last executing test programs: 3.433990513s ago: executing program 0 (id=10840): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000540), &(0x7f0000000580)=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r0, &(0x7f0000000780)}, 0x20) 3.410538724s ago: executing program 0 (id=10841): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0xd, 0x4, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r2}, &(0x7f0000000240), &(0x7f0000000280)=r0}, 0x20) 3.364378485s ago: executing program 0 (id=10844): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='module_request\x00', r1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) 3.334982635s ago: executing program 0 (id=10845): perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x33) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000dc0)={{r0, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f00000000c0)='%pI4 \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b70800000000e1ff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r2, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.00531512s ago: executing program 0 (id=10850): perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 828.875944ms ago: executing program 0 (id=10857): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)="c7", 0x1}], 0x1}, 0x24048811) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) recvmsg$unix(r0, &(0x7f00000009c0)={0x0, 0x0, 0x0}, 0x2000) 624.080157ms ago: executing program 3 (id=10865): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x1c092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0xb3e, 0xfffffffffffffff8}, 0x840, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 563.149758ms ago: executing program 3 (id=10870): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(r0, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd4e}], 0x1}, 0x0) 549.512439ms ago: executing program 3 (id=10872): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 508.89063ms ago: executing program 1 (id=10876): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) 489.24604ms ago: executing program 1 (id=10878): perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x702, 0xe, 0x700, &(0x7f0000000540)="e460334470b8d480eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 488.83229ms ago: executing program 3 (id=10888): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) 474.948281ms ago: executing program 4 (id=10879): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 438.927171ms ago: executing program 3 (id=10881): perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x10000, 0x808, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) 371.067983ms ago: executing program 2 (id=10882): syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000180000002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000580)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000004c0)={r1, 0x3, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x44) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000004c0)={r0, 0x3, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x44) 360.640013ms ago: executing program 1 (id=10883): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) close(r1) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) 315.950433ms ago: executing program 2 (id=10884): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 305.634654ms ago: executing program 4 (id=10885): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0xffffffff}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7d}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r0}, 0x18) syz_clone(0x500, 0x0, 0x0, 0x0, 0x0, 0x0) 240.486775ms ago: executing program 4 (id=10886): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00010400001d00000000000081000000", @ANYRES32], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 197.716256ms ago: executing program 4 (id=10887): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x18) syz_clone(0x500, 0x0, 0x0, 0x0, 0x0, 0x0) 197.253356ms ago: executing program 1 (id=10898): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[], 0xffdd) 145.102327ms ago: executing program 2 (id=10889): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r1}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 106.923438ms ago: executing program 1 (id=10890): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000003c0)=0x4000000000001000, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) mkdirat$cgroup(r0, &(0x7f00000002c0)='syz1\x00', 0x1ff) 100.563358ms ago: executing program 2 (id=10891): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) 88.681388ms ago: executing program 4 (id=10892): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r1}, 0xc) 88.189528ms ago: executing program 3 (id=10893): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x40000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r1}, 0x10) syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) 70.766498ms ago: executing program 2 (id=10894): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x4}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) 57.478719ms ago: executing program 2 (id=10895): perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff2300000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001010404000011000000b7030000000000006a0a00fe000000008500000032000000b700000001000000950000000000000075cdc4b57b0c65752a3ad50000007ddd0000cb450063dedba767ade51f7f1f66acd19100002000000000000000ff7f0000b52f17cee19d0001000000000000000000cb04fcbb4e4d0b9bafe3ba431351a58a885ba9918d37b056b9bbd11b6b9f6cf7db6d574620260000000000008062d77e85cef4a2ab938f65aac33c4d620de2c9b7dc10d7d313f9f57606b83b994fc4051ade12f41deff6df6a936b4ec3827c739bb39aad16cc75fe369258673b5df11cc2afb53611cc32a790bc0b80e80eae8f5e64be2c9d2d29db3d36dd0cf8f79a015c7bd3f15aa6aadbeab2a01685108e61aa00000000000000000000000000c67c6c6a06e828e5216f601b19db1af1b5d356d0f062137d866d11be4ba3f0151fdbbd4e97d62ecc645e143a60f10800000000000000826151e3b42bcae95239ef5ca2a730a00c87c493db0300e63fda97a296820000000001000000eecc952a3fd2c46f3c1cde71a19d1a2982492a210e00d2bfea3b8d188df2eff8d56aaae7d32a2e180022537395019f02ec4b85f6aad7faca088de9b26797a8446b16c28d85f225992dbdd5bb01ba51508951c7a7d6ca0916c3a12912715649c2b1c7192a4251b59d378d3f00000000000000665c8b7e89eddfc3783f6c9129a7c5f8ee5f50579e2f638f7eb12f63be72a3d81ab324d6e417b1c2cbfdcada0a16e31790e26cf19588a7e0496ee2782224cf30f810da86cf1a3204f4c9404f5d7321a4fefc4d1c9139ca4b65b99909950000006b42077ca60fdecb2717e21f8f187b1866108b6e8c71e2603217606637ece1fa89917e131f4034a8383e99c3568fd04201b37cd92ca6ebf94a2d8310f7032775cfd75652f87b039d5430b3c6643e9146d2478ce31344b554aca7670000000000000010c65608fda6ed5d08e7a796042aa127d874105787d0347aa37801faff5b9050803a19ff6205aa5c263e407a2f7de56f7a0000e094fa4e3f05528caab5a430c08dd810bc97204b767dd969721a26aa740000000000bc433fe2d0a6ef2a8a91cd3cb305aa80dadef8b0caca780000000000000000863e21db415a222bb1a7ab94bfe4a74157d794f9d0430c2c0eb563350559829865a3dd08fb31bd0801e09aa3ee45e61a56fc83076451cff7632e49a41eadb5044a0d5f73d6932161ae5e9ce218a35cd8e7b747887b1a74798982d0b492c3f0ff53189d80733eb04f8124877b648ff438f7d66c7efcc09a8f3330b6c22d14e80db8e5608bdeab9388b758a15f4ce70390c214bc6838798f5b9b0b500d4e8b5174f329b8501c6feb7a6982bcea74a0f2ced7fa2059234a8d10b7f0597151d5c9067d57d85f4ae933eaf5174ba122f3f702ef8695578d3c08562c9fc185f0f65d11b4c58ae52500cbe99cde3758a5cbe6093dd328ac820e2de309d25a324647aadffcecf0f3bbaeda7af4436d9ffbce1b240a2f5e346eba8812e6329e01b087bde7da4a6448f478102e90c8134f531de08d4cf4f6f35b15a202544c0ced0c1715fd3a90099f785a13a2412bedba2981dd22bd9d736c00000000000000000000000000000000eb6fec8d7d2f77f4d470a9caa5b1bfc00cd1d40830ac35f229f8ffe1c02a63d3c2d9"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x702, 