last executing test programs: 1.444267553s ago: executing program 0 (id=1182): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x8000, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x480, 0xc8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0, 0x10, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000840)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00037300005b686158bbcfe8875a060300000022000000000000000000000000ac1414aa"], 0xfdef) 1.35223432s ago: executing program 2 (id=1188): bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='4'], 0x20) 1.296317155s ago: executing program 2 (id=1191): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0xfffffffd, 0x1}, 0x0, 0x100000001, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/29], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x101d0}], 0x1}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 1.248214249s ago: executing program 0 (id=1193): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x104000, 0x2, 0xfffffffe, 0x6, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x3, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x28}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100004}, 0x94) 1.226143441s ago: executing program 4 (id=1195): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3, 0x9, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, 0x50) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000000280)=""/69}, 0x20) 1.140189878s ago: executing program 4 (id=1197): socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x90024, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x6}, 0x8224, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x0, 0xfffffffd}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b00"/13], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 1.139841378s ago: executing program 0 (id=1199): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000004000000dd0000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa}, [@call={0x85, 0x0, 0x0, 0x7}]}, 0x0, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r0}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) 1.139588368s ago: executing program 4 (id=1200): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000001946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b702000008000000bfa300000000000007030000ffffffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000001404000001007d60b7030000000000006a0a00fe400009008500000054000000b70000000000000095000000000000006623848adf1dc9a764ab51a064caff0c9b27a26293fddf0180000071ff31f1622271d5518193e09483c5a020c334f8c76334d8ce8303b81ddaa52e8756ad60a07d6f27c125e16d024098f755d8583da60f27c162dbba0700002ac9170f50f2568836077b7f711a18ebf608d87b885297b6b6981978d51514b00dcc4a2748b376358c33c9753beab62bdf27dc04e4cb4bc598affd989b1ca58949a54d5827df14feecea46408a05d572077f1252fbb72c3d099c501bc4ded6fca17a3447222c95edb47b770009524edd5fa5c53e9c37251709f1ff7f0000f07bf7f53ce129a9ecd3b4dd15100f2b450f98526a0d8cac7c97fc2f64015306a1bd88345710fb6379b4c53cf55eefb4c0974486a8d25a363adbd83b49e13fbd1757b27020bd9b8cff3f48c9411670c34f23ab8caf7851b290feb3045a1b622f20c4383a0280f040de7667f8b1d0842835e81c35af41e5b5b924275cb1749289b44e9728e7a73f148ac8206afe120c1437490d9900000011000003971b32fdffffffffffffffaf580278e1342aabd1b623f6c4f128858e4eb6b42f2173184c2b99b645f6ec0e14e5d7c95a0008000000f30f6c0000000000ff0000b8f5001a1d2a34dc0973ec302bc23211d3e3b6e6dad65a51e5497a3419cecec38126247b27113ad4c7915c8f82c333a7b350802f0311807010d1ed50c18411aa6900daccc02f4ba4b078f07e41f781eee222c7d071d5a94d82ca9a0846c1af59cee16639b4970f8f0a82c6a712fd5722d677d406160ffaffffffb4e0bde6749aa52c408b74251914c5d3255fd88a42e7ebb69ebcd8eee623e51dbb1f1b548c91a6825c0686fdc16be1cbb72c217fda18bd746253ca66093daf35923300b600000000ac376e0a4649a8a84e1d293a6b109c5e59b366bca5cc3d936c53d4a48c05099e6fc37e5aa23bff8cce0600000000000300a568a8532623d12b40b50ac26f2e8255470a04bfbe7acb581b90991d965a01d1f84cb6b973558e1e3f8118c77ccf0b3c6eb6443870004da10c75723b65f83769ad1f0e4ef6b9ef1cec23264fd8fdac6264af1cb467020bdc12b797b6c156c439105829d2ae1c45f7cfa40df68f536a03353a55a8a8e176e5d48887d31c8e0f77f2c1e68ec7c01bd5a2028a8fc107007f5f4c67600a6ade3deb1f200abe1f753754678dae8b4e3ba3d086d4b95dfc5817e3dafae2d38b522f942cc750399d9029f071fdb1e05882f8a4b8fbd219ccac3a895828b4f22b6527ce31ceb02b7b2b4492510134552f0b076b168394f8417f25cc82ae04007193cbe69de8bf35e4bebd15412426b2020ab1f05fc44ae9ae094c1b81d3ef947692b44d2afb09c7498dedf0f87c38bbcab7357836f03e8a7c392e535694a3ead2de11e6b1781e2a017ac341fda2e563ee95085742f5fee9f95f4741b226e428d20b00bc140000e4b2f5efd0a0b1ceba000830ba8634b5aa26bdbe91614e92fae3c7349531df9bf4c01ebf5d8eb7d53e5f30647661623fbdb3f6c3652c423ce6ecc1be5d4e8133fc32f68ea86a2df1e7df98a0ae216c405d0ae9eed114ff2d6fe27dfdff1cf9194849c4cc0da9533e5983863e526a7dc0d8728f3b573ca4427bdb44df9341e9b8420e896598a156c935c800436a312e7ae3c011e46851ac599f0427729ab9c55ae0ab4c0000000000000000000000000000c87bcc2ac5aed9467b51d92e0993af4beaf1f3d47dcdfab9165f98155d93e383d6b85158b54675c1585037508c1e9461a1c3d1a6e2402045cae150a7016f716eebbdf6afc4414d900be0bdf19f4a273f44f4357380b4387f1c8b104f0e406b2f04e5ed88631be6411f9927fe9f83412b7c5a676ceec8b454ebf6481c98e86b6933a02daea0b4ec0be5b3d916bd70208b4588626c27c318475802e2c62681bd1a331422a6e47bbd40857d52c4894944fae5c5000000000000000000000000e0c47613e950b6aefeae054fc723f62ac7d13941de11b018f1f48ac50335df91c771729f81929128135b2803562c1171ee00a3f4a31281aa363e087d53d86dd85e3ff979a7e72d16fdd7e1a0f07a1c8e6085d280d760f74975ceb3a5be6cfb4da8e0aeb769b8b75f4aad803ed77d34872eed2711aa40a3b38099dc2752e8ec9b520faf39e416752aa0830206736570f5d41a4df848c9052551cf8dcb1be000000000eb2577188e8e96bd825d462350905d3eb916b397d2a46a64081e85661d7a5a2716cc87cb1976d15d9b6418e94f165911803e43830432226c660f4da67bb7c8ceb3755c07197d8b80b8d16b12c2ec63bebe107aa2350a7ae564bf69a6c52a2da1496016dd66a1c1b112"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd}, 