last executing test programs: 1.216102267s ago: executing program 4 (id=8592): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x48, 0x94}, {0x6}]}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x4d, 0x0, 0x3}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 1.115109291s ago: executing program 4 (id=8598): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000180100006b6c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000178500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) 1.020941235s ago: executing program 4 (id=8601): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x9}, 0x3d) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000080)='signal_generate\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000f00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r2}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 967.923877ms ago: executing program 4 (id=8603): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4110, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x0, 0x0, r0, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x3) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x3) 853.276332ms ago: executing program 2 (id=8609): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x48, 0x94}, {0x6}]}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x4d, 0x0, 0x3}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 778.417325ms ago: executing program 4 (id=8610): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x14}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r2, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) 716.828888ms ago: executing program 1 (id=8614): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 710.682529ms ago: executing program 4 (id=8615): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x8}, 0x0, 0x1, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff8f, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3e, 0x0, 0x0, 0x10, 0xfffffffd}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) 696.78858ms ago: executing program 2 (id=8617): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1400000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="004000000200"], 0x50) 668.68488ms ago: executing program 1 (id=8618): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) close(r0) 580.962964ms ago: executing program 0 (id=8619): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) 435.34238ms ago: executing program 3 (id=8620): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x4, @perf_bp={0x0}, 0x10000, 0x8, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="09000000020000006d05000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200), &(0x7f00000004c0), 0x1000, r1, 0x0, 0x200000000000000}, 0x38) 429.055791ms ago: executing program 0 (id=8630): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000840)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r2}, &(0x7f00000008c0), &(0x7f0000000900)=r1}, 0x20) 427.909801ms ago: executing program 1 (id=8621): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) 286.447657ms ago: executing program 0 (id=8622): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x4, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) 216.18124ms ago: executing program 1 (id=8623): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) close(r2) 215.264001ms ago: executing program 2 (id=8624): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 155.631033ms ago: executing program 1 (id=8625): bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x9, 0x4, 0x2, 0x1, 0x0, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r0}, &(0x7f0000000480), &(0x7f00000004c0)=r1}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) 154.555733ms ago: executing program 2 (id=8626): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @call={0x85, 0x0, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x3}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000080), 0x0}, 0x20) 151.373673ms ago: executing program 3 (id=8627): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x58, 0x4, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, &(0x7f00000002c0), &(0x7f0000000340)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000000, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 93.369326ms ago: executing program 3 (id=8628): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) 93.196206ms ago: executing program 1 (id=8629): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x3c, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 93.026096ms ago: executing program 0 (id=8631): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x18, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x5e, 0x80, 0xf, 0x0, 0x0, 0x43, 0x77a24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x1, @perf_config_ext={0x8, 0x7e}, 0x1042, 0x1, 0x0, 0x6, 0xffffffffffffbbfe, 0x0, 0x41f, 0x0, 0xfffffffe, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 92.196696ms ago: executing program 2 (id=8632): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 69.447566ms ago: executing program 3 (id=8633): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed5de7e91cd360a136ce6203c23c00fe82000000000400875865969f7e7507018100000000001a8829"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="85020000ea000000a4f90ef4", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe8b}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)) 68.285567ms ago: executing program 0 (id=8634): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x48) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r2, 0x0, 0x20000000}, 0x20) 52.948077ms ago: executing program 3 (id=8635): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) 33.000308ms ago: executing program 2 (id=8636): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0x200000000000030e, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000}, 0x28) 21.720159ms ago: executing program 0 (id=8637): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000e27f000001"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000900), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x1308e, 0x8, 0x0, 0x0, 0x7, 0x7, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 0s ago: executing program 3 (id=8638): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) kernel console output (not intermixed with test programs): syzkaller syzkaller login: [ 21.474933][ T24] kauditd_printk_skb: 48 callbacks suppressed [ 21.474943][ T24] audit: type=1400 audit(1763707355.139:59): avc: denied { transition } for pid=259 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.479943][ T24] audit: type=1400 audit(1763707355.139:60): avc: denied { noatsecure } for pid=259 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.483284][ T24] audit: type=1400 audit(1763707355.139:61): avc: denied { write } for pid=259 comm="sh" path="pipe:[14403]" dev="pipefs" ino=14403 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 21.486719][ T24] audit: type=1400 audit(1763707355.139:62): avc: denied { rlimitinh } for pid=259 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.489679][ T24] audit: type=1400 audit(1763707355.139:63): avc: denied { siginh } for pid=259 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.134' (ED25519) to the list of known hosts. [ 27.982655][ T24] audit: type=1400 audit(1763707361.639:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.983795][ T267] cgroup: Unknown subsys name 'net' [ 28.005387][ T24] audit: type=1400 audit(1763707361.649:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.032685][ T24] audit: type=1400 audit(1763707361.679:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.033045][ T267] cgroup: Unknown subsys name 'devices' [ 28.174532][ T267] cgroup: Unknown subsys name 'hugetlb' [ 28.180354][ T267] cgroup: Unknown subsys name 'rlimit' [ 28.407294][ T24] audit: type=1400 audit(1763707362.069:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.430591][ T24] audit: type=1400 audit(1763707362.069:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.455293][ T24] audit: type=1400 audit(1763707362.069:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 28.482335][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 28.491780][ T24] audit: type=1400 audit(1763707362.149:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.517555][ T24] audit: type=1400 audit(1763707362.149:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.544128][ T24] audit: type=1400 audit(1763707362.209:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.570158][ T24] audit: type=1400 audit(1763707362.209:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.570199][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.968256][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.976791][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.984243][ T275] device bridge_slave_0 entered promiscuous mode [ 28.991977][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.999314][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.006693][ T275] device bridge_slave_1 entered promiscuous mode [ 29.034463][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.041508][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.049033][ T276] device bridge_slave_0 entered promiscuous mode [ 29.063317][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.070360][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.077746][ T276] device bridge_slave_1 entered promiscuous mode [ 29.158580][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.165723][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.173758][ T281] device bridge_slave_0 entered promiscuous mode [ 29.181501][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.188673][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.196313][ T281] device bridge_slave_1 entered promiscuous mode [ 29.255463][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.262513][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.270086][ T282] device bridge_slave_0 entered promiscuous mode [ 29.277674][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.284842][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.292206][ T282] device bridge_slave_1 entered promiscuous mode [ 29.315191][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.322246][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.329888][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.336935][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.349551][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.356633][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.364004][ T279] device bridge_slave_0 entered promiscuous mode [ 29.371058][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.378576][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.386016][ T279] device bridge_slave_1 entered promiscuous mode [ 29.396636][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.403705][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.410947][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.418076][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.497648][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.504839][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.512085][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.519123][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.527341][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.534391][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.541640][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.548676][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.581702][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.588893][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.596063][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.604596][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.612759][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.621571][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.629558][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.637903][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.646370][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.653581][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.661036][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.668490][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.675994][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.683592][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.706243][ T276] device veth0_vlan entered promiscuous mode [ 29.715358][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.723584][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.732107][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.739160][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.746914][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.755085][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.762113][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.769586][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.777880][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.785049][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.792395][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.800568][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.808627][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.816758][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.824416][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.838757][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.847101][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.854220][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.876875][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.884777][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.893207][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.901171][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.909192][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.916873][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.925040][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.932044][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.939506][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.947637][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.954672][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.962886][ T275] device veth0_vlan entered promiscuous mode [ 29.971525][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.979793][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.995649][ T275] device veth1_macvtap entered promiscuous mode [ 30.006346][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.014503][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.022569][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.031169][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.039413][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.047707][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.055757][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.063714][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.071656][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.080666][ T276] device veth1_macvtap entered promiscuous mode [ 30.098676][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.106456][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.114863][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.123646][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.131758][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.139818][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.148259][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.166006][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.174543][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.182788][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.191133][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.210665][ T275] request_module fs-gadgetfs succeeded, but still no fs? [ 30.221664][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.229437][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.237468][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.245928][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.254519][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.262758][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.276941][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 30.291844][ T279] device veth0_vlan entered promiscuous mode [ 30.300256][ T281] device veth0_vlan entered promiscuous mode [ 30.316003][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.324525][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.332771][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.339864][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.348248][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.357191][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.365512][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.372766][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.380179][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.388627][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.396777][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.404862][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.413230][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.421716][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.430116][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.438175][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.446902][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.455047][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.463318][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.471356][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.481451][ T282] device veth0_vlan entered promiscuous mode [ 30.499134][ T281] device veth1_macvtap entered promiscuous mode [ 30.524613][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.532491][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.545215][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.554951][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.562562][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.574135][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.581731][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.590575][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.600373][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.612174][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.620594][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.629225][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.638063][ T279] device veth1_macvtap entered promiscuous mode [ 