last executing test programs: 4.838948906s ago: executing program 2 (id=2592): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x6, 0x4, 0x599, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r0, 0x0, 0x1ba8847c99}, 0x38) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x9) 4.285051309s ago: executing program 1 (id=2597): bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10005, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x2000004a, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) close(0x3) 3.98336437s ago: executing program 1 (id=2602): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x200, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2000000, 0x12, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0x300}, 0x28) 3.98316834s ago: executing program 2 (id=2604): bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r0}, 0x11) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e00)={{r1}, &(0x7f0000000d80), &(0x7f0000000dc0)=r2}, 0x20) 3.287373184s ago: executing program 1 (id=2608): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 3.255480444s ago: executing program 2 (id=2610): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000140)='mm_page_alloc\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.193288784s ago: executing program 1 (id=2613): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 3.180951764s ago: executing program 3 (id=2614): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005000000", @ANYRES32, @ANYBLOB='\x00'/17, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000800000"], 0x48) 1.765695681s ago: executing program 2 (id=2616): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1.765596361s ago: executing program 3 (id=2617): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x3, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 1.757257191s ago: executing program 4 (id=2618): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 664.241997ms ago: executing program 3 (id=2619): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x200, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2000000, 0x12, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0x300}, 0x28) 662.552677ms ago: executing program 1 (id=2620): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r1}, 0x10) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 472.392788ms ago: executing program 2 (id=2622): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x8001, 0x808, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 467.638997ms ago: executing program 3 (id=2623): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) syz_clone(0xc4000000, 0x0, 0x0, 0x0, 0x0, 0x0) 443.819428ms ago: executing program 0 (id=2624): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000008c50000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/249, 0xf9}], 0x1}, 0x0) close(r1) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) 432.762788ms ago: executing program 4 (id=2625): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffe4, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x800}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 372.477448ms ago: executing program 0 (id=2626): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 370.656348ms ago: executing program 1 (id=2637): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 323.566618ms ago: executing program 0 (id=2627): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x87, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0x30}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x56}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) 320.652728ms ago: executing program 3 (id=2628): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000030100008500000086000000850000005000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000600)='mm_lru_insertion\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x2, 0x80, 0xc2, 0xc}}) 301.147879ms ago: executing program 4 (id=2630): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mkdir(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) 258.625209ms ago: executing program 0 (id=2631): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)=@generic={0x0, r3}, 0x18) 231.513499ms ago: executing program 4 (id=2632): bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x4e, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fff, 0xaea}, 0x110104, 0x32, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1e00000023000000090000000400000000000000", @ANYRES32=0x1, @ANYBLOB='\r\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="fffffeff03"], 0x48) ioctl$SIOCSIFHWADDR(r0, 0x89f1, &(0x7f0000000900)={'ip6tnl0\x00', @random="0600002000"}) 230.031989ms ago: executing program 3 (id=2643): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x622800, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) mkdir(0x0, 0x0) 122.329479ms ago: executing program 0 (id=2633): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57b00000000000000000104"], 0xfe1b) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="8d45007fed044dbdf2f7ba00", @ANYRES32, @ANYBLOB="08f7cc0000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 82.494939ms ago: executing program 4 (id=2634): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000300000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0x17, 0x0, 0x1b, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r3, 0x0, &(0x7f0000001780)=""/4096}, 0x20) 51.307429ms ago: executing program 2 (id=2635): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x3, 0x25, 0x4, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 19.98568ms ago: executing program 0 (id=2636): perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext={0x1000, 0x8}, 0x0, 0x0, 0x2080, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 0s ago: executing program 4 (id=2638): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000001c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071123f000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x34) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.41' (ED25519) to the list of known hosts. [ 22.009893][ T30] audit: type=1400 audit(1732105867.348:66): avc: denied { integrity } for pid=281 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 22.033895][ T30] audit: type=1400 audit(1732105867.378:67): avc: denied { mounton } for pid=281 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.035256][ T281] cgroup: Unknown subsys name 'net' [ 22.056747][ T30] audit: type=1400 audit(1732105867.378:68): avc: denied { mount } for pid=281 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.083783][ T281] cgroup: Unknown subsys name 'devices' [ 22.083825][ T30] audit: type=1400 audit(1732105867.398:69): avc: denied { unmount } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.223594][ T281] cgroup: Unknown subsys name 'hugetlb' [ 22.229016][ T281] cgroup: Unknown subsys name 'rlimit' [ 22.401149][ T30] audit: type=1400 audit(1732105867.738:70): avc: denied { setattr } for pid=281 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.424118][ T30] audit: type=1400 audit(1732105867.738:71): avc: denied { mounton } for pid=281 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.436403][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.448714][ T30] audit: type=1400 audit(1732105867.748:72): avc: denied { mount } for pid=281 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 22.480195][ T30] audit: type=1400 audit(1732105867.798:73): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.505175][ T281] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.505389][ T30] audit: type=1400 audit(1732105867.798:74): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.539291][ T30] audit: type=1400 audit(1732105867.848:75): avc: denied { read } for pid=281 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.997863][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.004793][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.012336][ T291] device bridge_slave_0 entered promiscuous mode [ 23.020231][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.027355][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.034931][ T291] device bridge_slave_1 entered promiscuous mode [ 23.115014][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.121936][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.129120][ T293] device bridge_slave_0 entered promiscuous mode [ 23.139742][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.146635][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.153978][ T292] device bridge_slave_0 entered promiscuous mode [ 23.162246][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.169103][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.176605][ T293] device bridge_slave_1 entered promiscuous mode [ 23.191950][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.198821][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.206174][ T292] device bridge_slave_1 entered promiscuous mode [ 23.253490][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.260349][ T295] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.267674][ T295] device bridge_slave_0 entered promiscuous mode [ 23.274392][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.281233][ T295] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.288645][ T295] device bridge_slave_1 entered promiscuous mode [ 23.370567][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.377456][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.384790][ T294] device bridge_slave_0 entered promiscuous mode [ 23.391949][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.398805][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.406297][ T294] device bridge_slave_1 entered promiscuous mode [ 23.446046][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.452926][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.460063][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.466936][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.524693][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.531573][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.538652][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.545467][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.570809][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.577685][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.584788][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.591568][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.633254][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.640135][ T295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.647298][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.654153][ T295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.674246][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.681336][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.688543][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.695795][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.703076][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.710047][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.717683][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.724784][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.732687][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.739954][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.783497][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.791818][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.798655][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.805981][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.814104][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.820925][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.835838][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.854699][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.862644][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.869875][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.878274][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.885179][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.892772][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.900800][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.907664][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.914890][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