0x48) 1.103487321s ago: executing program 0 (id=1201): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 1.098385011s ago: executing program 4 (id=1202): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x4, 0xe76188a61d36c46a, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x0, @perf_config_ext={0x3, 0x8001}, 0x10800, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg$inet(0xffffffffffffffff, 0x0, 0x8000) openat$tun(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x90100, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x6}, 0x1306, 0x2, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 965.189202ms ago: executing program 0 (id=1206): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) write$cgroup_int(r3, &(0x7f00000001c0), 0xfffffdef) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r0}, 0x8) ioctl$SIOCSIFHWADDR(r4, 0x541b, &(0x7f0000000180)={'veth0_virt_wifi\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x41}}) 601.624341ms ago: executing program 3 (id=1214): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000050000000000000082", @ANYRES32, @ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002480)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x7, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000380000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bc8900000000000035090100000000009500000000000000b7080000000000007b9a00fe00000000b509000000000000c3aaf0fff1000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018220000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608ebff76000000bf9800000000000056080000000000008500000000000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 508.678588ms ago: executing program 3 (id=1216): socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000900)='\xb0\x87\xd4\xe6\x10\x06@on{\x1f\xd6/\xc3\x90\xbb\x9b\x87\x10\xee@q7\x0f\x0e\xbe|@\xc3Q4yp\xdf{\xb0f\xbc\xc1h\x99q\xd1\xea\xb20xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'bridge_slave_1\x00', @random="010000201000"}) 319.210574ms ago: executing program 1 (id=1224): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x80000, 0x4000000000000ca, 0x0, 0x0, 0x0, 0xe9b0, 0x0, 0x0, 0xe, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x1c0) write$cgroup_subtree(r3, &(0x7f0000000140)=ANY=[@ANYRES8=r1, @ANYBLOB='>]\"'], 0x9a) 319.065284ms ago: executing program 3 (id=1225): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r0, @ANYBLOB="0000000002000000b70500000800000085000000aa00000095"], &(0x7f0000000080)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x40}, 0x94) 260.630548ms ago: executing program 2 (id=1226): bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x2, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x80000, 0xca, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0xe, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0}, 0x1c0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x10, 0x78}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) 260.502278ms ago: executing program 3 (id=1227): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={0x0, 0x2}, 0x10a8, 0x6, 0x0, 0x0, 0x9, 0x7ffffc, 0xfffc, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) close(0x3) 252.183779ms ago: executing program 1 (id=1228): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7fff, 0x4}, 0x14030, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x4) 240.4293ms ago: executing program 2 (id=1229): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1}]}, &(0x7f0000000100)='GPL\x00'}, 0x94) 160.682876ms ago: executing program 4 (id=1230): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x9, 0x4, 0x8, 0x8}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x200000}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) 160.210406ms ago: executing program 1 (id=1231): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="020000000400000008"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x9, 0x9, 0x2, 0x9, 0x42}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%-010d \x00'}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000240), 0x0}, 0x20) 129.361039ms ago: executing program 2 (id=1232): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) syz_clone(0x80001000, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0xff01, 0x0) 96.922811ms ago: executing program 32 (id=1232): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) syz_clone(0x80001000, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0xff01, 0x0) 73.274293ms ago: executing program 0 (id=1234): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xb, 0x8, 0x10001, 