242492][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 61.263090][ T2993] device syzkaller0 entered promiscuous mode [ 61.285601][ T24] audit: type=1400 audit(1720107784.620:134): avc: denied { mounton } for pid=2939 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 61.481199][ T3051] syz.3.940[3051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.481249][ T3051] syz.3.940[3051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.540265][ T444] device bridge_slave_1 left promiscuous mode [ 61.567714][ T444] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.586594][ T444] device bridge_slave_0 left promiscuous mode [ 61.600673][ T444] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.619749][ T444] device veth1_macvtap left promiscuous mode [ 61.802189][ T3072] tap0: tun_chr_ioctl cmd 1074025677 [ 61.808714][ T3072] tap0: linktype set to 804 [ 61.915363][ T24] audit: type=1400 audit(1720107785.250:135): avc: denied { create } for pid=3079 comm="syz.0.947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 61.975918][ T24] audit: type=1400 audit(1720107785.310:136): avc: denied { create } for pid=3083 comm="syz.0.949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 62.221363][ T3106] tap0: tun_chr_ioctl cmd 1074025677 [ 62.226701][ T3106] tap0: linktype set to 805 [ 62.864576][ T3154] tap0: tun_chr_ioctl cmd 1074025677 [ 62.876586][ T3154] tap0: linktype set to 805 [ 63.044174][ T3165] device veth1_macvtap left promiscuous mode [ 63.053532][ T3164] device veth1_macvtap entered promiscuous mode [ 63.063066][ T3164] device macsec0 entered promiscuous mode [ 63.248617][ T3206] tap0: tun_chr_ioctl cmd 1074025677 [ 63.253740][ T3206] tap0: linktype set to 805 [ 63.364581][ T3215] device pim6reg1 entered promiscuous mode [ 63.402846][ T3236] device pim6reg1 entered promiscuous mode [ 63.468431][ T3251] device pim6reg1 entered promiscuous mode [ 63.652994][ T3273] device wg2 entered promiscuous mode [ 64.160907][ T3292] tap0: tun_chr_ioctl cmd 1074025677 [ 64.258305][ T3292] tap0: linktype set to 805 [ 64.807410][ T3338] tap0: tun_chr_ioctl cmd 1074025677 [ 64.849671][ T3338] tap0: linktype set to 805 [ 64.991707][ T3346] device wg2 left promiscuous mode [ 65.718379][ T3378] tap0: tun_chr_ioctl cmd 1074025677 [ 65.723490][ T3378] tap0: linktype set to 805 [ 66.040497][ T24] audit: type=1400 audit(1720107789.380:137): avc: denied { create } for pid=3437 comm="syz.0.1048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 66.161677][ T3452] tap0: tun_chr_ioctl cmd 1074025677 [ 66.170022][ T3452] tap0: linktype set to 805 [ 66.301409][ T24] audit: type=1400 audit(1720107789.640:138): avc: denied { create } for pid=3458 comm="syz.0.1054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 66.533061][ T3470] device syzkaller0 entered promiscuous mode [ 66.789584][ T3496] tap0: tun_chr_ioctl cmd 1074025677 [ 66.828470][ T3496] tap0: linktype set to 805 [ 67.775129][ T3565] tap0: tun_chr_ioctl cmd 1074025677 [ 67.780282][ T3565] tap0: linktype set to 805 [ 69.026789][ T3584] device pim6reg1 entered promiscuous mode [ 69.399222][ T3627] tap0: tun_chr_ioctl cmd 1074025677 [ 69.404335][ T3627] tap0: linktype set to 805 [ 69.417427][ T3629] device pim6reg1 entered promiscuous mode [ 69.827212][ T3679] device syzkaller0 entered promiscuous mode [ 69.912424][ T24] audit: type=1400 audit(1720107793.250:139): avc: denied { create } for pid=3681 comm="syz.2.1120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 69.986387][ T3690] tap0: tun_chr_ioctl cmd 1074025677 [ 70.002704][ T3690] tap0: linktype set to 805 [ 71.175355][ T3722] tap0: tun_chr_ioctl cmd 1074025677 [ 71.186197][ T3722] tap0: linktype set to 805 [ 71.190929][ T3732] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.197929][ T3732] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.357186][ T3739] device bridge_slave_1 left promiscuous mode [ 71.366351][ T3739] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.373918][ T3739] device bridge_slave_0 left promiscuous mode [ 71.380097][ T3739] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.714385][ T24] audit: type=1400 audit(1720107795.040:140): avc: denied { create } for pid=3788 comm="syz.2.1156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 72.162406][ T3810] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.169422][ T3810] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.177743][ T3822] device bridge_slave_1 left promiscuous mode [ 72.185217][ T3822] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.192631][ T3822] device bridge_slave_0 left promiscuous mode [ 72.199078][ T3822] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.244109][ T3830] tap0: tun_chr_ioctl cmd 1074025677 [ 72.250416][ T3830] tap0: linktype set to 805 [ 72.326692][ T24] audit: type=1400 audit(1720107795.660:141): avc: denied { create } for pid=3847 comm="syz.3.1173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 72.420553][ T3846] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.428538][ T3846] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.435837][ T3846] device bridge_slave_0 entered promiscuous mode [ 72.444556][ T3846] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.456268][ T3846] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.464172][ T3846] device bridge_slave_1 entered promiscuous mode [ 72.515281][ T24] audit: type=1400 audit(1720107795.850:142): avc: denied { create } for pid=3846 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 72.548720][ T3846] device veth0_vlan entered promiscuous mode [ 72.564041][ T3846] device veth1_macvtap entered promiscuous mode [ 72.589458][ T24] audit: type=1400 audit(1720107795.850:143): avc: denied { write } for pid=3846 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 72.613334][ T24] audit: type=1400 audit(1720107795.850:144): avc: denied { read } for pid=3846 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 72.642619][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 72.652070][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 72.726783][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.752120][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.766072][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.774713][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.783327][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.790842][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.798472][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 72.806594][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.814360][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.821904][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.830312][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.838698][ T3229] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.845642][ T3229] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.853235][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.861797][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.870112][ T3229] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.876961][ T3229] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.072864][ T3230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 73.080669][ T3887] tap0: tun_chr_ioctl cmd 1074025677 [ 73.085864][ T3887] tap0: linktype set to 805 [ 73.314745][ T3892] tap0: tun_chr_ioctl cmd 1074025677 [ 73.319881][ T3892] tap0: linktype set to 805 [ 73.595530][ T3910] device syzkaller0 entered promiscuous mode [ 74.176594][ T3945] device pim6reg1 entered promiscuous mode [ 75.690883][ T7] device bridge_slave_1 left promiscuous mode [ 75.696908][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.787841][ T7] device bridge_slave_0 left promiscuous mode [ 75.813608][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.867557][ T7] device veth1_macvtap left promiscuous mode [ 75.882677][ T7] device veth0_vlan left promiscuous mode [ 76.038477][ T24] audit: type=1400 audit(1720107799.380:145): avc: denied { tracepoint } for pid=4086 comm="syz.2.1246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 