0xe, 0x700, &(0x7f0000000540)="e460334470b8d480eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 49.889699ms ago: executing program 1 (id=10896): syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000180000002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000580)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000004c0)={r1, 0x3, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x44) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000004c0)={r0, 0x3, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x44) 0s ago: executing program 4 (id=10897): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) syz_clone(0xc243bf463552f9d3, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.6' (ED25519) to the list of known hosts. [ 20.875793][ T30] audit: type=1400 audit(1757694986.142:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.876923][ T273] cgroup: Unknown subsys name 'net' [ 20.898620][ T30] audit: type=1400 audit(1757694986.142:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.926253][ T30] audit: type=1400 audit(1757694986.172:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.926511][ T273] cgroup: Unknown subsys name 'devices' [ 21.124596][ T273] cgroup: Unknown subsys name 'hugetlb' [ 21.130208][ T273] cgroup: Unknown subsys name 'rlimit' [ 21.266728][ T30] audit: type=1400 audit(1757694986.532:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.290017][ T30] audit: type=1400 audit(1757694986.532:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 21.303423][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.315031][ T30] audit: type=1400 audit(1757694986.532:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.333581][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.346839][ T30] audit: type=1400 audit(1757694986.592:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.381006][ T30] audit: type=1400 audit(1757694986.592:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.406606][ T30] audit: type=1400 audit(1757694986.592:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.432082][ T30] audit: type=1400 audit(1757694986.592:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.023870][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.030921][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.038521][ T281] device bridge_slave_0 entered promiscuous mode [ 22.045554][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.052586][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.060020][ T281] device bridge_slave_1 entered promiscuous mode [ 22.161477][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.168557][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.176028][ T282] device bridge_slave_0 entered promiscuous mode [ 22.183962][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.190997][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.198543][ T282] device bridge_slave_1 entered promiscuous mode [ 22.240737][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.247980][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.255487][ T285] device bridge_slave_0 entered promiscuous mode [ 22.273099][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.280330][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.287748][ T285] device bridge_slave_1 entered promiscuous mode [ 22.327701][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.334780][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.342062][ T288] device bridge_slave_0 entered promiscuous mode [ 22.357106][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.364185][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.371446][ T288] device bridge_slave_1 entered promiscuous mode [ 22.402430][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.409517][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.416975][ T286] device bridge_slave_0 entered promiscuous mode [ 22.427099][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.434376][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.441616][ T286] device bridge_slave_1 entered promiscuous mode [ 22.460441][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.467512][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.474825][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.481861][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.567230][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.574650][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.582592][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.590095][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.620585][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.655809][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.664365][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.671442][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.679104][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.687549][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.694667][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.702081][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.710597][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.717663][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.725018][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.733289][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.740300][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.747747][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.755708][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.765264][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.787360][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.800940][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.819520][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.832367][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.846536][ T281] device veth0_vlan entered promiscuous mode [ 