0x9, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='mm_page_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0, 0xffffffffffffffff}, &(0x7f0000000080)=0x20, &(0x7f00000001c0)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r2}, &(0x7f0000000180), &(0x7f0000000240)=r1}, 0x20) 72.646683ms ago: executing program 1 (id=1235): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10}, 0x0, 0xca, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x100000, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0xfffffdfc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0100000005000000fd09002084"], 0x50) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r3], 0x12) 42.736226ms ago: executing program 33 (id=1235): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10}, 0x0, 0xca, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x100000, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0xfffffdfc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0100000005000000fd09002084"], 0x50) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r3], 0x12) 637.189µs ago: executing program 4 (id=1236): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000feff03ff0000000003000000850000004100000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f805ffffb702000008000006b703000003000000850000001700000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="98bcf747f13dea1df643f85ff61b", 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 0s ago: executing program 34 (id=1236): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000feff03ff0000000003000000850000004100000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f805ffffb702000008000006b703000003000000850000001700000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="98bcf747f13dea1df643f85ff61b", 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.165' (ED25519) to the list of known hosts. [ 26.341185][ T24] audit: type=1400 audit(1756346068.180:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.342667][ T267] cgroup: Unknown subsys name 'net' [ 26.365262][ T24] audit: type=1400 audit(1756346068.180:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.393724][ T24] audit: type=1400 audit(1756346068.210:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.393977][ T267] cgroup: Unknown subsys name 'devices' [ 26.599411][ T267] cgroup: Unknown subsys name 'hugetlb' [ 26.606534][ T267] cgroup: Unknown subsys name 'rlimit' [ 26.776434][ T24] audit: type=1400 audit(1756346068.610:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.801483][ T24] audit: type=1400 audit(1756346068.610:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.811459][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.827258][ T24] audit: type=1400 audit(1756346068.610:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 26.860003][ T24] audit: type=1400 audit(1756346068.680:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.886470][ T24] audit: type=1400 audit(1756346068.680:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.915188][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.915258][ T24] audit: type=1400 audit(1756346068.730:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.957050][ T24] audit: type=1400 audit(1756346068.730:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.573883][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.581519][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.590541][ T275] device bridge_slave_0 entered promiscuous mode [ 27.599730][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.607292][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.616988][ T275] device bridge_slave_1 entered promiscuous mode [ 27.665474][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.673054][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.680973][ T276] device bridge_slave_0 entered promiscuous mode [ 27.691594][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.699313][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.707666][ T276] device bridge_slave_1 entered promiscuous mode [ 27.779935][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.787523][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.795637][ T279] device bridge_slave_0 entered promiscuous mode [ 27.814650][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.822275][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.829957][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.837389][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.845741][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.853247][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.860858][ T279] device bridge_slave_1 entered promiscuous mode [ 27.897285][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.905291][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.913238][ T277] device bridge_slave_0 entered promiscuous mode [ 27.923357][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.931432][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.941091][ T277] device bridge_slave_1 entered promiscuous mode [ 27.973891][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.983564][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.993686][ T278] device bridge_slave_0 entered