76.169804][ T4096] tap0: tun_chr_ioctl cmd 1074025677 [ 76.185165][ T4096] tap0: linktype set to 805 [ 77.375170][ T4184] tap0: tun_chr_ioctl cmd 1074025677 [ 77.404275][ T4184] tap0: linktype set to 805 [ 77.952037][ T4214] device pim6reg1 entered promiscuous mode [ 77.974845][ T4230] tap0: tun_chr_ioctl cmd 1074025677 [ 77.980165][ T4230] tap0: linktype set to 805 [ 78.045198][ T4232] device vxcan1 entered promiscuous mode [ 78.060539][ T24] audit: type=1400 audit(1720107801.400:146): avc: denied { append } for pid=4231 comm="syz.0.1294" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 78.114112][ T4216] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.121284][ T4216] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.128672][ T4216] device bridge_slave_0 entered promiscuous mode [ 78.135627][ T4216] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.142687][ T4216] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.150142][ T4216] device bridge_slave_1 entered promiscuous mode [ 78.640909][ T4284] syz.1.1313[4284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.640958][ T4284] syz.1.1313[4284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.012782][ T3883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.047504][ T3883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.057185][ T3878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 79.073501][ T3878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.081915][ T3878] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.088787][ T3878] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.148548][ T3881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.155964][ T3881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 79.371074][ T3881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.459035][ T3881] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.465881][ T3881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.613551][ T3881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.699196][ T3881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.792570][ T4216] device veth0_vlan entered promiscuous mode [ 79.846522][ T3883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.911392][ T3883] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.923587][ T3883] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.938343][ T3883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.957330][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 80.021949][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 80.093510][ T4216] device veth1_macvtap entered promiscuous mode [ 80.162232][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 80.173745][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 80.230311][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 80.324353][ T3881] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 80.342651][ T3881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 80.416530][ T4342] device syzkaller0 entered promiscuous mode [ 81.203471][ T4373] tap0: tun_chr_ioctl cmd 1074025677 [ 81.229012][ T4373] tap0: linktype set to 805 [ 81.235829][ T4376] tap0: tun_chr_ioctl cmd 1074025677 [ 81.288323][ T4376] tap0: linktype set to 805 [ 81.499352][ T7] device bridge_slave_1 left promiscuous mode [ 81.505357][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.512728][ T7] device bridge_slave_0 left promiscuous mode [ 81.518859][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.526253][ T7] device veth1_macvtap left promiscuous mode [ 81.599013][ T4377] tap0: tun_chr_ioctl cmd 1074025677 [ 81.604203][ T4377] tap0: linktype set to 805 [ 82.319284][ T4435] tap0: tun_chr_ioctl cmd 1074025677 [ 82.326262][ T4435] tap0: linktype set to 805 [ 82.721426][ T4458] device syzkaller0 entered promiscuous mode [ 82.737286][ T4468] tap0: tun_chr_ioctl cmd 1074025677 [ 82.747498][ T4468] tap0: linktype set to 805 [ 82.753994][ T4472] tap0: tun_chr_ioctl cmd 1074025677 [ 82.759686][ T4472] tap0: linktype set to 805 [ 82.798865][ T4473] tap0: tun_chr_ioctl cmd 1074025677 [ 82.803979][ T4473] tap0: linktype set to 805 [ 82.896945][ T4481] syz.3.1381[4481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.896997][ T4481] syz.3.1381[4481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.005634][ T4491] device sit0 entered promiscuous mode [ 83.213945][ T4515] tap0: tun_chr_ioctl cmd 1074025677 [ 83.235571][ T4515] tap0: linktype set to 805 [ 83.717949][ T4549] device syzkaller0 entered promiscuous mode [ 84.055404][ T4580] tap0: tun_chr_ioctl cmd 1074025677 [ 84.128209][ T4580] tap0: linktype set to 805 [ 84.961861][ T4604] device pim6reg1 entered promiscuous mode [ 85.329660][ T4618] tap0: tun_chr_ioctl cmd 1074025677 [ 85.341742][ T4618] tap0: linktype set to 805 [ 85.349523][ T4626] device sit0 left promiscuous mode [ 85.382521][ T4626] device sit0 entered promiscuous mode [ 85.654758][ T4632] tap0: tun_chr_ioctl cmd 1074025677 [ 85.655448][ T24] audit: type=1400 audit(1720107808.990:147): avc: denied { ioctl } for pid=4633 comm="syz.2.1429" path="socket:[27145]" dev="sockfs" ino=27145 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 85.684567][ T4632] tap0: linktype set to 805 [ 85.912877][ T4679] tap0: tun_chr_ioctl cmd 1074025677 [ 85.921820][ T4679] tap0: linktype set to 805 [ 86.500984][ T4703] device pim6reg1 entered promiscuous mode [ 86.847551][ T4742] tap0: tun_chr_ioctl cmd 1074025677 [ 86.852724][ T4742] tap0: linktype set to 805 [ 86.961276][ T4758] device veth0_vlan left promiscuous mode [ 86.968366][ T4758] device veth0_vlan entered promiscuous mode [ 86.993521][ T24] audit: type=1400 audit(1720107810.330:148): avc: denied { create } for pid=4757 comm="syz.1.1476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 87.224300][ T4776] device syzkaller0 entered promiscuous mode [ 87.435223][ T4816] tap0: tun_chr_ioctl cmd 1074025677 [ 87.466301][ T4816] tap0: linktype set to 805 [ 87.939075][ T24] audit: type=1400 audit(1720107811.270:149): avc: denied { create } for pid=4834 comm="syz.1.1498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 87.964002][ T4841] device syzkaller0 entered promiscuous mode [ 88.013036][ T4856] device syzkaller0 entered promiscuous mode [ 88.043578][ T4860] tap0: tun_chr_ioctl cmd 1074025677 [ 88.048899][ T4860] tap0: linktype set to 805 [ 88.960052][ T4950] device veth0_vlan left promiscuous mode [ 88.966862][ T4950] device veth0_vlan entered promiscuous mode [ 89.122111][ T3227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 89.142080][ T3227] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 89.168582][ T3227] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 89.940240][ T5006] device veth0_vlan left promiscuous mode [ 90.028748][ T5006] device veth0_vlan entered promiscuous mode [ 90.078956][ T3878] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.696472][ T5082] tap0: tun_chr_ioctl cmd 1074025677 [ 90.702029][ T5082] tap0: linktype set to 805 [ 90.889799][ T5116] device veth0_vlan left promiscuous mode [ 90.896776][ T5116] device veth0_vlan entered promiscuous mode [ 91.006481][ T5148] tap0: tun_chr_ioctl cmd 1074025677 [ 91.019301][ T5148] tap0: linktype set to 270 [ 91.078166][ T5163] tap0: tun_chr_ioctl cmd 1074025677 [ 91.083566][ T5163] tap0: linktype set to 805 [ 91.458008][ T5198] device syzkaller0 entered promiscuous mode [ 91.464650][ T5197] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 91.619147][ T5227] device syzkaller0 entered promiscuous mode [ 92.078540][ T5247] tap0: tun_chr_ioctl cmd 1074025677 [ 92.083670][ T5247] tap0: linktype set to 805 [ 92.923890][ T5286] tap0: tun_chr_ioctl cmd 1074025677 [ 92.935469][ T5286] tap0: linktype set to 805 [ 93.890537][ T5329] device syzkaller0 entered promiscuous mode [ 94.953845][ T5464] syz.1.1716[5464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.953873][ T5464] syz.1.1716[5464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.023473][ T5474] device syzkaller0 entered promiscuous mode [ 95.132661][ T5488] syzkaller0: refused to change device tx_queue_len [ 95.187535][ T5493] device syzkaller0 entered promiscuous mode [ 95.412808][ T5533] device syzkaller0 entered promiscuous mode [ 95.444903][ T5537] device syzkaller0 entered promiscuous mode [ 95.586993][ T5560] device vxcan1 entered promiscuous mode [ 95.694554][ T5567] device veth1_macvtap left promiscuous mode [ 95.713093][ T5567] device macsec0 entered promiscuous mode [ 95.882221][ T5571] device veth1_macvtap entered promiscuous mode [ 96.420864][ T5658] tap0: tun_chr_ioctl cmd 1074025677 [ 96.437067][ T5658] tap0: linktype set to 805 [ 97.024322][ T5687] device syzkaller0 entered promiscuous mode [ 97.213470][ T5704] tap0: tun_chr_ioctl cmd 1074025677 [ 97.244918][ T5704] tap0: linktype set to 805 [ 97.493618][ T5731] tap0: tun_chr_ioctl cmd 1074025677 [ 97.507674][ T5731] tap0: linktype set to 805 [ 98.113301][ T5763] tap0: tun_chr_ioctl cmd 1074025677 [ 98.118545][ T5763] tap0: linktype set to 805 [ 98.388258][ T5786] tap0: tun_chr_ioctl cmd 1074025677 [ 98.393371][ T5786] tap0: linktype set to 805 [ 99.806867][ T5853] tap0: tun_chr_ioctl cmd 1074025677 [ 99.812150][ T5853] tap0: linktype set to 805 [ 99.935877][ T5862] device syzkaller0 entered promiscuous mode [ 100.448892][ T5911] device syzkaller0 entered promiscuous mode [ 100.509314][ T5924] device syzkaller0 entered promiscuous mode [ 100.734914][ T5981] tap0: tun_chr_ioctl cmd 1074025677 [ 100.744804][ T5981] tap0: linktype set to 776 [ 100.934902][ T5999] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.942490][ T5999] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.949951][ T5999] device bridge_slave_0 entered promiscuous mode [ 100.956785][ T5999] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.964500][ T5999] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.972000][ T5999] device bridge_slave_1 entered promiscuous mode [ 101.011788][ T6014] tap0: tun_chr_ioctl cmd 1074025677 [ 101.016940][ T6014] tap0: linktype set to 805 [ 101.047955][ T5999] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.054808][ T5999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.062014][ T5999] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.068797][ T5999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.089646][ T2614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.126300][ T2614] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.133855][ T2614] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.158611][ T6020] syz.3.1902[6020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.158996][ T2619] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 101.178243][ T6020] syz.3.1902[6020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.179066][ T2619] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.197023][ T2619] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.204964][ T2619] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 101.213991][ T2619] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.220879][ T2619] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.228287][ T2619] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 101.236281][ T2619] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 101.267770][ T6016] device syzkaller0 entered promiscuous mode [ 101.287508][ T5999] device veth0_vlan entered promiscuous mode [ 101.301560][ T2614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 101.324831][ T2614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.379089][ T2614] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.386510][ T2614] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 101.473806][ T5999] device veth1_macvtap entered promiscuous mode [ 101.482102][ T2619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 101.533425][ T2619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 101.604222][ T2619] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 101.732944][ T6079] tap0: tun_chr_ioctl cmd 1074025677 [ 101.738127][ T6079] tap0: linktype set to 805 [ 102.520681][ T444] device veth1_macvtap left promiscuous mode [ 102.529901][ T444] device veth0_vlan left promiscuous mode [ 102.790726][ T6148] bridge0: port 3(veth0_to_batadv) entered blocking state [ 102.809767][ T6148] bridge0: port 3(veth0_to_batadv) entered disabled state [ 102.818516][ T6148] device veth0_to_batadv entered promiscuous mode [ 102.824932][ T6148] bridge0: port 3(veth0_to_batadv) entered blocking state [ 102.831894][ T6148] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 102.880090][ T6155] device veth0_to_batadv left promiscuous mode [ 102.886142][ T6155] bridge0: port 3(veth0_to_batadv) entered disabled state [ 102.919384][ T6180] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.926380][ T6180] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.009405][ T6180] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.016288][ T6180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.023429][ T6180] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.030289][ T6180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.077258][ T6180] device bridge0 entered promiscuous mode [ 103.282313][ T6193] tap0: tun_chr_ioctl cmd 1074025677 [ 103.318922][ T6193] tap0: linktype set to 805 [ 103.388129][ T6210] tap0: tun_chr_ioctl cmd 1074025677 [ 103.408012][ T6210] tap0: linktype set to 776 [ 103.445388][ T6226] syz.0.1961[6226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.445437][ T6226] syz.0.1961[6226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.939233][ T6261] device syzkaller0 entered promiscuous mode [ 105.189503][ T24] audit: type=1400 audit(1720107828.520:150): avc: denied { create } for pid=6300 comm="syz.1.1981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 105.669473][ T6309] tap0: tun_chr_ioctl cmd 1074025677 [ 105.674821][ T6309] tap0: linktype set to 805 [ 106.700479][ T6391] device syzkaller0 entered promiscuous mode [ 107.366601][ T6411] device syzkaller0 entered promiscuous mode [ 107.711753][ T6426] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 107.759280][ T6426] pim6reg0: linktype set to 773 [ 108.275251][ T6469] device syzkaller0 entered promiscuous mode [ 108.286924][ T6463] tap0: tun_chr_ioctl cmd 1074025677 [ 108.298107][ T6463] tap0: linktype set to 805 [ 108.388215][ T6497] tap0: tun_chr_ioctl cmd 1074025677 [ 108.393358][ T6497] tap0: linktype set to 805 [ 108.576224][ T6511] device syzkaller0 entered promiscuous mode [ 108.606423][ T6513] FAULT_INJECTION: forcing a failure. [ 108.606423][ T6513] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 108.620334][ T6515] syz.0.2053[6515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.620443][ T6515] syz.0.2053[6515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.637250][ T6513] CPU: 0 PID: 6513 Comm: syz.1.2052 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 108.659439][ T6513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 108.669327][ T6513] Call Trace: [ 108.672465][ T6513] dump_stack_lvl+0x1e2/0x24b [ 108.676971][ T6513] ? bfq_pos_tree_add_move+0x43b/0x43b [ 108.682270][ T6513] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 108.688861][ T6513] ? proc_fail_nth_write+0x20b/0x290 [ 108.693985][ T6513] dump_stack+0x15/0x17 [ 108.697974][ T6513] should_fail+0x3c6/0x510 [ 108.702228][ T6513] should_fail_usercopy+0x1a/0x20 [ 108.707088][ T6513] _copy_from_user+0x20/0xd0 [ 108.711520][ T6513] sock_do_ioctl+0x20e/0x3a0 [ 108.716036][ T6513] ? sock_show_fdinfo+0xa0/0xa0 [ 108.720719][ T6513] ? kernel_write+0x3d0/0x3d0 [ 108.725228][ T6513] ? selinux_file_ioctl+0x3cc/0x540 [ 108.730268][ T6513] sock_ioctl+0x4a6/0x760 [ 108.734427][ T6513] ? sock_poll+0x340/0x340 [ 108.738684][ T6513] ? security_file_ioctl+0x84/0xb0 [ 108.743627][ T6513] ? sock_poll+0x340/0x340 [ 108.747881][ T6513] __se_sys_ioctl+0x114/0x190 [ 108.752392][ T6513] __x64_sys_ioctl+0x7b/0x90 [ 108.756821][ T6513] do_syscall_64+0x34/0x70 [ 108.761075][ T6513] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 108.766802][ T6513] RIP: 0033:0x7f181f1f3bd9 [ 108.771067][ T6513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 108.790501][ T6513] RSP: 