.922949][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.929784][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.937042][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.945155][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.952133][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.994837][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.003617][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.012350][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.019201][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.026720][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.035977][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.042842][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.050035][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.057992][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.066045][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.073866][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.081662][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.089614][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.096467][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.103793][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.111871][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.118711][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.125970][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.133827][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.141638][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.149641][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.157773][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.165738][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.173684][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.181907][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.190015][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.211988][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.220321][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.228528][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.236476][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.245471][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.258513][ T292] device veth0_vlan entered promiscuous mode [ 24.272947][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.280996][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.289108][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.297491][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.306039][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.314477][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.322817][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.330508][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.338713][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.346168][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.353707][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.361028][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.376475][ T291] device veth0_vlan entered promiscuous mode [ 24.385644][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.394009][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.402442][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.409735][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.419460][ T294] device veth0_vlan entered promiscuous mode [ 24.427170][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.435301][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.443612][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.451990][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.459332][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.467465][ T293] device veth0_vlan entered promiscuous mode [ 24.476726][ T292] device veth1_macvtap entered promiscuous mode [ 24.486538][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.494997][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.508953][ T291] device veth1_macvtap entered promiscuous mode [ 24.521126][ T295] device veth0_vlan entered promiscuous mode [ 24.528735][ T293] device veth1_macvtap entered promiscuous mode [ 24.535560][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.543656][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.550963][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.559186][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.567496][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.575979][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.583853][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.592157][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.600139][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.607962][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.616060][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.624386][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.635311][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.643663][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.658595][ T294] device veth1_macvtap entered promiscuous mode [ 24.672639][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.680840][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.689225][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.697660][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.706002][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.714389][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.722679][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.731827][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.739990][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.752429][ T295] device veth1_macvtap entered promiscuous mode [ 24.760583][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.788491][ T197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.810166][ T197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.819002][ T197] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.827216][ T197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.835630][ T197] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.844536][ T197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.589138][ T384] Q6\bY4: renamed from lo [ 25.626643][ T388] device pim6reg1 entered promiscuous mode [ 26.217734][ T489] ------------[ cut here ]------------ [ 26.223130][ T489] WARNING: CPU: 0 PID: 489 at kernel/trace/bpf_trace.c:1411 bpf_get_stack_raw_tp+0x1d3/0x220 [ 26.233190][ T489] Modules linked in: [ 26.236876][ T489] CPU: 0 PID: 489 Comm: syz.1.80 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 26.246371][ T489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 26.256332][ T489] RIP: 0010:bpf_get_stack_raw_tp+0x1d3/0x220 [ 26.262295][ T489] Code: f1 45 31 c0 e8 2e 8f 14 00 65 ff 0d 4f 56 87 7e 4c 63 e8 4c 89 e8 48 83 c4 18 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 6d 7e f4 ff <0f> 0b 65 ff 0d 2c 56 87 7e 49 c7 c5 f0 ff ff ff eb d7 e8 56 7e f4 [ 26.281810][ T489] RSP: 0000:ffffc90000c469b0 EFLAGS: 00010293 [ 26.287634][ T489] RAX: ffffffff817bd8f3 RBX: 0000000000000003 RCX: ffff888114938000 [ 26.295681][ T489] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000fffffffc [ 26.303684][ T489] RBP: ffffc90000c469f0 R08: ffffffff817bd7b3 R09: fffffbfff0e5333e [ 26.311579][ T489] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90000c46a08 [ 26.319668][ T489] R13: 0000000000000000 R14: 0000000000000900 R15: ffff8881f7032d30 [ 26.327673][ T489] FS: 0000555566995500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 26.336491][ T489] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 26.342968][ T489] CR2: 0000001b2e11cff8 CR3: 0000000128b06000 CR4: 00000000003506b0 [ 26.344690][ T494] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 26.366229][ T489] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 26.374121][ T489] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 26.381986][ T489] Call Trace: [ 26.385048][ T489] [ 26.387825][ T489] ? show_regs+0x58/0x60 [ 26.391939][ T489] ? __warn+0x160/0x2f0 [ 26.395899][ T489] ? bpf_get_stack_raw_tp+0x1d3/0x220 [ 26.401109][ T489] ? report_bug+0x3d9/0x5b0 [ 26.405488][ T489] ? bpf_get_stack_raw_tp+0x1d3/0x220 [ 26.410677][ T489] ? handle_bug+0x41/0x70 [ 26.414866][ T489] ? exc_invalid_op+0x1b/0x50 [ 26.419339][ T489] ? asm_exc_invalid_op+0x1b/0x20 [ 26.424282][ T489] ? bpf_get_stack_raw_tp+0x93/0x220 [ 26.429312][ T489] ? bpf_get_stack_raw_tp+0x1d3/0x220 [ 26.434573][ T489] ? bpf_get_stack_raw_tp+0x1d3/0x220 [ 26.439823][ T489] ? strlcpy+0x88/0xd0 [ 26.443755][ T489] bpf_prog_ec3b2eefa702d8d3+0x3a/0x458 [ 26.449100][ T489] bpf_trace_run4+0x13f/0x270 [ 26.453648][ T489] ? bpf_trace_run3+0x250/0x250 [ 26.458302][ T489] ? get_mem_cgroup_from_mm+0x18e/0x230 [ 26.463758][ T489] __bpf_trace_mmap_lock_acquire_returned+0x33/0x40 [ 26.470116][ T489] __mmap_lock_do_trace_acquire_returned+0x198/0x200 [ 26.476755][ T489] ? get_mm_memcg_path+0x240/0x240 [ 26.481700][ T489] stack_map_get_build_id_offset+0x5ec/0x900 [ 26.488018][ T489] ? __bpf_get_stackid+0x950/0x950 [ 26.493080][ T489] ? stack_trace_save+0x1c0/0x1c0 [ 26.497954][ T489] __bpf_get_stack+0x495/0x570 [ 26.502679][ T489] ? stack_map_get_build_id_offset+0x900/0x900 [ 26.508659][ T489] ? __kasan_check_write+0x14/0x20 [ 26.513657][ T489] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 26.518903][ T489] bpf_get_stack+0x31/0x40 [ 26.523200][ T489] bpf_get_stack_raw_tp+0x1b2/0x220 [ 26.528191][ T489] bpf_prog_ec3b2eefa702d8d3+0x3a/0x458 [ 26.533612][ T489] bpf_trace_run4+0x13f/0x270 [ 26.538173][ T489] ? bpf_trace_run3+0x250/0x250 [ 26.542926][ T489] ? get_mem_cgroup_from_mm+0x18e/0x230 [ 26.548325][ T489] __bpf_trace_mmap_lock_acquire_returned+0x33/0x40 [ 26.555044][ T489] __mmap_lock_do_trace_acquire_returned+0x198/0x200 [ 26.561545][ T489] ? get_mm_memcg_path+0x240/0x240 [ 26.566468][ T489] stack_map_get_build_id_offset+0x5ec/0x900 [ 26.572309][ T489] ? __bpf_get_stackid+0x950/0x950 [ 26.577225][ T489] ? __perf_event_task_sched_in+0x219/0x2a0 [ 26.583053][ T489] ? perf_pmu_sched_task+0x190/0x190 [ 26.588073][ T489] ? sched_clock+0x9/0x10 [ 26.592283][ T489] __bpf_get_stack+0x495/0x570 [ 26.596850][ T489] ? stack_map_get_build_id_offset+0x900/0x900 [ 26.602861][ T489] ? __kasan_check_write+0x14/0x20 [ 26.607775][ T489] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 26.613107][ T489] bpf_get_stack+0x31/0x40 [ 26.617324][ T489] bpf_get_stack_raw_tp+0x1b2/0x220 [ 26.622392][ T489] bpf_prog_ec3b2eefa702d8d3+0x3a/0x458 [ 26.627748][ T489] bpf_trace_run4+0x13f/0x270 [ 26.632283][ T489] ? bpf_trace_run3+0x250/0x250 [ 26.636970][ T489] ? remove_hrtimer+0x134/0x290 [ 26.641668][ T489] ? get_mem_cgroup_from_mm+0x18e/0x230 [ 26.647008][ T489] __bpf_trace_mmap_lock_acquire_returned+0x33/0x40 [ 26.653464][ T489] __mmap_lock_do_trace_acquire_returned+0x198/0x200 [ 26.659943][ T489] ? get_mm_memcg_path+0x240/0x240 [ 26.665057][ T489] stack_map_get_build_id_offset+0x5ec/0x900 [ 26.670820][ T489] ? do_futex+0x1367/0x37f0 [ 26.675164][ T489] ? __bpf_get_stackid+0x950/0x950 [ 26.680078][ T489] __bpf_get_stack+0x495/0x570 [ 26.684728][ T489] ? stack_map_get_build_id_offset+0x900/0x900 [ 26.690673][ T489] ? __kasan_check_write+0x14/0x20 [ 26.695753][ T489] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 26.701002][ T489] bpf_get_stack+0x31/0x40 [ 26.705308][ T489] bpf_get_stack_raw_tp+0x1b2/0x220 [ 26.710289][ T489] bpf_prog_ec3b2eefa702d8d3+0x3a/0x458 [ 26.715708][ T489] bpf_trace_run4+0x13f/0x270 [ 26.720183][ T489] ? bpf_trace_run3+0x250/0x250 [ 26.724916][ T489] ? get_mem_cgroup_from_mm+0x18e/0x230 [ 26.730259][ T489] __bpf_trace_mmap_lock_acquire_returned+0x33/0x40 [ 26.736707][ T489] __mmap_lock_do_trace_acquire_returned+0x198/0x200 [ 26.743263][ T489] ? get_mm_memcg_path+0x240/0x240 [ 26.748135][ T489] ? debug_smp_processor_id+0x17/0x20 [ 26.753379][ T489] exc_page_fault+0x705/0x7f0 [ 26.757854][ T489] asm_exc_page_fault+0x27/0x30 [ 26.762569][ T489] RIP: 0033:0x7f47e8d97536 [ 26.766812][ T489] Code: 00 00 00 00 be 08 00 00 00 48 89 df 49 83 c6 01 e8 6f ac fe ff 48 8b 53 38 48 8d 42 f8 48 89 43 38 8b 43 28 83 c0 08 89 43 28 <48> 89 6a f8 45 39 e6 0f 83 7d 00 00 00 48 8b 3c 24 49 8b 6d 30 4a [ 26.786287][ T489] RSP: 002b:00007fffac4370d0 EFLAGS: 00010202 [ 26.792153][ T489] RAX: 0000000000003008 RBX: 00007f47e9b9f720 