promiscuous mode [ 28.003917][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.015082][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.026085][ T278] device bridge_slave_1 entered promiscuous mode [ 28.064018][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.071880][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.079576][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.087587][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.165440][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.174685][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.182744][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.191667][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.201380][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.209940][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.231110][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.239591][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.247948][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.278123][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.296434][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.305263][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.313017][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.321314][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.330248][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.338701][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.350705][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.376940][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.385318][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.393847][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.402258][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.410800][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.427322][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.435703][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.444285][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.453236][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.460571][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.468792][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.483684][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.492413][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.510997][ T276] device veth0_vlan entered promiscuous mode [ 28.518139][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.526136][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.534960][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.543984][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.552121][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.575805][ T275] device veth0_vlan entered promiscuous mode [ 28.582911][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.592909][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.602615][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.610255][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.618379][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.627301][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.635850][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.642911][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.650692][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.659463][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.668517][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.677019][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.685488][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.694297][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.703401][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.711016][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.718651][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.726843][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.735069][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.742968][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.750855][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.764448][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.772739][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.781322][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.790087][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.798834][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.807622][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.816099][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.823728][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.833355][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.841123][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.849200][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.858364][ T277] device veth0_vlan entered promiscuous mode [ 28.872641][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.881682][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.890375][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.897990][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.908774][ T275] device veth1_macvtap entered promiscuous mode [ 