002b:00007f181e475048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 108.798742][ T6513] RAX: ffffffffffffffda RBX: 00007f181f381f60 RCX: 00007f181f1f3bd9 [ 108.806549][ T6513] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000008 [ 108.814363][ T6513] RBP: 00007f181e4750a0 R08: 0000000000000000 R09: 0000000000000000 [ 108.822171][ T6513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 108.829984][ T6513] R13: 000000000000000b R14: 00007f181f381f60 R15: 00007ffd9392bba8 [ 108.840527][ T6516] device wg2 entered promiscuous mode [ 108.848204][ T24] audit: type=1400 audit(1720107832.190:151): avc: denied { remove_name } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 108.871053][ T24] audit: type=1400 audit(1720107832.190:152): avc: denied { rename } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 108.982550][ T24] audit: type=1400 audit(1720107832.320:153): avc: denied { create } for pid=6528 comm="syz.4.2058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 108.983997][ T6529] syz.4.2058[6529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.010945][ T6529] syz.4.2058[6529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.171452][ T6560] FAULT_INJECTION: forcing a failure. [ 109.171452][ T6560] name failslab, interval 1, probability 0, space 0, times 1 [ 109.195847][ T6560] CPU: 0 PID: 6560 Comm: syz.4.2074 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 109.206937][ T6560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 109.216820][ T6560] Call Trace: [ 109.219953][ T6560] dump_stack_lvl+0x1e2/0x24b [ 109.224461][ T6560] ? panic+0x812/0x812 [ 109.228365][ T6560] ? bfq_pos_tree_add_move+0x43b/0x43b [ 109.233662][ T6560] dump_stack+0x15/0x17 [ 109.237653][ T6560] should_fail+0x3c6/0x510 [ 109.241904][ T6560] ? qdisc_alloc+0x76/0x750 [ 109.246247][ T6560] __should_failslab+0xa4/0xe0 [ 109.250847][ T6560] should_failslab+0x9/0x20 [ 109.255183][ T6560] __kmalloc+0x60/0x330 [ 109.259176][ T6560] ? __kasan_check_write+0x14/0x20 [ 109.264125][ T6560] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 109.269419][ T6560] qdisc_alloc+0x76/0x750 [ 109.273582][ T6560] ? mutex_lock+0xa5/0x110 [ 109.277838][ T6560] qdisc_create_dflt+0x6b/0x3d0 [ 109.282523][ T6560] ? _raw_spin_lock+0xa4/0x1b0 [ 109.287123][ T6560] dev_activate+0x123/0x1310 [ 109.291553][ T6560] ? bpf_prog_run_clear_cb+0x220/0x220 [ 109.296846][ T6560] ? dev_set_rx_mode+0x245/0x2e0 [ 109.301617][ T6560] __dev_open+0x3bf/0x4e0 [ 109.306305][ T6560] ? dev_open+0x260/0x260 [ 109.310477][ T6560] ? _raw_spin_unlock_bh+0x51/0x60 [ 109.315418][ T6560] ? dev_set_rx_mode+0x245/0x2e0 [ 109.320298][ T6560] ? __kasan_check_read+0x11/0x20 [ 109.325156][ T6560] __dev_change_flags+0x1db/0x6e0 [ 109.330019][ T6560] ? dev_get_flags+0x1e0/0x1e0 [ 109.334705][ T6560] ? selinux_capable+0x2f1/0x430 [ 109.339482][ T6560] ? selinux_capset+0xf0/0xf0 [ 109.343992][ T6560] dev_change_flags+0x8c/0x1a0 [ 109.348596][ T6560] dev_ifsioc+0x115/0xae0 [ 109.352757][ T6560] ? dev_ioctl+0xb40/0xb40 [ 109.357009][ T6560] ? dev_get_by_name_rcu+0xc5/0xf0 [ 109.361957][ T6560] dev_ioctl+0x526/0xb40 [ 109.366038][ T6560] sock_do_ioctl+0x295/0x3a0 [ 109.370465][ T6560] ? sock_show_fdinfo+0xa0/0xa0 [ 109.375149][ T6560] ? kernel_write+0x3d0/0x3d0 [ 109.379665][ T6560] ? selinux_file_ioctl+0x3cc/0x540 [ 109.384695][ T6560] sock_ioctl+0x4a6/0x760 [ 109.388865][ T6560] ? sock_poll+0x340/0x340 [ 109.393119][ T6560] ? security_file_ioctl+0x84/0xb0 [ 109.398063][ T6560] ? sock_poll+0x340/0x340 [ 109.402316][ T6560] __se_sys_ioctl+0x114/0x190 [ 109.406830][ T6560] __x64_sys_ioctl+0x7b/0x90 [ 109.411255][ T6560] do_syscall_64+0x34/0x70 [ 109.415514][ T6560] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 109.421235][ T6560] RIP: 0033:0x7fc578fbdbd9 [ 109.425489][ T6560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 109.444941][ T6560] RSP: 002b:00007fc57823f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 109.453185][ T6560] RAX: ffffffffffffffda RBX: 00007fc57914bf60 RCX: 00007fc578fbdbd9 [ 109.460990][ T6560] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000008 [ 109.468796][ T6560] RBP: 00007fc57823f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 109.476611][ T6560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.484419][ T6560] R13: 000000000000000b R14: 00007fc57914bf60 R15: 00007ffddaecfd38 [ 109.492549][ T6560] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 109.501573][ T6560] device syzkaller0 entered promiscuous mode [ 111.227204][ T6609] tap0: tun_chr_ioctl cmd 1074025677 [ 111.232377][ T6609] tap0: linktype set to 805 [ 111.252104][ T6622] device pim6reg1 entered promiscuous mode [ 111.258412][ T6618] geneve1: tun_chr_ioctl cmd 35111 [ 112.237536][ T6650] tap0: tun_chr_ioctl cmd 1074025677 [ 112.242729][ T6650] tap0: linktype set to 805 [ 112.256072][ T6652] device syzkaller0 entered promiscuous mode [ 112.316542][ T6661] tap0: tun_chr_ioctl cmd 1074025677 [ 112.322201][ T6661] tap0: linktype set to 805 [ 112.537787][ T6685] device wg2 left promiscuous mode [ 113.719362][ T6772] device syzkaller0 entered promiscuous mode [ 113.728790][ T6779] tap0: tun_chr_ioctl cmd 1074025677 [ 113.733952][ T6779] tap0: linktype set to 805 [ 113.809768][ T6789] geneve1: tun_chr_ioctl cmd 2147767517 [ 113.816324][ T6789] syz.4.2151[6789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.816374][ T6789] syz.4.2151[6789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.288487][ T6853] tap0: tun_chr_ioctl cmd 1074025677 [ 114.338913][ T6853] tap0: linktype set to 805 [ 114.702065][ T6869] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 114.758017][ T6869] device syzkaller0 entered promiscuous mode [ 115.041754][ T24] audit: type=1400 audit(1720107838.370:154): avc: denied { ioctl } for pid=6899 comm="syz.0.2188" path="uts:[4026532362]" dev="nsfs" ino=4026532362 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 115.684156][ T6928] device pim6reg1 entered promiscuous mode [ 115.777203][ T6934] device veth0_vlan left promiscuous mode [ 115.822800][ T6934] device veth0_vlan entered promiscuous mode [ 115.895444][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.904661][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.913501][ T3221] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.930834][ T6941] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 116.006715][ T6952] tap0: tun_chr_ioctl cmd 1074025677 [ 116.013962][ T6952] tap0: linktype set to 805 [ 116.111982][ T6958] device pim6reg1 entered promiscuous mode [ 116.404982][ T6976] device veth0_vlan left promiscuous mode [ 116.504048][ T6976] device veth0_vlan entered promiscuous mode [ 116.774323][ T6991] tap0: tun_chr_ioctl cmd 1074025677 [ 116.780283][ T6991] tap0: linktype set to 805 [ 118.021404][ T7030] tap0: tun_chr_ioctl cmd 1074025677 [ 118.041502][ T7030] tap0: linktype set to 805 [ 118.484961][ T7093] tap0: tun_chr_ioctl cmd 1074025677 [ 118.496610][ T7093] tap0: linktype set to 805 [ 118.938131][ T7143] tap0: tun_chr_ioctl cmd 1074025677 [ 118.943247][ T7143] tap0: linktype set to 805 [ 119.135137][ T7170] syz.1.2295[7170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.135188][ T7170] syz.1.2295[7170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.153741][ T7171] syz.0.2296[7171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.166945][ T7171] syz.0.2296[7171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.216753][ T24] audit: type=1400 audit(1720107842.550:155): avc: denied { create } for pid=7169 comm="syz.0.2296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 119.273856][ T7187] tap0: tun_chr_ioctl cmd 1074025677 [ 119.279695][ T7187] tap0: linktype set to 805 [ 119.304659][ T7177] device pim6reg1 entered promiscuous mode [ 119.538369][ T7220] device pim6reg1 entered promiscuous mode [ 119.800190][ T7246] veth0_vlan: mtu less than device minimum [ 120.577185][ T7301] tap0: tun_chr_ioctl cmd 1074025677 [ 120.583536][ T7301] tap0: linktype set to 805 [ 121.157184][ T7345] tap0: tun_chr_ioctl cmd 1074025677 [ 121.179915][ T7345] tap0: linktype