22.857818][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.865895][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.873643][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.881738][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.890196][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.897264][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.904758][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.913128][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.920151][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.927657][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.936160][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.944451][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.951473][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.960538][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.968374][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.985248][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.994986][ T281] device veth1_macvtap entered promiscuous mode [ 23.008189][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.016722][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.023803][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.031476][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.040040][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.048014][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.056832][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.065351][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.073595][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.095444][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.104079][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.104161][ T281] request_module fs-gadgetfs succeeded, but still no fs? [ 23.112132][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.127959][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.136132][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.144671][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.153100][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.160884][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.168890][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.176365][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.186827][ T288] device veth0_vlan entered promiscuous mode [ 23.214265][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.225371][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.233170][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.241572][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.265232][ T285] device veth0_vlan entered promiscuous mode [ 23.272213][ T288] device veth1_macvtap entered promiscuous mode [ 23.288252][ T282] device veth0_vlan entered promiscuous mode [ 23.294738][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.303426][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.311806][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.320800][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.329427][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.336517][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.344310][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.352667][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.360970][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.368022][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.375635][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.383872][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.391853][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.399954][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.408061][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.416694][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.425213][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.433174][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.441134][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.449544][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.458422][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.467218][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.475443][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.499366][ T286] device veth0_vlan entered promiscuous mode [ 23.506416][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.516089][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.523747][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.531259][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.539628][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.547554][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.556236][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.564937][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.573607][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.582067][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.590526][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.607629][ T285] device veth1_macvtap entered promiscuous mode [ 23.618702][ T282] device veth1_macvtap entered promiscuous mode [ 23.625873][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.633790][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.641317][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.649985][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.660722][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.669465][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.678697][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.687508][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.727794][ T286] device veth1_macvtap entered promiscuous mode [ 23.739066][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.748487][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.761078][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.770508][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.779302][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.788367][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.801336][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.816822][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.858878][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.877675][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.893208][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.915693][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.941405][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.960388][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.913192][ T631] syz.0.146[631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.913266][ T631] syz.0.146[631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.005456][ T901] syz.1.280[901] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.503370][ T30] kauditd_printk_skb: 39 callbacks suppressed [ 27.503478][ T30] audit: type=1400 audit(1757694992.772:113): avc: denied { create } for pid=1289 comm="syz.4.475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 27.627875][ T30] audit: type=1400 audit(1757694992.812:114): avc: denied { create } for pid=1303 comm="syz.0.483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.740509][ T30] audit: type=1400 audit(1757694992.822:115): avc: denied { create } for pid=1306 comm="syz.2.478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 27.783704][ T30] audit: type=1400 audit(1757694992.842:116): avc: denied { create } for pid=1311 comm="syz.1.