30.652224][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.660802][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.669850][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.685193][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.694226][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.735763][ T282] device veth1_macvtap entered promiscuous mode [ 30.744830][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.773332][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.789171][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.825829][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.841525][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.863889][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.887855][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.912288][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.925239][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.934254][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.950587][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.612340][ T24] kauditd_printk_skb: 38 callbacks suppressed [ 33.612349][ T24] audit: type=1400 audit(1763707367.269:112): avc: denied { create } for pid=1020 comm="syz.4.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 33.700951][ T24] audit: type=1400 audit(1763707367.309:113): avc: denied { write } for pid=1023 comm="syz.0.360" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 33.737708][ T24] audit: type=1400 audit(1763707367.309:114): avc: denied { open } for pid=1023 comm="syz.0.360" path="/dev/ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 34.155693][ T24] audit: type=1400 audit(1763707367.819:115): avc: denied { create } for pid=1117 comm="syz.3.405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 34.553270][ T24] audit: type=1400 audit(1763707368.219:116): avc: denied { create } for pid=1205 comm="syz.4.449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 37.599317][ T1828] cgroup: syz.3.759 (1828) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 37.626269][ T1828] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 38.451351][ T24] audit: type=1400 audit(1763707372.109:117): avc: denied { create } for pid=2030 comm="syz.0.859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 38.625507][ T24] audit: type=1400 audit(1763707372.289:118): avc: denied { create } for pid=2067 comm="syz.4.878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 38.725296][ T24] audit: type=1400 audit(1763707372.389:119): avc: denied { create } for pid=2092 comm="syz.3.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 39.352156][ T24] audit: type=1400 audit(1763707373.009:120): avc: denied { create } for pid=2219 comm="syz.2.954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 40.439272][ T24] audit: type=1400 audit(1763707374.099:121): avc: denied { create } for pid=2397 comm="syz.0.1043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 40.675927][ T24] audit: type=1400 audit(1763707374.339:122): avc: denied { create } for pid=2435 comm="syz.1.1062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 40.768788][ T24] audit: type=1400 audit(1763707374.429:123): avc: denied { create } for pid=2448 comm="syz.1.1068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 42.249864][ T24] audit: type=1400 audit(1763707375.909:124): avc: denied { create } for pid=2771 comm="syz.2.1230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 42.441147][ T24] audit: type=1400 audit(1763707376.099:125): avc: denied { create } for pid=2807 comm="syz.2.1247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 42.534908][ T24] audit: type=1400 audit(1763707376.199:126): avc: denied { create } for pid=2823 comm="syz.4.1255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 43.363391][ T24] audit: type=1400 audit(1763707377.029:127): avc: denied { create } for pid=3008 comm="syz.3.1347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 43.513723][ T3029] syz.1.1357 uses obsolete (PF_INET,SOCK_PACKET) [ 43.761807][ T24] kauditd_printk_skb: 1 callbacks suppressed [ 43.761818][ T24] audit: type=1400 audit(1763707377.419:129): avc: denied { create } for pid=3079 comm="syz.3.1382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 43.963717][ T24] audit: type=1400 audit(1763707377.629:130): avc: denied { create } for pid=3111 comm="syz.4.1397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 44.700558][ T24] audit: type=1400 audit(1763707378.359:131): avc: denied { create } for pid=3240 comm="syz.0.1462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 45.529416][ T24] audit: type=1400 audit(1763707379.189:132): avc: denied { create } for pid=3405 comm="syz.0.1550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 45.853662][ T24] audit: type=1400 audit(1763707379.519:133): avc: denied { create } for pid=3477 comm="syz.2.1580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 45.968717][ T24] audit: type=1400 audit(1763707379.629:134): avc: denied { create } for pid=3489 comm="syz.1.1585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 47.484631][ T24] audit: type=1400 audit(1763707381.149:135): avc: denied { create } for pid=3789 comm="syz.1.1735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 47.861489][ T24] audit: type=1400 audit(1763707381.519:136): avc: denied { create } for pid=3871 comm="syz.3.1772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 48.027441][ T24] audit: type=1400 audit(1763707381.689:137): avc: denied { create } for pid=3908 comm="syz.3.1792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 48.059694][ T24] audit: type=1400 audit(1763707381.709:138): avc: denied { write } for pid=3910 comm="syz.2.1794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 48.502854][ C0] hrtimer: interrupt took 26631 ns [ 48.517843][ T3989] syz.4.1830[3989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.517896][ T3989] syz.4.1830[3989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.127341][ T24] kauditd_printk_skb: 2 callbacks suppressed [ 49.127351][ T24] audit: type=1400 audit(1763707382.789:141): avc: denied { write } for pid=4052 comm="syz.2.1858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 49.412621][ T4111] device veth1_macvtap