set to 805 [ 121.246353][ T7351] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.253324][ T7351] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.261045][ T7351] device bridge_slave_0 entered promiscuous mode [ 121.267968][ T7351] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.287733][ T7351] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.295479][ T7351] device bridge_slave_1 entered promiscuous mode [ 121.352786][ T7351] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.359659][ T7351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 121.366752][ T7351] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.373555][ T7351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 121.395086][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 121.404621][ T15] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.419850][ T15] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.460838][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 121.469567][ T2615] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.476404][ T2615] bridge0: port 1(bridge_slave_0) entered forwarding state [ 121.493916][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 121.558230][ T2615] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.565108][ T2615] bridge0: port 2(bridge_slave_1) entered forwarding state [ 121.577997][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 121.585867][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 121.607301][ T7351] device veth0_vlan entered promiscuous mode [ 121.633757][ T7351] device veth1_macvtap entered promiscuous mode [ 121.647246][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 121.691094][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.703347][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 121.710899][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 121.723395][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 121.740019][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 121.750760][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 121.815981][ T7417] device wg2 entered promiscuous mode [ 122.154889][ T7452] device syzkaller0 entered promiscuous mode [ 122.352983][ T7476] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.359933][ T7476] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.367174][ T7476] device bridge0 left promiscuous mode [ 122.379887][ T7476] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.386749][ T7476] bridge0: port 2(bridge_slave_1) entered listening state [ 122.393769][ T7476] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.400540][ T7476] bridge0: port 1(bridge_slave_0) entered listening state [ 122.411506][ T7476] device bridge0 entered promiscuous mode [ 122.563936][ T444] device veth1_macvtap left promiscuous mode [ 122.570911][ T444] device veth0_vlan left promiscuous mode [ 123.221810][ T7534] device pim6reg1 entered promiscuous mode [ 123.971964][ T7546] device syzkaller0 entered promiscuous mode [ 124.001132][ T7552] device pim6reg1 entered promiscuous mode [ 124.035537][ T7559] device syzkaller0 entered promiscuous mode [ 125.254970][ T7680] syz.3.2485[7680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.255054][ T7680] syz.3.2485[7680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.303427][ T7682] device syzkaller0 entered promiscuous mode [ 126.077077][ T7746] device veth1_to_team entered promiscuous mode [ 126.276122][ T24] audit: type=1400 audit(1720107849.610:156): avc: denied { create } for pid=7754 comm="syz.1.2517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 126.413868][ T7762] tap0: tun_chr_ioctl cmd 1074025677 [ 126.437177][ T7762] tap0: linktype set to 805 [ 127.152169][ T7790] device wg2 entered promiscuous mode [ 129.583772][ T7887] device syzkaller0 entered promiscuous mode [ 130.086878][ T7963] device syzkaller0 entered promiscuous mode [ 130.634517][ T7990] €Â: renamed from pim6reg1 [ 130.667538][ T7992] device syzkaller0 entered promiscuous mode [ 130.837417][ T24] audit: type=1400 audit(1720107854.170:157): avc: denied { create } for pid=8004 comm="syz.2.2601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 131.089634][ T24] audit: type=1400 audit(1720107854.430:158): avc: denied { create } for pid=8025 comm="syz.0.2609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 131.183872][ T8030] device syzkaller0 entered promiscuous mode [ 131.990885][ T8058] device syzkaller0 entered promiscuous mode [ 132.393768][ T8108] veth0_vlan: mtu less than device minimum [ 133.153849][ T8162] syz.3.2657[8162] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.153896][ T8162] syz.3.2657[8162] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.558319][ T24] audit: type=1400 audit(1720107856.900:159): avc: denied { create } for pid=8184 comm="syz.0.2665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 135.226746][ T8277] device syzkaller0 entered promiscuous mode [ 135.980509][ T8308] device pim6reg1 entered promiscuous mode [ 136.493188][ T8363] device veth1_macvtap left promiscuous mode [ 136.517849][ T8363] device macsec0 entered promiscuous mode [ 136.989782][ T8407] device sit0 left promiscuous mode [ 137.050489][ T8407] device sit0 entered promiscuous mode [ 137.577829][ C0] bridge0: port 1(bridge_slave_0) entered learning state [ 137.584965][ C0] bridge0: port 2(bridge_slave_1) entered learning state [ 138.169834][ T8454] device macsec0 entered promiscuous mode [ 138.964873][ T8530] device syzkaller0 entered promiscuous mode [ 139.905852][ T8650] device pim6reg1 entered promiscuous mode [ 140.583574][ T8715] device sit0 entered promiscuous mode [ 141.100073][ T8725] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.109035][ T8728] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.115916][ T8728] bridge0: port 1(bridge_slave_0) entered listening state [ 141.290123][ T8750] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.296972][ T8750] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.304712][ T8750] device bridge_slave_0 entered promiscuous mode [ 141.311609][ T8750] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.319014][ T8750] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.326205][ T8750] device bridge_slave_1 entered promiscuous mode [ 141.427097][ T8750] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.433989][ T8750] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.441064][ T8750] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.447940][ T8750] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.476427][ T3881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 141.484281][ T3881] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.492034][ T3881] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.520012][ T1434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.528242][ T1434] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.535078][ T1434] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.546955][ T1434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 141.554982][ T1434] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.561849][ T1434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.569922][ T1434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.585104][ T1434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 141.618929][ T8803] device pim6reg1 entered promiscuous mode [ 141.649767][ T1434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 141.662013][ T8750] device veth0_vlan entered promiscuous mode [ 141.668308][ T1291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.676015][ T1291] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.683544][ T1291] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.732778][ T1291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 141.775385][ T8750] device veth1_macvtap entered promiscuous mode [ 141.806844][ T2610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 141.834436][ T2610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 141.877306][ T8827] device veth1_macvtap left promiscuous mode [ 141.938128][ T8827] device