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 27.851943][ T30] audit: type=1400 audit(1757694993.092:117): avc: denied { create } for pid=1367 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 27.927907][ T30] audit: type=1400 audit(1757694993.162:118): avc: denied { create } for pid=1381 comm="syz.0.520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 28.061733][ T30] audit: type=1400 audit(1757694993.322:119): avc: denied { create } for pid=1425 comm="syz.2.541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 28.566809][ T30] audit: type=1400 audit(1757694993.832:120): avc: denied { create } for pid=1558 comm="syz.0.609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 28.870101][ T30] audit: type=1400 audit(1757694994.132:121): avc: denied { create } for pid=1639 comm="syz.3.650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 29.256275][ T30] audit: type=1400 audit(1757694994.522:122): avc: denied { create } for pid=1723 comm="syz.3.691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 30.271524][ T1930] syz.2.800[1930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.018606][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 34.018619][ T30] audit: type=1400 audit(1757694999.282:124): avc: denied { create } for pid=2521 comm="syz.1.1079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 35.454013][ T30] audit: type=1400 audit(1757695000.722:125): avc: denied { create } for pid=2728 comm="syz.2.1181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 37.191458][ T30] audit: type=1400 audit(1757695002.452:126): avc: denied { create } for pid=2962 comm="syz.0.1305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 39.920427][ T3328] syz.2.1477 uses obsolete (PF_INET,SOCK_PACKET) [ 40.081851][ T30] audit: type=1400 audit(1757695005.342:127): avc: denied { append } for pid=3361 comm="syz.3.1491" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 40.132515][ T30] audit: type=1400 audit(1757695005.342:128): avc: denied { open } for pid=3361 comm="syz.3.1491" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 42.001032][ T30] audit: type=1400 audit(1757695007.262:129): avc: denied { create } for pid=3683 comm="syz.0.1653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 42.619077][ T30] audit: type=1400 audit(1757695007.882:130): avc: denied { create } for pid=3837 comm="syz.0.1727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 44.327027][ T30] audit: type=1400 audit(1757695009.592:131): avc: denied { create } for pid=4234 comm="syz.2.1925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 44.424767][ T30] audit: type=1400 audit(1757695009.692:132): avc: denied { create } for pid=4247 comm="syz.2.1932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 46.367419][ T30] audit: type=1400 audit(1757695011.632:133): avc: denied { create } for pid=4566 comm="syz.3.2093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 46.967920][ T30] audit: type=1400 audit(1757695012.232:134): avc: denied { create } for pid=4711 comm="syz.0.2163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 47.877616][ T30] audit: type=1400 audit(1757695013.142:135): avc: denied { create } for pid=4877 comm="syz.0.2245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 47.982309][ T30] audit: type=1400 audit(1757695013.242:136): avc: denied { read } for pid=4895 comm="syz.1.2255" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 48.443323][ T30] audit: type=1400 audit(1757695013.712:137): avc: denied { read } for pid=4981 comm="syz.0.2295" dev="nsfs" ino=4026532285 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.508167][ T30] audit: type=1400 audit(1757695013.732:138): avc: denied { open } for pid=4981 comm="syz.0.2295" path="pid:[4026532285]" dev="nsfs" ino=4026532285 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.748037][ T30] audit: type=1400 audit(1757695014.012:139): avc: denied { tracepoint } for pid=5015 comm="syz.2.2314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 48.827633][ T30] audit: type=1400 audit(1757695014.092:140): avc: denied { create } for pid=5026 comm="syz.1.2318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 49.339370][ T30] audit: type=1400 audit(1757695014.602:141): avc: denied { create } for pid=5107 comm="syz.3.2359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 50.593316][ T30] audit: type=1400 audit(1757695015.862:142): avc: denied { create } for pid=5294 comm="syz.0.2449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 51.598532][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 51.598546][ T30] audit: type=1400 audit(1757695016.862:144): avc: denied { create } for pid=5495 comm="syz.4.2551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 51.675813][ T30] audit: type=1400 audit(1757695016.862:145): avc: denied { create } for pid=5498 comm="syz.3.2552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 52.343444][ T30] audit: type=1400 audit(1757695017.612:146): avc: denied { create } for pid=5620 comm="syz.3.2613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 53.013483][ T30] audit: type=1400 audit(1757695018.282:147): avc: denied { create } for pid=5773 comm="syz.3.2689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 53.609781][ T30] audit: type=1400 audit(1757695018.872:148): avc: denied { create } for pid=5911 comm="syz.1.2758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 54.064804][ T30] audit: type=1400 audit(1757695019.332:149): avc: denied { setopt } for pid=6018 comm="syz.2.2812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 54.135031][ T30] audit: type=1400 audit(1757695019.362:150): avc: denied { write } for pid=6031 comm="syz.1.2817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 54.160272][ T6042] @0Ù: renamed from bond_slave_1 [ 54.773665][ T30] audit: type=1400 audit(1757695020.042:151): avc: denied { ioctl } for pid=6166 comm="syz.0.2885" path="pid:[4026532285]" dev="nsfs" ino=4026532285 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 55.989209][ T30] audit: type=1400 audit(1757695021.242:152): avc: denied { write } for pid=6255 comm="syz.0.2928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 56.652536][ T30] audit: type=1400 audit(1757695021.912:153): avc: denied { read } for pid=6368 comm="syz.0.2983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 57.298337][ T6487] @0Ù: renamed from bond_slave_1 [ 57.506139][ T6514] @0Ù: renamed from bond_slave_1 [ 57.611419][ T30] audit: type=1400 audit(1757695022.872:154): avc: denied { create } for pid=6530 comm="syz.3.3062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 58.882748][ C1] sched: RT throttling activated [ 60.028463][ T30] audit: type=1400 audit(1757695025.292:155): avc: denied { ioctl } for pid=6596 comm="syz.3.3095" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x9436 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 60.125317][ T6609] @ÿ: renamed from bond_slave_0 [ 60.278102][ T30] audit: type=1400 audit(1757695025.542:156): avc: denied { ioctl } for pid=6634 comm="syz.2.3113" path="socket:[35208]" dev="sockfs" ino=35208 ioctlcmd=0x8907 