28.924485][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.933656][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.942942][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.951893][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.960450][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.975005][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.983727][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.992721][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.001654][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.010279][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.019418][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.028722][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.037301][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.048415][ T277] device veth1_macvtap entered promiscuous mode [ 29.057157][ T276] device veth1_macvtap entered promiscuous mode [ 29.066304][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.074395][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.082771][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 29.091908][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.100458][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.108938][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.122635][ T279] device veth0_vlan entered promiscuous mode [ 29.134868][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.143946][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.153036][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.162754][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.171747][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.179215][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.201626][ T275] request_module fs-gadgetfs succeeded, but still no fs? [ 29.203508][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.218103][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.226929][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.236169][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.245063][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.253835][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.263357][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.272573][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.291836][ T279] device veth1_macvtap entered promiscuous mode [ 29.300942][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 29.306875][ T278] device veth0_vlan entered promiscuous mode [ 29.320232][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.332558][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 29.346357][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.355965][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.364684][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.373490][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.381991][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.398217][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.408366][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.417167][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.426160][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.477279][ C1] hrtimer: interrupt took 25792 ns [ 29.493078][ T278] device veth1_macvtap entered promiscuous mode [ 29.503061][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.539496][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.577366][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.589406][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.603212][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.614478][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.711743][ T307] syz.1.2[307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.712715][ T307] syz.1.2[307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.606364][ T348] device syzkaller0 entered promiscuous mode [ 30.976737][ T365] device syzkaller0 entered promiscuous mode [ 31.351788][ T381] device sit0 entered promiscuous mode [ 31.383123][ T24] kauditd_printk_skb: 43 callbacks suppressed [ 31.383136][ T24] audit: type=1400 audit(1756346073.220:117): avc: denied { create } for pid=399 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 31.768463][ T421] device sit0 entered promiscuous mode [ 31.844619][ T24] audit: type=1400 audit(1756346073.680:118): avc: denied { create } for pid=442 comm="syz.3.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 32.385165][ T489] cgroup: syz.3.52 (489) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 32.415895][ T24] audit: type=1400 audit(1756346074.250:119): avc: denied { create } for pid=492 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 32.439653][ T489] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 32.583158][ T504] syz.1.57[504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.583242][ T504] syz.1.57[504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.751212][ T507] device pim6reg1 entered promiscuous mode [ 33.353790][ T24] audit: type=1400 audit(1756346075.190:120): avc: denied { write } for pid=528 comm="syz.1.66" name="cgroup.subtree_control" dev="cgroup2" ino=177 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 33.437125][ T24] audit: type=1400 audit(1756346075.190:121): avc: denied { open } for pid=528 comm="syz.1.66" path="" dev="cgroup2" ino=177 