left promiscuous mode [ 49.986120][ T24] audit: type=1400 audit(1763707383.649:142): avc: denied { ioctl } for pid=4217 comm="syz.3.1938" path="/dev/ppp" dev="devtmpfs" ino=153 ioctlcmd=0x7438 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 50.178610][ T24] audit: type=1400 audit(1763707383.839:143): avc: denied { setattr } for pid=4251 comm="syz.2.1954" path="/dev/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 51.477448][ T24] audit: type=1400 audit(1763707385.139:144): avc: denied { ioctl } for pid=4365 comm="syz.0.2005" path="socket:[27284]" dev="sockfs" ino=27284 ioctlcmd=0x8970 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 51.514954][ T4374] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 51.677399][ T4407] device veth1_macvtap left promiscuous mode [ 51.687399][ T4407] device macsec0 entered promiscuous mode [ 51.933594][ T24] audit: type=1400 audit(1763707385.599:145): avc: denied { create } for pid=4449 comm="syz.2.2045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 52.007657][ T24] audit: type=1400 audit(1763707385.669:146): avc: denied { create } for pid=4458 comm="syz.4.2051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 53.397344][ T4610] ------------[ cut here ]------------ [ 53.402888][ T4610] trace type BPF program uses run-time allocation [ 53.415729][ T4610] WARNING: CPU: 0 PID: 4610 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 53.453808][ T4610] Modules linked in: [ 53.466915][ T4610] CPU: 0 PID: 4610 Comm: syz.2.2120 Not tainted syzkaller #0 [ 53.491209][ T4610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 53.532076][ T4610] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 53.564272][ T4610] Code: 85 e9 14 fe ff ff e8 69 fa ef ff 31 c0 e9 15 fe ff ff e8 5d fa ef ff c6 05 34 d5 2c 05 01 48 c7 c7 a0 80 05 85 e8 ba df fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 53.626666][ T4610] RSP: 0018:ffffc90000f7f468 EFLAGS: 00010246 [ 53.632818][ T4610] RAX: f0adaf5bcdab9a00 RBX: 0000000000000001 RCX: 0000000000080000 [ 53.709911][ T4610] RDX: ffffc90002ce1000 RSI: 0000000000002c4e RDI: 0000000000002c4f [ 53.718126][ T4610] RBP: ffffc90000f7f4b0 R08: dffffc0000000000 R09: ffffed103ee0a5f8 [ 53.726343][ T4610] R10: ffffed103ee0a5f8 R11: 1ffff1103ee0a5f7 R12: ffff8881122c0000 [ 53.740061][ T4610] R13: 0000000000000002 R14: dffffc0000000000 R15: ffff88810a8e2800 [ 53.748125][ T4610] FS: 00007f8f2fc6e6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 53.763333][ T4610] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.769987][ T4610] CR2: 00007ffc3b1acf98 CR3: 00000001166c5000 CR4: 00000000003506a0 [ 53.779056][ T4610] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 53.787401][ T4610] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 53.795678][ T4610] Call Trace: [ 53.799004][ T4610] ? __fdget+0x1a1/0x230 [ 53.803524][ T4610] resolve_pseudo_ldimm64+0x526/0x1020 [ 53.809019][ T4610] ? bpf_check+0xd680/0xd680 [ 53.813790][ T4610] ? kvmalloc_node+0x88/0x130 [ 53.818506][ T4610] bpf_check+0x8d4b/0xd680 [ 53.823180][ T4610] ? bpf_get_btf_vmlinux+0x60/0x60 [ 53.832474][ T4610] ? is_bpf_text_address+0x177/0x190 [ 53.838145][ T4610] ? selinux_bpf_prog_alloc+0x51/0x140 [ 53.843823][ T4610] ? __kernel_text_address+0xa0/0x100 [ 53.849414][ T4610] ? unwind_get_return_address+0x4d/0x90 [ 53.855812][ T4610] ? stack_trace_save+0xe0/0xe0 [ 53.860771][ T4610] ? arch_stack_walk+0xee/0x140 [ 53.866118][ T4610] ? stack_trace_save+0x98/0xe0 [ 53.871026][ T4610] ? stack_trace_snprint+0xf0/0xf0 [ 53.876339][ T4610] ? __kasan_slab_alloc+0x69/0xf0 [ 53.881498][ T4610] ? selinux_bpf_prog_alloc+0x51/0x140 [ 53.887345][ T4610] ? __kasan_kmalloc+0xec/0x110 [ 53.892234][ T4610] ? __kasan_kmalloc+0xda/0x110 [ 53.897308][ T4610] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 53.903254][ T4610] ? selinux_bpf_prog_alloc+0x51/0x140 [ 53.908983][ T4610] ? security_bpf_prog_alloc+0x62/0x90 [ 53.914708][ T4610] ? bpf_prog_load+0x949/0x1420 [ 53.920640][ T4610] ? __se_sys_bpf+0x442/0x680 [ 53.925598][ T4610] ? __x64_sys_bpf+0x7b/0x90 [ 53.930314][ T4610] ? do_syscall_64+0x31/0x40 [ 53.935489][ T4610] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 53.941625][ T4610] ? memset+0x35/0x40 [ 53.945867][ T4610] ? bpf_obj_name_cpy+0x193/0x1e0 [ 53.951145][ T4610] bpf_prog_load+0xf5a/0x1420 [ 53.956048][ T4610] ? map_freeze+0x320/0x320 [ 53.960606][ T4610] ? selinux_bpf+0xc7/0xf0 [ 53.965340][ T4610] ? security_bpf+0x82/0xa0 [ 53.970097][ T4610] __se_sys_bpf+0x442/0x680 [ 53.974810][ T4610] ? __x64_sys_bpf+0x90/0x90 [ 53.979486][ T4610] ? __kasan_check_read+0x11/0x20 [ 53.984861][ T4610] __x64_sys_bpf+0x7b/0x90 [ 53.990580][ T4610] do_syscall_64+0x31/0x40 [ 53.995304][ T4610] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 54.001270][ T4610] RIP: 0033:0x7f8f31206749 [ 54.005884][ T4610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 54.025808][ T4610] RSP: 002b:00007f8f2fc6e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 54.034789][ T4610] RAX: ffffffffffffffda RBX: 00007f8f3145cfa0 RCX: 00007f8f31206749 [ 54.043124][ T4610] RDX: 0000000000000080 RSI: 0000200000000440 RDI: 0000000000000005 [ 54.051248][ T4610] RBP: 00007f8f3128af91 R08: 0000000000000000 R09: 0000000000000000 [ 54.059882][ T4610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 54.069447][ T4610] R13: 00007f8f3145d038 R14: 00007f8f3145cfa0 R15: 00007fff40e1fdb8 [ 54.078464][ T4610] ---[ end trace a7879376695087fb ]--- [ 55.064252][ T4745] @ÿ: renamed from bond_slave_0 [ 55.180418][ T4767] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.187678][ T4767] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.475111][ T24] audit: type=1400 audit(1763707389.139:147): avc: denied { ioctl } for pid=4812 comm="syz.3.2219" path="pid:[4026532544]" dev="nsfs" ino=4026532544 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 56.775675][ T4904] @0Ù: renamed from bond_slave_1 [ 56.953777][ T4945] ÿ: renamed from team_slave_1 [ 57.355231][ T24] audit: type=1400 audit(1763707391.019:148): avc: denied { read } for pid=5012 comm="syz.0.2316" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 58.334266][ T5094] A6±ÿ: renamed from team_slave_1 [ 59.012421][ T24] audit: type=1400 audit(1763707392.669:149): avc: denied { create } for pid=5189 comm="syz.3.2404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 60.221852][ T5347] ÿ: renamed from bond_slave_0 [ 64.099731][ T5692] device bridge_slave_1 left promiscuous mode [ 64.133138][ T5692] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.183392][ T5692] device bridge_slave_0 left promiscuous mode [ 64.230690][ T5692] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.488112][ T5912] device dummy0 entered promiscuous mode [ 68.729175][ T6132] ªªªªªª: renamed from vlan0 [ 70.158671][ T6304] lo: mtu less than device minimum [ 71.229769][ T6374] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.422197][ T6601] device lo entered promiscuous mode [ 73.463262][ T6601] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 75.978971][ T6904] device xfrm0 entered promiscuous mode [ 79.138316][ T7251] device vlan0 entered promiscuous mode [ 81.727162][ T7525] syz.0.3543 (7525) used obsolete PPPIOCDETACH ioctl [ 83.242776][ T7614] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 83.844653][ T7649] sock: sock_set_timeout: `syz.4.3602' (pid 7649) tries to set negative timeout [ 85.324740][ T24] audit: type=1400 audit(1763707418.989:150): avc: denied { associate } for pid=7741 comm="syz.1.3648" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 85.911524][ T7812] device dummy0 entered promiscuous mode [ 95.520740][ T8404] device vlan0 left promiscuous mode [ 99.915613][ T8704] device bridge0 entered promiscuous mode [ 100.838237][ T24] audit: type=1400 audit(1763707434.499:151): avc: denied { read } for pid=8769 comm="syz.4.4133" dev="nsfs" ino=4026532458 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 100.870675][ T24] audit: type=1400 audit(1763707434.499:152): avc: denied { open } for pid=8769 comm="syz.4.4133" path="mnt:[4026532458]" dev="nsfs" ino=4026532458 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 110.339546][ T9363] device macsec0 entered promiscuous mode [ 111.823960][ T9519] ref_ctr_offset mismatch. inode: 0x1248 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 113.317405][ T24] audit: type=1400 audit(1763707446.979:153): avc: denied { create } for pid=9629 comm="syz.2.4548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 114.167659][ T24] audit: type=1400 audit(1763707447.829:154): avc: denied { ioctl } for pid=9712 comm="syz.2.4588" path="uts:[4026532543]" dev="nsfs" ino=4026532543 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 114.244446][ T9721] sit0: mtu less than device minimum [ 117.651002][ T9985] sock: sock_set_timeout: `syz.4.4717' (pid 9985) tries to set negative timeout [ 120.589963][T10259] bridge0: port 3(veth0) entered blocking state [ 120.648093][T10259] bridge0: port 3(veth0) entered disabled state [ 120.699873][T10259] device veth0 entered promiscuous mode [ 120.746224][T10259] bridge0: port 3(veth0) entered blocking state [ 120.752536][T10259] bridge0: port 3(veth0) entered forwarding state [ 124.754525][T10431] tap0: tun_chr_ioctl cmd 1074025677 [ 124.763322][T10431] tap0: linktype set to 769 [ 125.117867][T10460] device lo left promiscuous mode [ 125.182089][T10460] device lo entered promiscuous mode [ 125.239878][T10460] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 126.259828][T10545] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 126.271616][T10545] syzkaller0: linktype set to 773 [ 126.309069][T10549] syz.0.4979[10549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.309127][T10549] syz.0.4979[10549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.266131][ T24] audit: type=1400 audit(1763707460.929:155): avc: denied { write } for pid=10640 comm="syz.1.5015" name="cgroup.subtree_control" dev="cgroup2" ino=281 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 127.356109][ T24] audit: type=1400 audit(1763707460.929:156): avc: denied { open } for pid=10640 comm="syz.1.5015" path="" dev="cgroup2" ino=281 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 128.112184][T10686] pimreg: tun_chr_ioctl cmd 2147767507 [ 132.432149][T10903] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 132.528351][T10903] syzkaller0: persist disabled [ 132.808805][T10931] tap0: tun_chr_ioctl cmd 2147767521 [ 134.315676][ T24] audit: type=1400 audit(1763707467.979:157): avc: denied { create } for pid=11110 comm="syz.4.5229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 135.709978][T11211] syz.0.5275[11211] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.710035][T11211] syz.0.5275[11211] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.124814][T11311] syz.1.5318[11311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.168044][T11311] syz.1.5318[11311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.398656][T11439] tap0: tun_chr_ioctl cmd 1074025677 [ 139.450986][T11439] tap0: linktype set to 780 [ 140.723222][ T24] audit: type=1400 audit(1763707474.389:158): avc: denied { attach_queue } for pid=11577 comm="syz.0.5432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 140.852404][T11586] tap0: tun_chr_ioctl cmd 1074025681 [ 141.662951][T11671] gretap0: refused to change device tx_queue_len [ 141.759741][T11677] tap0: tun_chr_ioctl cmd 1074025677 [ 141.786870][T11677] tap0: linktype set to 24 [ 144.389388][T11875] geneve1: tun_chr_ioctl cmd 1074812117 [ 144.488767][T11884] pimreg: tun_chr_ioctl cmd 1074025677 [ 144.504521][T11884] pimreg: linktype set to 6 [ 145.474267][T11992] syz.1.5620[11992] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.474323][T11992] syz.1.5620[11992] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.545434][T12357] geneve1: tun_chr_ioctl cmd 1074025672 [ 150.563210][T12357] geneve1: ignored: set checksum enabled [ 151.379667][T12399] tap0: tun_chr_ioctl cmd 1074025680 [ 151.620804][T12405] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 151.693090][T12405] syzkaller0: linktype set to 0 [ 153.124111][T12565] tun0: tun_chr_ioctl cmd 1074025676 [ 153.141042][T12565] tun0: owner set to 0 [ 154.517439][T12711] tun0: tun_chr_ioctl cmd 1074025681 [ 155.305116][T12778] tap0: tun_chr_ioctl cmd 1074025673 [ 155.912755][T12857] tap0: tun_chr_ioctl cmd 2148553947 [ 157.724688][T13045] dvmrp1: tun_chr_ioctl cmd 1074812117 [ 158.369084][T13152] device