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 60.453541][ T30] audit: type=1400 audit(1757695025.722:157): avc: denied { setattr } for pid=6668 comm="syz.1.3130" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 60.492772][ C0] hrtimer: interrupt took 30349 ns [ 63.085714][ T6829] ±ÿ: renamed from team_slave_1 [ 63.321364][ T6869] syz.0.3228[6869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.321435][ T6869] syz.0.3228[6869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.372558][ T6872] 6^VÐd´: renamed from veth0_vlan [ 63.646977][ T6926] ÿ: renamed from bond_slave_0 [ 65.747422][ T7080] device veth1_to_bond entered promiscuous mode [ 66.223157][ T7108] device veth1_macvtap left promiscuous mode [ 66.245948][ T7108] device macsec0 entered promiscuous mode [ 66.583951][ T7176] device team_slave_1 entered promiscuous mode [ 66.590562][ T6245] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.612082][ T6245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.713461][ T7190] device macsec0 left promiscuous mode [ 73.472316][ T7654] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.479625][ T7654] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.943973][ T30] audit: type=1400 audit(1757695046.212:158): avc: denied { create } for pid=7985 comm="syz.2.3782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 80.968254][ T7988] device wg2 entered promiscuous mode [ 80.979272][ T7988] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 81.015194][ T7994] gretap0: refused to change device tx_queue_len [ 81.594550][ T8081] device vlan0 entered promiscuous mode [ 86.909367][ T8304] bridge0: port 3(gretap0) entered blocking state [ 86.944198][ T8304] bridge0: port 3(gretap0) entered disabled state [ 86.969635][ T8304] device gretap0 entered promiscuous mode [ 98.613536][ T8798] device bridge0 entered promiscuous mode [ 104.075755][ T9318] lo: mtu less than device minimum [ 109.859136][ T9656] ------------[ cut here ]------------ [ 109.882796][ T9656] trace type BPF program uses run-time allocation [ 109.892945][ T9656] WARNING: CPU: 0 PID: 9656 at kernel/bpf/verifier.c:11718 check_map_prog_compatibility+0x6cd/0x870 [ 109.907389][ T9656] Modules linked in: [ 109.927938][ T9656] CPU: 0 PID: 9656 Comm: syz.3.4605 Not tainted syzkaller #0 [ 109.942983][ T9656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 109.972899][ T9656] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 109.998423][ T9656] Code: ee ff 48 c7 c6 60 ed 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 c6 4c ee ff c6 05 14 93 6b 05 01 48 c7 c7 c0 e9 47 85 e8 33 2b 25 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 110.092914][ T9656] RSP: 0018:ffffc90000c7f428 EFLAGS: 00010246 [ 110.100163][ T9656] RAX: 7526339b5571c000 RBX: 0000000000000001 RCX: 0000000000080000 [ 110.126188][ T9656] RDX: ffffc90002f62000 RSI: 0000000000003cbe RDI: 0000000000003cbf [ 110.143296][ T9656] RBP: ffffc90000c7f470 R08: dffffc0000000000 R09: ffffed103ee065e8 [ 110.151387][ T9656] R10: ffffed103ee065e8 R11: 1ffff1103ee065e7 R12: ffff88812aab4000 [ 110.159728][ T9656] R13: 0000000000000002 R14: dffffc0000000000 R15: ffff88810d2d8800 [ 110.167923][ T9656] FS: 00007f008a6e56c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 110.177255][ T9656] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 110.184063][ T9656] CR2: 00007fffedfc7b98 CR3: 000000012de75000 CR4: 00000000003506a0 [ 110.192137][ T9656] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 110.202581][ T9656] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 110.210878][ T9656] Call Trace: [ 110.214494][ T9656] [ 110.224035][ T9656] resolve_pseudo_ldimm64+0x685/0x11d0 [ 110.260718][ T9656] ? check_attach_btf_id+0xde0/0xde0 [ 110.279025][ T9656] ? __mark_reg_known+0x1b0/0x1b0 [ 110.297047][ T9656] ? security_capable+0x87/0xb0 [ 110.312092][ T9656] bpf_check+0x2c25/0xf280 [ 110.328549][ T9656] ? 0xffffffffa0026000 [ 110.344702][ T9656] ? is_bpf_text_address+0x177/0x190 [ 110.365182][ T9656] ? bpf_get_btf_vmlinux+0x60/0x60 [ 110.389558][ T9656] ? unwind_get_return_address+0x4d/0x90 [ 110.410518][ T9656] ? stack_trace_save+0xe0/0xe0 [ 110.428653][ T9656] ? arch_stack_walk+0xee/0x140 [ 110.458536][ T9656] ? stack_trace_save+0x98/0xe0 [ 110.476463][ T9656] ? __stack_depot_save+0x34/0x480 [ 110.495169][ T9656] ? __kasan_slab_alloc+0x69/0xf0 [ 110.528263][ T9656] ? _find_next_bit+0x1fa/0x200 [ 110.549068][ T9656] ? __kasan_kmalloc+0xec/0x110 [ 110.590326][ T9656] ? __kasan_kmalloc+0xda/0x110 [ 110.609355][ T9656] ? kmem_cache_alloc_trace+0x119/0x270 [ 110.642930][ T9656] ? selinux_bpf_prog_alloc+0x51/0x140 [ 110.665747][ T9656] ? security_bpf_prog_alloc+0x62/0x90 [ 110.722248][ T9656] ? bpf_prog_load+0x97c/0x1550 [ 110.753159][ T9656] ? __sys_bpf+0x4c3/0x730 [ 110.780314][ T9656] ? __x64_sys_bpf+0x7c/0x90 [ 110.795746][ T9656] ? x64_sys_call+0x4b9/0x9a0 [ 110.830410][ T9656] ? do_syscall_64+0x4c/0xa0 [ 110.845915][ T9656] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 110.869712][ T9656] ? check_stack_object+0x81/0x140 [ 110.875012][ T9656] ? memset+0x35/0x40 [ 110.879009][ T9656] ? bpf_obj_name_cpy+0x193/0x1e0 [ 110.884100][ T9656] bpf_prog_load+0x1042/0x1550 [ 110.889948][ T9656] ? __anon_inode_getfd+0x34b/0x3b0 [ 110.895814][ T9656] ? map_freeze+0x360/0x360 [ 110.900703][ T9656] ? selinux_bpf+0xc7/0xf0 [ 110.910190][ T9656] ? security_bpf+0x82/0xa0 [ 110.914921][ T9656] __sys_bpf+0x4c3/0x730 [ 110.919351][ T9656] ? bpf_link_show_fdinfo+0x310/0x310 [ 110.936125][ T9656] ? __kasan_check_write+0x14/0x20 [ 110.941446][ T9656] ? switch_fpu_return+0x15d/0x2c0 [ 110.958255][ T9656] __x64_sys_bpf+0x7c/0x90 [ 110.968245][ T9656] x64_sys_call+0x4b9/0x9a0 [ 110.982709][ T9656] do_syscall_64+0x4c/0xa0 [ 110.992949][ T9656] ? clear_bhb_loop+0x50/0xa0 [ 111.002893][ T9656] ? clear_bhb_loop+0x50/0xa0 [ 111.012922][ T9656] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 111.025423][ T9656] RIP: 0033:0x7f008bc7cba9 [ 111.034246][ T9656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 111.091917][ T9656] RSP: 002b:00007f008a6e5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 111.114752][ T9656] RAX: ffffffffffffffda RBX: 00007f008bec3fa0 RCX: 00007f008bc7cba9 [ 111.138358][ T9656] RDX: 0000000000000080 RSI: 0000200000000440 RDI: 0000000000000005 [ 111.155181][ T9656] RBP: 00007f008bcffe19 R08: 0000000000000000 R09: 0000000000000000 [ 111.185529][ T9656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 111.212559][ T9656] R13: 00007f008bec4038 R14: 00007f008bec3fa0 R15: 00007ffe846d6898 [ 111.230847][ T9656] [ 111.238294][ T9656] ---[ end trace 05455a352a2f087c ]--- [ 117.739639][T10072] syz.2.4809[10072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.739709][T10072] syz.2.4809[10072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.973781][T10594] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 131.032718][T10771] syz.3.5146[10771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.032853][T10771] syz.3.5146[10771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.135296][T10968] device