veth1_macvtap entered promiscuous mode [ 141.944493][ T8827] device macsec0 entered promiscuous mode [ 142.491808][ T8862] Ÿ: renamed from syzkaller0 [ 142.910873][ T8873] device pim6reg1 entered promiscuous mode [ 143.622379][ T8931] geneve1: tun_chr_ioctl cmd 1074025673 [ 143.630408][ T8925] geneve1: tun_chr_ioctl cmd 1074025698 [ 143.640992][ T344] device bridge_slave_1 left promiscuous mode [ 143.647050][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.654507][ T344] device bridge_slave_0 left promiscuous mode [ 143.660687][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.789997][ T24] audit: type=1400 audit(1720107867.130:160): avc: denied { create } for pid=8940 comm="syz.3.2929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 145.299246][ T24] audit: type=1400 audit(1720107868.640:161): avc: denied { append } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 145.322645][ T24] audit: type=1400 audit(1720107868.640:162): avc: denied { open } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 145.345203][ T24] audit: type=1400 audit(1720107868.640:163): avc: denied { getattr } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 145.565532][ T9108] device syzkaller0 entered promiscuous mode [ 145.743642][ T9122] syz.2.2983[9122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.743692][ T9122] syz.2.2983[9122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.003663][ T9200] device syzkaller0 entered promiscuous mode [ 147.112436][ T24] audit: type=1400 audit(1720107870.450:164): avc: denied { create } for pid=9208 comm="syz.0.3010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 147.706602][ T9238] device syzkaller0 entered promiscuous mode [ 147.722713][ T9261] device pim6reg1 entered promiscuous mode [ 148.032134][ T9271] device syzkaller0 entered promiscuous mode [ 148.088633][ T9299] bridge_slave_0: mtu greater than device maximum [ 148.483050][ T9349] device pim6reg1 entered promiscuous mode [ 149.634083][ T9434] tap0: tun_chr_ioctl cmd 1074025677 [ 149.639362][ T9434] tap0: linktype set to 0 [ 149.909424][ T9443] device pim6reg1 entered promiscuous mode [ 150.103505][ T9464] syz.1.3100[9464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.103556][ T9464] syz.1.3100[9464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.124796][ T9468] tap0: tun_chr_ioctl cmd 1074025677 [ 150.155123][ T9468] tap0: linktype set to 0 [ 151.015664][ T9542] syz.2.3121[9542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.015725][ T9542] syz.2.3121[9542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.350349][ T9556] device syzkaller0 entered promiscuous mode [ 152.051230][ T24] audit: type=1400 audit(1720107875.390:165): avc: denied { create } for pid=9589 comm="syz.0.3143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 152.947637][ C0] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.954715][ C0] bridge0: topology change detected, propagating [ 152.988062][ T2620] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 153.480605][ T9647] device pim6reg1 entered promiscuous mode [ 153.489987][ T9649] geneve1: tun_chr_ioctl cmd 1074025681 [ 153.497198][ T9638] tap0: tun_chr_ioctl cmd 1074025677 [ 153.502484][ T9638] tap0: linktype set to 0 [ 155.813303][ T9804] device pim6reg1 entered promiscuous mode [ 155.921521][ T9836] bridge0: port 3(dummy0) entered blocking state [ 155.940231][ T9836] bridge0: port 3(dummy0) entered disabled state [ 155.955032][ T9836] device dummy0 entered promiscuous mode [ 155.968791][ T9836] bridge0: port 3(dummy0) entered blocking state [ 155.974975][ T9836] bridge0: port 3(dummy0) entered forwarding state [ 156.009872][ T9850] device macsec0 left promiscuous mode [ 156.137792][ C1] bridge0: port 1(bridge_slave_0) entered learning state [ 156.183034][ T9866] tap0: tun_chr_ioctl cmd 1074025677 [ 156.189279][ T9866] tap0: linktype set to 0 [ 156.579661][ T9921] device pim6reg1 entered promiscuous mode [ 157.244450][ T9940] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.252573][ T9940] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.260423][ T9940] device bridge_slave_0 entered promiscuous mode [ 157.267301][ T9940] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.275115][ T9940] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.288036][ T9940] device bridge_slave_1 entered promiscuous mode [ 157.669785][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 157.677261][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 157.813410][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 157.850852][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 157.941539][ T2615] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.948417][ T2615] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.972953][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 157.988128][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 157.996228][ T2615] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.003092][ T2615] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.017464][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.026313][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.496405][ T9984] device syzkaller0 entered promiscuous mode [ 158.506662][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 158.517066][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.539257][ T9940] device veth0_vlan entered promiscuous mode [ 158.550722][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 158.560670][ T3254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.587041][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.594945][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.648472][T10017] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.662527][ T2613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 158.678554][ T2613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 158.682549][T10033] syz.4.3288[10033] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.686367][T10033] syz.4.3288[10033] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.698243][T10034] syz.4.3288[10034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.709959][T10034] syz.4.3288[10034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.711100][ T9940] device veth1_macvtap entered promiscuous mode [ 158.752250][T10028] device veth0_vlan left promiscuous mode [ 158.759233][T10028] device veth0_vlan entered promiscuous mode [ 158.768198][ T1014] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 158.775633][ T1014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.786095][ T1014] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.793965][ T1014] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.807942][ T2614] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 158.816025][ T2614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 158.824855][ T2614] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 158.837185][ T2614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 159.321869][T10059] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.328944][T10059] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.338545][T10059] device bridge_slave_1 left promiscuous mode [ 159.344721][T10059] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.358051][T10059] device bridge_slave_0 left promiscuous mode [ 159.364053][T10059] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.483411][T10077] device syzkaller0 entered promiscuous mode [ 160.019109][T10099] tap0: tun_chr_ioctl cmd 1074025677 [ 160.027700][T10099] tap0: linktype set to 0 [ 160.080202][ T24] audit: type=1400 audit(1720107883.420:166): avc: denied { create } for pid=10104 comm="syz.4.3308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 160.294854][T10138] device syzkaller0 entered promiscuous mode [ 160.693753][T10156] device syzkaller0 entered promiscuous mode [ 160.911929][T10183] device pim6reg1 entered promiscuous mode [ 161.556091][T10220] device pim6reg1 entered promiscuous mode [ 162.027246][T10242] bridge0: port 3(dummy0) entered disabled state [ 