veth0_vlan left promiscuous mode [ 158.376439][T13152] device veth0_vlan entered promiscuous mode [ 158.702252][T13204] tun1: tun_chr_ioctl cmd 1074812118 [ 158.725723][T13206] syzkaller1: tun_chr_ioctl cmd 21731 [ 161.651202][T13398] tun0: tun_chr_ioctl cmd 1074025678 [ 161.682841][T13398] tun0: group set to 1 [ 161.821132][ T24] audit: type=1400 audit(1763707495.479:159): avc: denied { create } for pid=13410 comm="syz.2.6270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 162.514489][T13453] device pim6reg1 entered promiscuous mode [ 164.398999][T13585] device wg2 entered promiscuous mode [ 164.648925][T13606] device veth0_vlan left promiscuous mode [ 164.711598][T13606] device veth0_vlan entered promiscuous mode [ 164.784790][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 164.807598][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 164.866133][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.312277][T13707] device veth0_vlan left promiscuous mode [ 166.356100][T13707] device veth0_vlan entered promiscuous mode [ 166.448837][ T24] audit: type=1400 audit(1763707500.109:160): avc: denied { relabelfrom } for pid=13723 comm="syz.2.6409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 166.485359][ T24] audit: type=1400 audit(1763707500.109:161): avc: denied { relabelto } for pid=13723 comm="syz.2.6409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 166.700152][T13756] device veth0_vlan left promiscuous mode [ 166.706841][T13756] device veth0_vlan entered promiscuous mode [ 166.737188][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 168.326899][T13849] device veth0_vlan left promiscuous mode [ 168.343338][T13849] device veth0_vlan entered promiscuous mode [ 168.353147][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 168.393595][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 168.459906][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 169.975394][T13976] batadv0: tun_chr_ioctl cmd 2147767511 [ 171.319189][ T24] audit: type=1400 audit(1763707504.979:162): avc: denied { ioctl } for pid=14099 comm="syz.3.6587" path="" dev="cgroup2" ino=185 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 174.507640][T14341] pimreg: tun_chr_ioctl cmd 1074025677 [ 174.513292][T14341] pimreg: linktype set to 270 [ 174.518509][T14341] pimreg: tun_chr_ioctl cmd 2147767506 [ 176.030968][ T94] udevd[94]: worker [1333] terminated by signal 33 (Unknown signal 33) [ 176.144494][ T94] udevd[94]: worker [1333] failed while handling '/devices/virtual/block/loop0' [ 179.459864][T14716] syzkaller1: tun_chr_ioctl cmd 21731 [ 179.465810][T14716] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 180.935364][T14808] cgroup: fork rejected by pids controller in /syz1 [ 181.898318][T14844] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.913811][T14844] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.921610][T14844] device bridge_slave_0 entered promiscuous mode [ 181.929019][T14844] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.936330][T14844] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.943979][T14844] device bridge_slave_1 entered promiscuous mode [ 182.001936][ T24] audit: type=1400 audit(1763707515.659:163): avc: denied { write } for pid=14844 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 182.023311][ T24] audit: type=1400 audit(1763707515.689:164): avc: denied { read } for pid=14844 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 182.048872][T14844] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.055955][T14844] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.063238][T14844] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.070442][T14844] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.108277][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.262786][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.274503][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.323364][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.341255][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.348358][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.393631][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.414960][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.422062][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.481374][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.510105][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.614883][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 182.717698][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.772310][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.863451][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.979230][T14844] device veth0_vlan entered promiscuous mode [ 183.048676][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 183.088723][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 183.123590][T14844] device veth1_macvtap entered promiscuous mode [ 183.161910][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 183.175892][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 183.286480][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 183.353254][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 183.383633][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 183.430860][T14929] device veth1_macvtap left promiscuous mode [ 183.446072][T14929] device macsec0 entered promiscuous mode [ 184.274216][ T6375] device bridge_slave_1 left promiscuous mode [ 184.289482][ T6375] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.393010][ T6375] device bridge_slave_0 left promiscuous mode [ 184.406332][ T6375] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.749442][T15339] device sit0 entered promiscuous mode [ 190.944883][T15485] device sit0 entered promiscuous mode [ 195.300720][T15751] device pim6reg1 entered promiscuous mode [ 195.438141][T15767] device pim6reg1 entered promiscuous mode [ 205.304409][T16539] syz.2.7697[16539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.304498][T16539] syz.2.7697[16539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.877077][T16726] device veth1_macvtap left promiscuous mode [ 206.992864][T16726] device macsec0 entered promiscuous mode [ 208.501126][T16833] tap0: tun_chr_ioctl cmd 