macsec0 entered promiscuous mode [ 136.220813][T10978] bridge0: port 3(veth1) entered blocking state [ 136.234879][T10978] bridge0: port 3(veth1) entered disabled state [ 136.255823][T10978] device veth1 entered promiscuous mode [ 136.261550][T10978] bridge0: port 3(veth1) entered blocking state [ 136.267836][T10978] bridge0: port 3(veth1) entered forwarding state [ 137.066680][T11075] bridge0: port 3(veth1) entered blocking state [ 137.073598][T11075] bridge0: port 3(veth1) entered disabled state [ 137.085060][T11075] device veth1 entered promiscuous mode [ 137.095953][T11075] bridge0: port 3(veth1) entered blocking state [ 137.102267][T11075] bridge0: port 3(veth1) entered forwarding state [ 137.300162][T11111] bridge0: port 3(veth1) entered blocking state [ 137.306803][T11111] bridge0: port 3(veth1) entered disabled state [ 137.328293][T11111] device veth1 entered promiscuous mode [ 137.338880][T11111] bridge0: port 3(veth1) entered blocking state [ 137.345184][T11111] bridge0: port 3(veth1) entered forwarding state [ 154.123908][T12005] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 155.548196][ T30] audit: type=1400 audit(1757695120.812:159): avc: denied { create } for pid=12143 comm="syz.2.5800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 155.675759][ T30] audit: type=1400 audit(1757695120.942:160): avc: denied { associate } for pid=12146 comm="syz.2.5801" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 167.510217][T12705] sock: sock_set_timeout: `syz.0.6065' (pid 12705) tries to set negative timeout [ 171.057770][ T30] audit: type=1400 audit(1757695136.322:161): avc: denied { relabelfrom } for pid=12849 comm="syz.4.6131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 171.194377][ T30] audit: type=1400 audit(1757695136.322:162): avc: denied { relabelto } for pid=12849 comm="syz.4.6131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 172.738952][T13024] sock: sock_set_timeout: `syz.3.6219' (pid 13024) tries to set negative timeout [ 185.168058][T13714] syz.0.6545 (13714) used obsolete PPPIOCDETACH ioctl [ 187.001925][T13765] sock: sock_set_timeout: `syz.3.6567' (pid 13765) tries to set negative timeout [ 191.908713][T13962] sock: sock_set_timeout: `syz.1.6659' (pid 13962) tries to set negative timeout [ 192.644999][T14015] tap0: tun_chr_ioctl cmd 1074025692 [ 192.967181][T14054] tap0: tun_chr_ioctl cmd 1074025692 [ 193.106739][T14075] tap0: tun_chr_ioctl cmd 1074025692 [ 199.101707][T14225] tap0: tun_chr_ioctl cmd 1074025688 [ 199.376093][T14277] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 199.384617][T14277] syzkaller1: linktype set to 280 [ 200.467327][T14393] pimreg: tun_chr_ioctl cmd 1074025677 [ 200.539997][T14393] pimreg: linktype set to 769 [ 202.245144][T14497] tap0: tun_chr_ioctl cmd 2147767520 [ 204.475488][T14589] syz.3.6944[14589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.475563][T14589] syz.3.6944[14589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.899956][T14646] syz.2.6971[14646] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.947074][T14646] syz.2.6971[14646] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.189517][ T30] audit: type=1400 audit(1757695172.452:163): avc: denied { create } for pid=14661 comm="syz.0.6979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 208.346849][T14718] syz.4.7004[14718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.346925][T14718] syz.4.7004[14718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.447688][T14727] syz.4.7008[14727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.459434][T14727] syz.4.7008[14727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.610636][T14740] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 208.650601][T14740] pim6reg0: linktype set to 6 [ 209.377649][T14799] tap0: tun_chr_ioctl cmd 1074025677 [ 209.383357][T14799] tap0: linktype set to 774 [ 211.756105][T14919] tap0: tun_chr_ioctl cmd 1074025677 [ 211.793008][T14919] tap0: linktype set to 774 [ 213.131552][T14973] tap0: tun_chr_ioctl cmd 1074025677 [ 213.144832][T14973] tap0: linktype set to 768 [ 213.226681][ T30] audit: type=1400 audit(1757695178.492:164): avc: denied { setattr } for pid=14989 comm="syz.1.7127" path="/dev/net/tun" dev="devtmpfs" ino=152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 214.932546][T15092] tap0: tun_chr_ioctl cmd 2148553947 [ 215.126569][T15110] syz.1.7181[15110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.126680][T15110] syz.1.7181[15110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.214282][T15118] tap0: tun_chr_ioctl cmd 2147767521 [ 216.454386][T15180] tap0: tun_chr_ioctl cmd 35092 [ 222.052091][T15440] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 222.099245][T15440] syzkaller0: persist disabled [ 223.111840][T15543] syzkaller0: tun_chr_ioctl cmd 1074025676 [ 223.138003][T15543] syzkaller0: owner set to 1 [ 223.293202][T15553] tap0: tun_chr_ioctl cmd 1074025680 [ 223.377992][T15561] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 223.392788][T15561] syzkaller0: persist disabled [ 223.730963][T15604] syzkaller0: tun_chr_ioctl cmd 1074025676 [ 223.743813][T15604] syzkaller0: owner set to 1 [ 224.162073][T15643] syzkaller0: tun_chr_ioctl cmd 1074025676 [ 224.195472][T15643] syzkaller0: owner set to 1 [ 228.079615][T15784] syz.2.7484 (15784) used greatest stack depth: 21808 bytes left [ 228.560371][T15873] device pim6reg1 entered promiscuous mode [ 232.739781][T16153] Â: renamed from pim6reg1 [ 232.839013][T16173] device lo entered promiscuous mode [ 234.125734][T16245] tun0: tun_chr_ioctl cmd 1074812117 [ 234.188986][T16252] pim6reg0: tun_chr_ioctl cmd 1074025672 [ 234.194860][T16252] pim6reg0: ignored: set checksum enabled [ 234.202404][T16250] tap0: tun_chr_ioctl cmd 2147767517 [ 234.222313][T16256] bridge0: port 3(veth1) entered disabled state [ 234.228737][T16256] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.236141][T16256] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.792162][T16305] tap0: tun_chr_ioctl cmd 2147767511 [ 235.516066][T16357] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.523361][T16357] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.798042][T16378] tun0: tun_chr_ioctl cmd 1074812118 [ 236.549523][T16404] device lo entered promiscuous mode [ 236.632880][T16404] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 236.741992][T16412] ref_ctr_offset mismatch. inode: 0x1e60 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 236.953848][T16422] bridge0: port 3(veth1) entered disabled state [ 236.960646][T16422] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.967923][T16422] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.467036][T16641] tap0: tun_chr_ioctl cmd 1074025692 [ 241.534321][T16653] tap0: tun_chr_ioctl cmd 1074025692 [ 244.942006][T16815] nr0: tun_chr_ioctl cmd 1074025673 [ 247.383006][T16948] nr0: tun_chr_ioctl cmd 1074025673 [ 247.899021][T16989] nr0: tun_chr_ioctl cmd 1074025673 [ 250.092032][T17072] Â: renamed from pim6reg1 [ 251.029764][T17180] device