162.033525][T10242] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.187919][ T269] device bridge_slave_1 left promiscuous mode [ 162.193875][ T269] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.203227][ T269] device bridge_slave_0 left promiscuous mode [ 162.212063][ T269] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.222779][ T269] device veth1_macvtap left promiscuous mode [ 163.039413][T10309] syz.3.3368 uses obsolete (PF_INET,SOCK_PACKET) [ 163.063896][T10313] tap0: tun_chr_ioctl cmd 1074025677 [ 163.069497][T10313] tap0: linktype set to 805 [ 163.354413][T10342] tap0: tun_chr_ioctl cmd 1074025677 [ 163.366340][T10342] tap0: linktype set to 805 [ 163.499276][T10365] device dummy0 left promiscuous mode [ 163.507999][T10365] bridge0: port 3(dummy0) entered disabled state [ 163.514901][T10365] device bridge_slave_1 left promiscuous mode [ 163.521339][T10365] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.537834][T10365] device bridge_slave_0 left promiscuous mode [ 163.551164][T10365] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.901303][T10673] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.908300][T10673] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.918153][T10673] device bridge_slave_1 left promiscuous mode [ 166.924343][T10673] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.932776][T10673] device bridge_slave_0 left promiscuous mode [ 166.938890][T10673] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.996483][T10679] device wg2 entered promiscuous mode [ 167.832641][T10751] device sit0 entered promiscuous mode [ 168.222738][T10769] tap0: tun_chr_ioctl cmd 1074025677 [ 168.228371][T10769] tap0: linktype set to 805 [ 168.547449][T10784] device sit0 entered promiscuous mode [ 168.595238][T10789] tap0: tun_chr_ioctl cmd 1074025677 [ 168.601234][T10789] tap0: linktype set to 805 [ 168.721732][T10801] device syzkaller0 entered promiscuous mode [ 169.277826][T10827] tap0: tun_chr_ioctl cmd 1074025677 [ 169.288042][T10827] tap0: linktype set to 805 [ 169.303591][T10829] tap0: tun_chr_ioctl cmd 1074025677 [ 169.313683][T10829] tap0: linktype set to 805 [ 169.389860][T10831] device sit0 entered promiscuous mode [ 169.428852][T10833] tap0: tun_chr_ioctl cmd 1074025677 [ 169.434000][T10833] tap0: linktype set to 805 [ 169.548890][T10856] tap0: tun_chr_ioctl cmd 1074025677 [ 169.554106][T10856] tap0: linktype set to 805 [ 169.887700][T10878] tap0: tun_chr_ioctl cmd 1074025677 [ 169.892927][T10878] tap0: linktype set to 805 [ 169.910948][T10881] device syzkaller0 entered promiscuous mode [ 170.472437][T10949] device veth1_macvtap left promiscuous mode [ 171.498619][ C1] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.505684][ C1] bridge0: topology change detected, propagating [ 173.878839][ T24] audit: type=1400 audit(1720107897.220:167): avc: denied { create } for pid=11157 comm="syz.0.3659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 173.968354][T11166] device veth1_macvtap entered promiscuous mode [ 173.978551][T11166] device macsec0 entered promiscuous mode [ 173.985427][ T2649] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 177.602289][T11224] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.612410][T11224] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.648409][T11224] device bridge_slave_0 entered promiscuous mode [ 178.114989][T11224] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.121899][T11224] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.129385][T11224] device bridge_slave_1 entered promiscuous mode [ 178.175643][T11224] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.182517][T11224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.189591][T11224] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.196368][T11224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.204698][T11239] tap0: tun_chr_ioctl cmd 1074025677 [ 178.209873][T11239] tap0: linktype set to 805 [ 178.378312][ T2648] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.388331][ T2648] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.406046][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 178.415967][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.423417][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.431933][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.440026][ T2645] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.446860][ T2645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.454704][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.462843][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.470959][ T2645] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.477799][ T2645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.502564][ T2651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 178.524072][ T2651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 178.554466][ T2651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 178.562404][ T2651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 178.714775][ T3883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 178.742708][ T3883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 178.836052][T11224] device veth0_vlan entered promiscuous mode [ 179.030672][ T2634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 179.038587][ T2634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.351565][ T2634] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 179.364869][ T2634] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.916288][T11224] device veth1_macvtap entered promiscuous mode [ 179.937256][ T3883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 179.945266][ T3883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 179.971506][ T3883] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 179.997870][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 180.012478][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 180.020922][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 180.029121][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 180.100744][T11280] tap0: tun_chr_ioctl cmd 1074025677 [ 180.105913][T11280] tap0: linktype set to 805 [ 180.434305][T11288] device syzkaller0 entered promiscuous mode [ 180.977067][T11340] tap0: tun_chr_ioctl cmd 1074025677 [ 181.011712][T11340] tap0: linktype set to 805 [ 181.876242][T11355] tap0: tun_chr_ioctl cmd 1074025677 [ 181.890727][T11355] tap0: linktype set to 805 [ 184.120849][T11427] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.127973][T11427] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.135250][T11427] device bridge_slave_0 entered promiscuous mode [ 184.142942][T11427] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.149933][T11427] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.157088][T11427] device bridge_slave_1 entered promiscuous mode [ 184.286438][T11427] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.293295][T11427] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.300409][T11427] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.307174][T11427] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.402234][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.411400][ T3229] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.447946][ T3229] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.499159][ T2633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.507368][ T2633] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.514236][ T2633] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.521725][ T2633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.530117][ T2633] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.536967][ T2633] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.631648][ T2634] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.670143][ T2634] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.714968][T11427] device veth0_vlan entered promiscuous mode [ 184.722027][ T2648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 184.732204][ T2648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.740184][ T2648] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.747413][ T2648] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.781518][ T2649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 184.797010][T11427] device veth1_macvtap entered promiscuous mode [ 184.809310][ T2649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 184.831210][ T2651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 185.184226][T11520] device syzkaller0 entered promiscuous mode [ 185.222911][T11543] syz.1.3787[11543] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.222964][T11543] syz.1.3787[11543] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.369426][ T9] device veth1_macvtap left promiscuous mode [ 185.387172][ T9] device veth0_vlan left promiscuous mode [ 185.878823][T11596] device syzkaller0 entered promiscuous mode [ 186.026222][T11605] device pim6reg1 entered promiscuous mode [ 188.409860][T11726] device syzkaller0 entered promiscuous mode [ 189.837496][ T24] audit: type=1400 audit(1720107913.170:168): avc: denied { create } for pid=11834 comm="syz.0.3880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 190.146374][ T24] audit: type=1400 audit(1720107913.480:169): avc: denied { create } for pid=11867 comm="syz.3.3891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 192.281507][T12061] tap0: tun_chr_ioctl cmd 1074025677 [ 192.286750][T12061] tap0: linktype set to 805 [ 192.359828][T12064] device syzkaller0 entered promiscuous mode [ 192.453305][T12084] device syzkaller0 entered promiscuous mode [ 192.572543][ T24] audit: type=1400 audit(1720107915.910:170): avc: denied { create } for pid=12096 comm="syz.1.3966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 192.594662][T12097] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.606595][T12097] O3ãc¤±: renamed from bridge_slave_0 [ 193.149009][T12195] syz.1.4002[12195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.149055][T12195] syz.1.4002[12195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.423853][T12261] device syzkaller0 entered promiscuous mode [ 193.445596][ T24] audit: type=1400 audit(1720107916.780:171): avc: denied { create } for pid=12264 comm="syz.1.4021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 194.230338][ T24] audit: type=1400 audit(1720107917.570:172): avc: denied { write } for pid=12315 comm="syz.4.4036" name="net" dev="proc" ino=51834 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 194.318011][ T24] audit: type=1400 audit(1720107917.660:173): avc: denied { add_name } for pid=12315 comm="syz.4.4036" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 194.367665][ T24] audit: type=1400 audit(1720107917.660:174): avc: denied { create } for pid=12315 comm="syz.4.4036" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 194.399320][ T24] audit: type=1400 audit(1720107917.660:175): avc: denied { associate } for pid=12315 comm="syz.4.4036" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 194.850330][T12364] device veth0_vlan left promiscuous mode [ 194.879331][T12364] device veth0_vlan entered promiscuous mode [ 194.930634][T12385] device syzkaller0 entered promiscuous mode [ 194.937235][ T3234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 194.945486][ T3234] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 194.953301][ T3234] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 194.966272][T12382] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.973424][T12382] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.981079][T12382] device bridge_slave_0 entered promiscuous mode [ 194.988416][T12382] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.995242][T12382] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.002729][T12382] device bridge_slave_1 entered promiscuous mode [ 195.025483][T12426] syz.4.4069[12426] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.027468][T12426] syz.4.4069[12426] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.074514][T12382] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.092565][T12382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.099689][T12382] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.106450][T12382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.129673][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.137192][ T3249] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.147917][ T3249] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.178599][ T3234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.186558][ T3234] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.193413][ T3234] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.201417][ T3234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.209804][ T3234] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.216648][ T3234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.236302][ T3234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.245323][ T3234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.326818][T12382] device veth0_vlan entered promiscuous mode [ 195.339203][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 195.348056][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 195.356020][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 195.364795][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 195.381486][T12382] device veth1_macvtap entered promiscuous mode [ 195.391034][ T3234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 195.413750][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 195.423130][ T3249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 196.143836][T12489] syz.1.4088[12489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.143889][T12489] syz.1.4088[12489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.120867][T12544] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.139048][T12544] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.167502][T12547] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.174381][T12547] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.181587][T12547] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.188350][T12547] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.211571][T12547] device bridge0 entered promiscuous mode [ 198.745997][ T344] device bridge_slave_1 left promiscuous mode [ 198.752115][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.759767][ T344] device O3ãc¤± left promiscuous mode [ 198.765087][ T344] bridge0: port 1(O3ãc¤±) entered disabled state [ 198.783187][ T344] device veth1_macvtap left promiscuous mode [ 199.178867][ T3227] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.063513][T12692] device pim6reg1 entered promiscuous mode [ 201.393156][T12733] device syzkaller0 entered promiscuous mode SYZFAIL: proc resp pipe read failed n=-1 (errno 11: Resource temporarily unavailable) [ 203.098351][ T344] device bridge_slave_1 left promiscuous mode [ 203.104265][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.111563][ T344] device bridge_slave_0 left promiscuous mode [ 203.117466][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.126296][ T344] device bridge_slave_1 left promiscuous mode [ 203.132267][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.139371][ T344] device bridge_slave_0 left promiscuous mode [ 203.145257][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.153590][ T344] device veth1_macvtap left promiscuous mode [ 203.159417][ T344] device veth0_vlan left promiscuous mode [ 203.165071][ T344] device veth1_macvtap left promiscuous mode [ 203.170887][ T344] device veth0_vlan left promiscuous mode [ 203.176491][ T344] device veth1_macvtap left promiscuous mode [ 203.182312][ T344] device veth0_vlan left promiscuous mode [ 203.187969][ T344] device veth0_vlan left promiscuous mode [ 205.698172][ T344] device bridge_slave_1 left promiscuous mode [ 205.704078][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.711258][ T344] device bridge_slave_0 left promiscuous mode [ 205.717152][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.724628][ T344] device veth1_macvtap left promiscuous mode