RCX: 0000000000000000 [ 26.799944][ T489] RDX: 0000001b2e11d000 RSI: 0000000000000008 RDI: 00007f47e9b9f720 [ 26.807782][ T489] RBP: ffffffff819772de R08: 00007f47e8539060 R09: 00007f47e905c000 [ 26.815604][ T489] R10: 00007f47e8539008 R11: 0000000000000003 R12: 000000000000011b [ 26.823439][ T489] R13: 00007f47e9070038 R14: 0000000000000059 R15: ffffffffffffd000 [ 26.831230][ T489] ? __jump_label_update+0x35e/0x380 [ 26.836446][ T489] [ 26.839270][ T489] ---[ end trace 39800bfa814c5c2d ]--- [ 26.859286][ T499] device pim6reg1 entered promiscuous mode [ 27.041748][ T30] kauditd_printk_skb: 44 callbacks suppressed [ 27.041764][ T30] audit: type=1400 audit(1732105872.388:120): avc: denied { relabelfrom } for pid=516 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 27.091408][ T30] audit: type=1400 audit(1732105872.408:121): avc: denied { relabelto } for pid=516 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 27.359383][ T30] audit: type=1400 audit(1732105872.698:122): avc: denied { write } for pid=559 comm="syz.2.112" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.527188][ C1] hrtimer: interrupt took 128222 ns [ 28.394343][ T665] device pim6reg1 entered promiscuous mode [ 29.002618][ T721] sock: sock_timestamping_bind_phc: sock not bind to device [ 30.359273][ T815] device pim6reg1 entered promiscuous mode [ 31.538525][ T30] audit: type=1400 audit(1732105876.878:123): avc: denied { create } for pid=905 comm="syz.3.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 31.655202][ T30] audit: type=1400 audit(1732105876.948:124): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 33.085471][ T30] audit: type=1400 audit(1732105878.428:125): avc: denied { create } for pid=950 comm="syz.1.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 33.202213][ T30] audit: type=1400 audit(1732105878.548:126): avc: denied { create } for pid=958 comm="syz.1.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 33.285448][ T30] audit: type=1400 audit(1732105878.628:127): avc: denied { setopt } for pid=968 comm="syz.4.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 34.105016][ T1108] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 34.121721][ T1108] syzkaller0: linktype set to 65535 [ 34.413528][ T1146] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 34.419962][ T1146] syzkaller0: linktype set to 65535 [ 34.616953][ T30] audit: type=1400 audit(1732105879.958:128): avc: denied { create } for pid=1177 comm="syz.4.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 34.679427][ T1185] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 34.706131][ T1185] syzkaller0: linktype set to 65535 [ 35.797445][ T1334] device pim6reg1 entered promiscuous mode [ 36.107332][ T1379] syz.3.496[1379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.107408][ T1379] syz.3.496[1379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.299318][ T1522] device syzkaller0 entered promiscuous mode [ 37.956236][ T1627] syz.2.618[1627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.956317][ T1627] syz.2.618[1627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.812073][ T1765] bond_slave_1: mtu less than device minimum [ 38.916778][ T1781] sock: sock_timestamping_bind_phc: sock not bind to device [ 39.549924][ T1843] device pim6reg1 entered promiscuous mode [ 40.962465][ T1946] syz.0.767[1946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.962562][ T1946] syz.0.767[1946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.288615][ T1987] syz.1.786[1987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.319943][ T1987] syz.1.786[1987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.444860][ T30] audit: type=1400 audit(1732105887.778:129): avc: denied { create } for pid=2091 comm="syz.0.834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 42.771824][ T2132] syz.2.852[2132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.771907][ T2132] syz.2.852[2132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.292386][ T30] audit: type=1400 audit(1732105888.638:130): avc: denied { attach_queue } for pid=2181 comm="syz.3.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 43.500441][ T2210] syz.1.897[2210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.500507][ T2210] syz.1.897[2210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.721543][ T2232] device veth1_macvtap left promiscuous mode [ 43.789248][ T2232] device veth1_macvtap entered promiscuous mode [ 43.818813][ T2232] device macsec0 entered promiscuous mode [ 45.626760][ T2391] tun0: tun_chr_ioctl cmd 1074025675 [ 45.633419][ T2391] tun0: persist enabled [ 45.637761][ T2391] tun0: tun_chr_ioctl cmd 1074025675 [ 45.643536][ T2391] tun0: persist enabled [ 45.652066][ T2397] device veth1_macvtap left promiscuous mode [ 45.667331][ T2397] device veth1_macvtap entered promiscuous mode [ 45.673574][ T2397] device macsec0 entered promiscuous mode [ 45.838350][ T2419] device veth1_macvtap left promiscuous mode [ 45.875840][ T2419] device veth1_macvtap entered promiscuous mode [ 45.902915][ T2419] device macsec0 entered promiscuous mode [ 46.595210][ T2468] device syzkaller0 entered promiscuous mode [ 47.660715][ T2590] syz.4.1066[2590] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.660806][ T2590] syz.4.1066[2590] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.036457][ T2617] device wg2 entered promiscuous mode [ 49.013995][ T2694] device wg2 entered promiscuous mode [ 49.110517][ T2700] syz.2.1117[2700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.110599][ T2700] syz.2.1117[2700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.940020][ T2952] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 53.054245][ T3059] syz.2.1288[3059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.054328][ T3059] syz.2.1288[3059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.265281][ T30] audit: type=1400 audit(1732105898.608:131): avc: denied { create } for pid=3068 comm="syz.2.1291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 53.934228][ T3107] device wg2 entered promiscuous mode [ 54.691752][ T3186] bond_slave_1: mtu greater than device maximum [ 54.749946][ T30] audit: type=1400 audit(1732105900.088:132): avc: denied { create } for pid=3191 comm="syz.3.1347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 55.438721][ T3203] cgroup: fork rejected by pids controller in /syz0 [ 55.823579][ T294] syz-executor (294) used greatest stack depth: 20688 bytes left [ 56.358136][ T3245] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.368325][ T3245] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.378975][ T3245] device bridge_slave_0 entered promiscuous mode [ 56.408266][ T3245] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.491523][ T3245] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.498776][ T3245] device bridge_slave_1 entered promiscuous mode [ 56.613084][ T3276] ------------[ cut here ]------------ [ 56.618403][ T3276] trace type BPF program uses run-time allocation [ 56.695981][ T3276] WARNING: CPU: 1 PID: 3276 at kernel/bpf/verifier.c:11698 check_map_prog_compatibility+0x6f1/0x890 [ 56.859520][ T3276] Modules linked in: [ 56.863341][ T3276] CPU: 0 PID: 3276 Comm: syz.3.1384 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 56.875946][ T3276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 56.902567][ T3276] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890 [ 56.920611][ T3283] syz.4.1387[3283] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.920690][ T3283] syz.4.1387[3283] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.932093][ T3276] Code: db e9 f9 fc ff ff e8 3e 31 ed ff 31 db e9 ed fc ff ff e8 32 31 ed ff c6 05 de 5e a3 05 01 48 c7 c7 c0 eb 87 85 e8 4f 7b be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff [ 57.001545][ T3276] RSP: 0018:ffffc90000c5f328 EFLAGS: 00010246 [ 57.007635][ T3276] RAX: 3cb97111a8048a00 RBX: 0000000000000001 RCX: 0000000000080000 [ 57.015995][ T3276] RDX: ffffc90001b9d000 RSI: 00000000000009dc RDI: 00000000000009dd [ 57.024165][ T3276] RBP: ffffc90000c5f370 R08: ffffffff81579195 R09: ffffed103ee265e8 [ 57.032726][ T3276] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 57.040692][ T3276] R13: ffff888126e70000 R14: ffffc9000017b000 R15: dffffc0000000000 [ 57.048969][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.057260][ T3276] FS: 00007fa2b8a216c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 57.075689][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.107172][ T3276] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 57.134969][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.151904][ T3276] CR2: 0000000020002000 CR3: 00000001290a8000 CR4: 00000000003506a0 [ 57.165126][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.199141][ T3276] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 57.217176][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.224180][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.235540][ T3276] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 57.252254][ T3276] Call Trace: [ 57.265767][ T3290] device pim6reg1 entered promiscuous mode [ 57.290249][ T3276] [ 57.296725][ T3276] ? show_regs+0x58/0x60 [ 57.310721][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 57.323801][ T3276] ? __warn+0x160/0x2f0 [ 57.332489][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 57.355672][ T3276] ? check_map_prog_compatibility+0x6f1/0x890 [ 57.380012][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.394938][ T3276] ? report_bug+0x3d9/0x5b0 [ 57.424031][ T3276] ? check_map_prog_compatibility+0x6f1/0x890 [ 57.442505][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.449385][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.485257][ T3276] ? handle_bug+0x41/0x70 [ 57.529969][ T3276] ? exc_invalid_op+0x1b/0x50 [ 57.536196][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 57.551539][ T3276] ? asm_exc_invalid_op+0x1b/0x20 [ 57.556513][ T3276] ? __wake_up_klogd+0xd5/0x110 [ 57.561301][ T3276] ? check_map_prog_compatibility+0x6f1/0x890 [ 57.567898][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 57.588850][ T3276] ? check_map_prog_compatibility+0x6f1/0x890 [ 57.596426][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 57.606757][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 57.651602][ T3276] resolve_pseudo_ldimm64+0x682/0x1240 [ 57.656936][ T3276] ? check_attach_btf_id+0xef0/0xef0 [ 57.691541][ T3276] ? __mark_reg_known+0x1b0/0x1b0 [ 57.696444][ T3276] ? security_capable+0x87/0xb0 [ 57.711009][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 57.723924][ T3276] bpf_check+0x3174/0x12bf0 [ 57.729367][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 57.742919][ T3276] ? 0xffffffffa0014000 [ 57.751815][ T3276] ? is_bpf_text_address+0x172/0x190 [ 57.768411][ T3245] device veth0_vlan entered promiscuous mode [ 57.805084][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 57.814968][ T3276] ? stack_trace_save+0x1c0/0x1c0 [ 57.823077][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.836184][ T3276] ? __kernel_text_address+0x9b/0x110 [ 57.862026][ T3276] ? unwind_get_return_address+0x4d/0x90 [ 57.871062][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.898670][ T3276] ? bpf_get_btf_vmlinux+0x60/0x60 [ 57.908957][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 57.922690][ T3276] ? arch_stack_walk+0xf3/0x140 [ 57.932988][ T3276] ? stack_trace_save+0x113/0x1c0 [ 57.938457][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 57.965558][ T3276] ? stack_trace_snprint+0xf0/0xf0 [ 57.981430][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 57.996182][ T3276] ? stack_trace_snprint+0xf0/0xf0 [ 58.009897][ T3276] ? __stack_depot_save+0x34/0x470 [ 58.019434][ T3245] device veth1_macvtap entered promiscuous mode [ 58.029031][ T639] device bridge_slave_1 left promiscuous mode [ 58.036093][ T639] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.047800][ T3276] ? ____kasan_kmalloc+0xed/0x110 [ 58.076980][ T3276] ? ____kasan_kmalloc+0xdb/0x110 [ 58.082813][ T639] device bridge_slave_0 left promiscuous mode [ 58.106397][ T3276] ? __kasan_kmalloc+0x9/0x10 [ 58.112676][ T639] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.123599][ T3276] ? kmem_cache_alloc_trace+0x115/0x210 [ 58.148204][ T639] device veth1_macvtap left promiscuous mode [ 58.154485][ T3276] ? selinux_bpf_prog_alloc+0x51/0x140 [ 58.159832][ T3276] ? security_bpf_prog_alloc+0x62/0x90 [ 58.165577][ T639] device veth0_vlan left promiscuous mode [ 58.191040][ T3276] ? bpf_prog_load+0x9ee/0x1b50 [ 58.207802][ T3276] ? __sys_bpf+0x4bc/0x760 [ 58.238690][ T3276] ? __x64_sys_bpf+0x7c/0x90 [ 58.246109][ T3276] ? x64_sys_call+0x87f/0x9a0 [ 58.284978][ T3276] ? do_syscall_64+0x3b/0xb0 [ 58.289436][ T3276] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 58.303213][ T3276] ? __kasan_kmalloc+0x9/0x10 [ 58.307931][ T3276] ? memset+0x35/0x40 [ 58.312135][ T3276] ? bpf_obj_name_cpy+0x196/0x1e0 [ 58.322153][ T3276] bpf_prog_load+0x12ac/0x1b50 [ 58.326871][ T3276] ? map_freeze+0x370/0x370 [ 58.331212][ T3276] ? selinux_bpf+0xcb/0x100 [ 58.335914][ T3276] ? security_bpf+0x82/0xb0 [ 58.342356][ T3276] __sys_bpf+0x4bc/0x760 [ 58.346448][ T3276] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 58.357937][ T3276] ? __kasan_check_write+0x14/0x20 [ 58.370695][ T3276] ? switch_fpu_return+0x15f/0x2e0 [ 58.376284][ T3276] __x64_sys_bpf+0x7c/0x90 [ 58.380717][ T3276] x64_sys_call+0x87f/0x9a0 [ 58.385534][ T3276] do_syscall_64+0x3b/0xb0 [ 58.392299][ T3276] ? clear_bhb_loop+0x35/0x90 [ 58.396826][ T3276] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 58.412483][ T3276] RIP: 0033:0x7fa2ba3a8819 [ 58.416766][ T3276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 58.437036][ T3276] RSP: 002b:00007fa2b8a21038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 58.446057][ T3276] RAX: ffffffffffffffda RBX: 00007fa2ba55ffa0 RCX: 00007fa2ba3a8819 [ 58.454271][ T3276] RDX: 0000000000000094 RSI: 0000000020000200 RDI: 0000000000000005 [ 58.463699][ T3276] RBP: 00007fa2ba41b75e R08: 0000000000000000 R09: 0000000000000000 [ 58.471641][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 58.487847][ T3276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 58.496732][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 58.505129][ T3276] R13: 0000000000000000 R14: 00007fa2ba55ffa0 R15: 00007fffb0f11408 [ 58.514300][ T3276] [ 58.517632][ T3276] ---[ end trace 39800bfa814c5c2e ]--- [ 58.525078][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 58.539567][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 58.571394][ T30] audit: type=1400 audit(1732105903.908:133): avc: denied { mounton } for pid=3245 comm="syz-executor" path="/root/syzkaller.ZTwvc4/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 58.610897][ T30] audit: type=1400 audit(1732105903.938:134): avc: denied { mount } for pid=3245 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 58.647191][ T30] audit: type=1400 audit(1732105903.938:135): avc: denied { mounton } for pid=3245 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 58.673539][ T30] audit: type=1400 audit(1732105903.978:136): avc: denied { create } for pid=3340 comm="syz.0.1366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 58.693262][ T30] audit: type=1400 audit(1732105903.978:137): avc: denied { write } for pid=3340 comm="syz.0.1366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 58.740753][ T30] audit: type=1400 audit(1732105903.978:138): avc: denied { read } for pid=3340 comm="syz.0.1366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 65.126032][ T3899] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 67.151442][ C1] sched: RT throttling activated [ 67.201664][ T3944] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 70.488721][ T4080] cgroup: fork rejected by pids controller in /syz3 [ 71.300159][ T4118] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.346248][ T4118] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.390285][ T4118] device bridge_slave_0 entered promiscuous mode [ 71.437919][ T4118] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.479258][ T4118] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.516674][ T4118] device bridge_slave_1 entered promiscuous mode [ 71.585556][ T639] device bridge_slave_1 left promiscuous mode [ 71.620422][ T639] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.676444][ T639] device bridge_slave_0 left promiscuous mode [ 71.800290][ T639] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.862408][ T639] device veth1_macvtap left promiscuous mode [ 71.887365][ T639] device veth0_vlan left promiscuous mode [ 72.450434][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.461938][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.472545][ T4166] cgroup: fork rejected by pids controller in /syz1 [ 72.522500][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.537758][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.555275][ T3286] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.562170][ T3286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.582950][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.591320][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.612902][ T3286] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.619780][ T3286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.648153][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.672405][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.700893][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.743595][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.757165][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.770763][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.785191][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.824555][ T4118] device veth0_vlan entered promiscuous mode [ 72.850349][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 72.874126][ T4118] device veth1_macvtap entered promiscuous mode [ 72.896528][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 72.904854][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 72.984208][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 73.180540][ T4196] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.194865][ T4196] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.248014][ T4196] device bridge_slave_0 entered promiscuous mode [ 73.262807][ T4196] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.352332][ T4196] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.398689][ T4196] device bridge_slave_1 entered promiscuous mode [ 73.889116][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.897973][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.920510][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 73.951067][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.963849][ T3286] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.970773][ T3286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.987667][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.005237][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.026433][ T3286] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.033363][ T3286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.082156][ T639] device bridge_slave_1 left promiscuous mode [ 74.111607][ T639] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.136894][ T639] device bridge_slave_0 left promiscuous mode [ 74.154117][ T639] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.177319][ T639] device veth1_macvtap left promiscuous mode [ 74.191737][ T639] device veth0_vlan left promiscuous mode [ 74.324218][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 74.356959][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 74.366697][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 74.387679][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 74.426890][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 74.439230][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 74.455722][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 74.479928][ T4196] device veth0_vlan entered promiscuous mode [ 74.512599][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 74.521206][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 74.539479][ T4196] device veth1_macvtap entered promiscuous mode [ 74.575306][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 74.592459][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 74.630033][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 74.654167][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 74.672105][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 75.398846][ T4367] syz.4.1881[4367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.398924][ T4367] syz.4.1881[4367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.285043][ T4402] device pim6reg1 entered promiscuous mode [ 77.212827][ T30] audit: type=1400 audit(1732105922.558:139): avc: denied { create } for pid=4508 comm="syz.1.1946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 78.068714][ T30] audit: type=1400 audit(1732105923.408:140): avc: denied { setopt } for pid=4531 comm="syz.0.1955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 78.582812][ T4587] device pim6reg1 entered promiscuous mode [ 78.719342][ T4612] syz.4.1993[4612] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.719418][ T4612] syz.4.1993[4612] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.122674][ T4635] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 79.863253][ T30] audit: type=1400 audit(1732105925.208:141): avc: denied { ioctl } for pid=4669 comm="syz.1.2018" path="net:[4026532372]" dev="nsfs" ino=4026532372 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.398338][ T4692] bridge0: port 3(veth0_to_batadv) entered blocking state [ 80.414280][ T4692] bridge0: port 3(veth0_to_batadv) entered disabled state [ 80.433432][ T4692] device veth0_to_batadv entered promiscuous mode [ 80.451659][ T4692] bridge0: port 3(veth0_to_batadv) entered blocking state [ 80.458632][ T4692] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 80.588559][ T4714] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x32 [ 81.629172][ T4792] syz.2.2077[4792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.629255][ T4792] syz.2.2077[4792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.312231][ T4847] device pim6reg1 entered promiscuous mode [ 87.223722][ T30] audit: type=1400 audit(1732105932.568:142): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 87.311500][ T30] audit: type=1400 audit(1732105932.568:143): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 87.920154][ T4918] device pim6reg1 entered promiscuous mode [ 87.969385][ T30] audit: type=1400 audit(1732105933.308:144): avc: denied { read write } for pid=4924 comm="syz.3.2134" name="cgroup.subtree_control" dev="cgroup2" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 88.052503][ T30] audit: type=1400 audit(1732105933.338:145): avc: denied { open } for pid=4924 comm="syz.3.2134" path="" dev="cgroup2" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 88.101999][ T30] audit: type=1400 audit(1732105933.338:146): avc: denied { ioctl } for pid=4924 comm="syz.3.2134" path="" dev="cgroup2" ino=236 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 89.226631][ T4979] bond_slave_1: mtu less than device minimum [ 93.480929][ T5040] device pim6reg1 entered promiscuous mode [ 96.515782][ T5145] device syzkaller0 entered promiscuous mode [ 97.523677][ T30] audit: type=1400 audit(1732105942.868:147): avc: denied { create } for pid=5223 comm="syz.2.2268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 101.166264][ T5494] syz.3.2398[5494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.166341][ T5494] syz.3.2398[5494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.457829][ T5574] syz.4.2434 (5574) used greatest stack depth: 19800 bytes left [ 103.154176][ T5648] device pim6reg1 entered promiscuous mode [ 103.766503][ T5683] device pim6reg1 entered promiscuous mode [ 104.505691][ T5736] device pim6reg1 entered promiscuous mode [ 104.845134][ T5771] device pim6reg1 entered promiscuous mode [ 106.154575][ T5849] device pim6reg1 entered promiscuous mode [ 107.775967][ T5900] device pim6reg1 entered promiscuous mode [ 107.826778][ T5909] device pim6reg1 entered promiscuous mode [ 108.304556][ T5922] syz.3.2603[5922] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.304636][ T5922] syz.3.2603[5922] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.146990][ T5980] device pim6reg1 entered promiscuous mode [ 412.901458][ T639] kworker/dying (639) used greatest stack depth: 19360 bytes left