1074025675 [ 208.517439][T16833] tap0: persist enabled [ 208.521894][T16833] tap0: tun_chr_ioctl cmd 1074025675 [ 208.532836][T16833] tap0: persist disabled [ 209.690732][T16898] device veth1_macvtap left promiscuous mode [ 209.711760][T16898] device macsec0 entered promiscuous mode [ 211.377680][T17054] device pim6reg1 entered promiscuous mode [ 217.291367][ T24] audit: type=1400 audit(1763707550.949:165): avc: denied { append } for pid=17425 comm="syz.4.8094" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 225.122339][T17944] bridge0: port 3(dummy0) entered blocking state [ 225.150237][T17944] bridge0: port 3(dummy0) entered disabled state [ 225.159596][T17944] bridge0: port 3(dummy0) entered blocking state [ 225.166016][T17944] bridge0: port 3(dummy0) entered forwarding state [ 226.065589][T17982] Â: renamed from pim6reg1 [ 233.738332][T18162] cgroup: fork rejected by pids controller in /syz4 [ 234.742093][T18191] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.749661][T18191] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.758564][T18191] device bridge_slave_0 entered promiscuous mode [ 234.779875][T18191] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.788587][T18191] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.796898][T18191] device bridge_slave_1 entered promiscuous mode [ 234.870666][T18227] tap0: tun_chr_ioctl cmd 35092 [ 234.967708][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.005211][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.150075][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.261874][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.401719][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.408835][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.576483][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.657984][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.708163][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.715264][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.775737][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.786656][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.797802][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.844661][T18191] device veth0_vlan entered promiscuous mode [ 235.859517][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 235.874098][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.882612][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.890561][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.917222][T18191] device veth1_macvtap entered promiscuous mode [ 235.932537][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 235.949711][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 235.958318][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 235.996710][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 236.005334][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 236.014248][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 236.022565][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 236.040726][ T6375] bridge0: port 3(dummy0) entered disabled state [ 236.062947][ T6375] device bridge_slave_1 left promiscuous mode [ 236.074007][ T6375] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.084666][ T6375] device bridge_slave_0 left promiscuous mode [ 236.090839][ T6375] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.119073][ T6375] device veth0_vlan left promiscuous mode [ 236.426737][T18327] cgroup: fork rejected by pids controller in /syz0 [ 237.280575][T18355] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.351237][T18355] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.408140][T18355] device bridge_slave_0 entered promiscuous mode [ 237.465692][T18355] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.533201][T18355] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.615284][T18355] device bridge_slave_1 entered promiscuous mode [ 238.594518][ T6375] device veth0 left promiscuous mode [ 238.599906][ T6375] bridge0: port 3(veth0) entered disabled state [ 238.653315][ T6375] device bridge_slave_1 left promiscuous mode [ 238.659781][ T6375] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.753175][ T6375] device bridge_slave_0 left promiscuous mode [ 238.759634][ T6375] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.833672][ T6375] device veth0_vlan left promiscuous mode [ 240.902160][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.909979][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.942800][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.971311][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.979889][ T6375] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.987070][ T6375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.994698][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.003412][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.012423][ T6375] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.019504][ T6375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.027301][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 241.036224][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.046748][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 241.078691][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 241.087229][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.114999][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 241.124052][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 241.192817][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 241.201000][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.275379][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.303318][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.604088][T18355] device veth0_vlan entered promiscuous mode [ 241.633656][ T6375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 241.653561][T18355] device veth1_macvtap entered promiscuous mode [ 241.713438][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 241.735945][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 241.775258][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 241.842187][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 245.122214][T18575] €Â0: renamed from pim6reg1