sit0 entered promiscuous mode [ 251.314686][T17202] Â: renamed from pim6reg1 [ 252.320784][T17211] device sit0 entered promiscuous mode [ 253.429755][T17299] syz.2.8188[17299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.429827][T17299] syz.2.8188[17299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.454910][ T30] audit: type=1400 audit(1757695220.722:165): avc: denied { setattr } for pid=17354 comm="syz.0.8211" path="pipe:[14080]" dev="pipefs" ino=14080 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 255.472491][T17358] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 258.036770][T17486] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 258.042318][T17486] dvmrp1: linktype set to 805 [ 258.114426][T17496] tap0: tun_chr_ioctl cmd 35108 [ 258.481955][ T30] audit: type=1400 audit(1757695223.742:166): avc: denied { attach_queue } for pid=17536 comm="syz.3.8296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 261.914097][T17505] syz.0.8276 (17505) used greatest stack depth: 21552 bytes left [ 262.956123][ T30] audit: type=1400 audit(1757695228.222:167): avc: denied { read write } for pid=17639 comm="syz.4.8344" name="cgroup.subtree_control" dev="cgroup2" ino=343 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 262.994899][ T30] audit: type=1400 audit(1757695228.222:168): avc: denied { open } for pid=17639 comm="syz.4.8344" path="" dev="cgroup2" ino=343 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 263.270726][T17687] tun0: tun_chr_ioctl cmd 1074025677 [ 263.305352][T17687] tun0: linktype set to 776 [ 263.464661][ T30] audit: type=1400 audit(1757695228.732:169): avc: denied { ioctl } for pid=17719 comm="syz.2.8380" path="" dev="cgroup2" ino=356 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 265.131639][T17822] ip6_vti0: mtu greater than device maximum [ 265.230854][T17836] tap0: tun_chr_ioctl cmd 1074025677 [ 265.241693][T17836] tap0: linktype set to 823 [ 265.766405][T17886] tap0: tun_chr_ioctl cmd 1074812118 [ 266.461636][T17925] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 266.467851][T17925] syzkaller1: linktype set to 773 [ 267.024315][T17953] tap0: tun_chr_ioctl cmd 1074025677 [ 267.029695][T17953] tap0: linktype set to 804 [ 268.343289][T18033] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 268.388094][T18033] syzkaller0: linktype set to 778 [ 275.386543][T18263] nr0: tun_chr_ioctl cmd 1074025677 [ 275.407496][T18263] nr0: linktype set to 825 [ 281.950909][T18436] tun0: tun_chr_ioctl cmd 1074025681 [ 282.165289][T18464] tap0: tun_chr_ioctl cmd 1074025681 [ 298.963277][T19075] device sit0 left promiscuous mode [ 299.019102][T19075] device sit0 entered promiscuous mode [ 299.451080][T19113] device sit0 entered promiscuous mode [ 301.496443][T19170] device sit0 left promiscuous mode [ 301.534545][T19170] device sit0 entered promiscuous mode [ 301.854116][T19213] device sit0 entered promiscuous mode [ 302.653344][T19256] device sit0 entered promiscuous mode [ 312.190671][T19775] batadv0: tun_chr_ioctl cmd 2148553947 [ 312.203978][T19775] batadv0: tun_chr_ioctl cmd 2147767511 [ 317.937631][T20027] @ÿ: renamed from bond_slave_0 [ 320.308731][T20190] tap0: tun_chr_ioctl cmd 1074025675 [ 320.314809][T20190] tap0: persist enabled [ 320.334102][T20190] tap0: tun_chr_ioctl cmd 1074025675 [ 320.347515][T20190] tap0: persist disabled [ 324.692441][T20397] syz.1.9596[20397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.692531][T20397] syz.1.9596[20397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.998107][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): pim6reg1: link becomes ready [ 325.152594][T20438] syz.2.9614[20438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.152687][T20438] syz.2.9614[20438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.921166][T20478] cgroup: fork rejected by pids controller in /syz1 [ 326.791885][ T30] audit: type=1400 audit(1757695292.042:170): avc: denied { mounton } for pid=20515 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 326.931391][T20515] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.938548][T20515] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.951106][T20515] device bridge_slave_0 entered promiscuous mode [ 326.979387][T20515] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.000075][T20515] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.021587][T20515] device bridge_slave_1 entered promiscuous mode [ 327.266860][T11837] device veth1 left promiscuous mode [ 327.272255][T11837] bridge0: port 3(veth1) entered disabled state [ 327.289450][T11837] device bridge_slave_1 left promiscuous mode [ 327.368615][T11837] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.449503][T11837] device bridge_slave_0 left promiscuous mode [ 327.522353][T11837] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.652750][T11837] device veth1_macvtap left promiscuous mode [ 328.235480][ T30] audit: type=1400 audit(1757695293.502:171): avc: denied { write } for pid=20515 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 328.341039][ T30] audit: type=1400 audit(1757695293.502:172): avc: denied { read } for pid=20515 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 328.455070][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 328.476984][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 328.543332][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 328.570894][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 328.593748][ T338] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.600831][ T338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.666866][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 328.691272][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 328.715512][ T338] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.722610][ T338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.758405][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 328.809275][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 328.836291][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 328.869565][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 328.895383][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 328.954288][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 328.984428][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 329.030295][T20515] device veth0_vlan entered promiscuous mode [ 329.063904][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.100310][T20515] device veth1_macvtap entered promiscuous mode [ 329.173304][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 329.206367][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 329.271286][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 329.321315][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 329.331105][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 329.383178][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 329.391526][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 329.460781][ T30] audit: type=1400 audit(1757695294.722:173): avc: denied { unmount } for pid=20515 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 330.027834][T20616] tap0: tun_chr_ioctl cmd 1074025675 [ 330.077275][T20616] tap0: persist enabled [ 330.135974][T20620] tap0: tun_chr_ioctl cmd 1074025675 [ 330.171746][T20620] tap0: persist enabled [ 330.614149][T20644] sock: sock_timestamping_bind_phc: sock not bind to device [ 334.176014][T20830] tap0: tun_chr_ioctl cmd 1074025675 [ 334.185743][T20830] tap0: persist enabled [ 334.218039][T20830] tap0: tun_chr_ioctl cmd 1074025675 [ 334.225388][T20830] tap0: persist enabled [ 355.908055][T21658] tap1: tun_chr_ioctl cmd 2147767520 [ 355.931406][T21658] tap1: tun_chr_ioctl cmd 1074025677 [ 355.938909][T21658] tap1: linktype set to 1 [ 356.852539][T21690] device pim6reg1 entered promiscuous mode [ 357.833673][T21792] device pim6reg1 entered promiscuous mode [ 357.887090][T21796] device pim6reg1 left promiscuous mode [ 358.807475][T21870] device pim6reg1 entered promiscuous mode [ 359.525175][T21910] device pim6reg1 entered promiscuous mode [ 375.468827][T22303] cgroup: fork rejected by pids controller in /syz3 [ 376.090900][T22331] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.098523][T22331] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.106252][T22331] device bridge_slave_0 entered promiscuous mode [ 376.131425][T22331] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.139250][T22331] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.146824][T22331] device bridge_slave_1 entered promiscuous mode [ 379.067849][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 379.078807][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 379.107438][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 379.127100][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 379.135985][T11837] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.143049][T11837] bridge0: port 1(bridge_slave_0) entered forwarding state [ 379.150512][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 379.172418][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 379.182718][T11837] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.189789][T11837] bridge0: port 2(bridge_slave_1) entered forwarding state [ 379.213440][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 379.245917][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 379.285050][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 379.362440][T22331] device veth0_vlan entered promiscuous mode [ 379.380514][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 379.393461][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 379.410216][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 379.419094][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 379.444358][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 379.453247][T22331] device veth1_macvtap entered promiscuous mode [ 379.482375][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 379.492687][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 379.545558][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 379.563675][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 379.688951][T22410] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.722814][T22410] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.766496][T22410] device bridge_slave_0 entered promiscuous mode [ 379.795211][T22410] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.814119][T22410] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.835723][T22410] device bridge_slave_1 entered promiscuous mode [ 379.866881][ T338] device gretap0 left promiscuous mode [ 379.872378][ T338] bridge0: port 3(gretap0) entered disabled state [ 383.015942][ T338] device bridge_slave_1 left promiscuous mode [ 383.022102][ T338] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.034909][ T338] device bridge_slave_0 left promiscuous mode [ 383.052969][ T338] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.078416][ T338] device veth1_macvtap left promiscuous mode [ 383.350661][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 383.363088][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 383.385784][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 383.399744][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 383.410262][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.417356][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 383.425294][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 383.435454][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 383.451710][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.458967][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 383.483536][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 383.497689][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 383.506727][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 383.523963][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 383.532247][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 383.582590][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 383.607868][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 383.669157][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 383.680850][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 383.699416][T22410] device veth0_vlan entered promiscuous mode [ 383.722334][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 383.730822][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 383.762546][T22410] device veth1_macvtap entered promiscuous mode [ 383.778122][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 383.786474][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 383.795279][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 383.832715][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 383.844339][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 383.860168][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 383.869204][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 384.031999][T22533] tap0: tun_chr_ioctl cmd 1074025676 [ 384.044995][T22533] tap0: tun_chr_ioctl cmd 1074025675 [ 384.050910][T22533] tap0: persist disabled [ 384.171772][T22553] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 384.454652][ T338] device bridge_slave_1 left promiscuous mode [ 384.460817][ T338] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.468732][ T338] device bridge_slave_0 left promiscuous mode [ 384.475030][ T338] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.530927][ T338] device veth1_macvtap left promiscuous mode [ 384.539721][ T338] device veth0_vlan left promiscuous mode [ 392.305373][T23056] syz.0.10773[23056] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.305445][T23056] syz.0.10773[23056] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.370984][T23066] syz.1.10785[23066] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.386280][T23066] syz.1.10785[23066] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.213007][ T332] kworker/dying (332) used greatest stack depth: 21248 bytes left