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 33.537512][ T522] device syzkaller0 entered promiscuous mode [ 33.762757][ T552] device wg2 entered promiscuous mode [ 34.082132][ T569] ------------[ cut here ]------------ [ 34.140607][ T569] trace type BPF program uses run-time allocation [ 34.196290][ T569] WARNING: CPU: 0 PID: 569 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 34.229688][ T569] Modules linked in: [ 34.240921][ T569] CPU: 0 PID: 569 Comm: syz.4.77 Not tainted 5.10.240-syzkaller #0 [ 34.256976][ T569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 34.267666][ T569] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 34.274875][ T569] Code: 85 e9 14 fe ff ff e8 89 f9 ef ff 31 c0 e9 15 fe ff ff e8 7d f9 ef ff c6 05 13 bd 2c 05 01 48 c7 c7 c0 76 05 85 e8 6a 40 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 34.309660][ T569] RSP: 0018:ffffc90000d27468 EFLAGS: 00010246 [ 34.318856][ T569] RAX: cbf0beea16c91400 RBX: 0000000000000001 RCX: 0000000000080000 [ 34.328795][ T569] RDX: ffffc900028d0000 RSI: 000000000000223e RDI: 000000000000223f [ 34.346427][ T569] RBP: ffffc90000d274b0 R08: dffffc0000000000 R09: ffffed103ee0a5f8 [ 34.355363][ T569] R10: ffffed103ee0a5f8 R11: 1ffff1103ee0a5f7 R12: ffff88811632c000 [ 34.367876][ T569] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888117256800 [ 34.376994][ T569] FS: 00007feb29e8e6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 34.386942][ T569] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 34.412776][ T569] CR2: 00007f8f88368f98 CR3: 000000010ca6f000 CR4: 00000000003506b0 [ 34.446363][ T569] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 34.455110][ T569] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 34.468876][ T569] Call Trace: [ 34.472596][ T569] ? __fdget+0x1a1/0x230 [ 34.477049][ T569] resolve_pseudo_ldimm64+0x526/0x1020 [ 34.483393][ T569] ? bpf_check+0xd680/0xd680 [ 34.488269][ T569] ? kvmalloc_node+0x88/0x130 [ 34.493334][ T569] bpf_check+0x8d4b/0xd680 [ 34.498633][ T569] ? bpf_get_btf_vmlinux+0x60/0x60 [ 34.504446][ T569] ? is_bpf_text_address+0x177/0x190 [ 34.510414][ T569] ? selinux_bpf_prog_alloc+0x51/0x140 [ 34.516257][ T569] ? __kernel_text_address+0xa0/0x100 [ 34.526510][ T569] ? unwind_get_return_address+0x4d/0x90 [ 34.532666][ T569] ? stack_trace_save+0xe0/0xe0 [ 34.538585][ T569] ? arch_stack_walk+0xee/0x140 [ 34.544086][ T569] ? stack_trace_save+0x98/0xe0 [ 34.549701][ T569] ? stack_trace_snprint+0xf0/0xf0 [ 34.555385][ T569] ? __kasan_slab_alloc+0x69/0xf0 [ 34.561501][ T569] ? pcpu_block_update+0x451/0x900 [ 34.567191][ T569] ? selinux_bpf_prog_alloc+0x51/0x140 [ 34.573544][ T569] ? __kasan_kmalloc+0xec/0x110 [ 34.583709][ T569] ? __kasan_kmalloc+0xda/0x110 [ 34.589028][ T569] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 34.595360][ T569] ? selinux_bpf_prog_alloc+0x51/0x140 [ 34.623637][ T569] ? security_bpf_prog_alloc+0x62/0x90 [ 34.632564][ T569] ? bpf_prog_load+0x949/0x1420 [ 34.664834][ T569] ? __se_sys_bpf+0x442/0x680 [ 34.670228][ T569] ? __x64_sys_bpf+0x7b/0x90 [ 34.681674][ T569] ? do_syscall_64+0x31/0x40 [ 34.687666][ T569] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 34.694460][ T569] ? memset+0x35/0x40 [ 34.698981][ T569] ? bpf_obj_name_cpy+0x193/0x1e0 [ 34.704535][ T569] bpf_prog_load+0xf5a/0x1420 [ 34.794451][ T569] ? map_freeze+0x320/0x320 [ 34.809897][ T569] ? selinux_bpf+0xc7/0xf0 [ 34.814735][ T569] ? security_bpf+0x82/0xa0 [ 34.824867][ T569] __se_sys_bpf+0x442/0x680 [ 34.835004][ T569] ? __x64_sys_bpf+0x90/0x90 [ 34.846484][ T569] ? fpu__clear_all+0x20/0x20 [ 34.865610][ T569] __x64_sys_bpf+0x7b/0x90 [ 34.875218][ T569] do_syscall_64+0x31/0x40 [ 34.896528][ T569] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 34.908334][ T569] RIP: 0033:0x7feb2b425be9 [ 34.912807][ T569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.923421][ T608] device lo entered promiscuous mode [ 34.941277][ T569] RSP: 002b:00007feb29e8e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 34.959818][ T569] RAX: ffffffffffffffda RBX: 00007feb2b64cfa0 RCX: 00007feb2b425be9 [ 34.968402][ T569] RDX: 0000000000000094 RSI: 0000200000000780 RDI: 0000000000000005 [ 34.977169][ T569] RBP: 00007feb2b4a8e19 R08: 0000000000000000 R09: 0000000000000000 [ 34.985585][ T569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 35.000325][ T569] R13: 00007feb2b64d038 R14: 00007feb2b64cfa0 R15: 00007fff9d3f8a38 [ 35.027596][ T569] ---[ end trace 3cd15c7824304fe4 ]--- [ 35.118312][ T626] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.126456][ T626] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.257127][ T24] audit: type=1400 audit(1756346077.090:122): avc: denied { relabelfrom } for pid=635 comm="syz.1.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 35.298164][ T24] audit: type=1400 audit(1756346077.090:123): avc: denied { relabelto } for pid=635 comm="syz.1.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 35.334905][ T24] audit: type=1400 audit(1756346077.130:124): avc: denied { create } for pid=635 comm="syz.1.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 38.336771][ T715] bridge0: port 3(veth1) entered blocking state [ 38.348912][ T715] bridge0: port 3(veth1) entered disabled state [ 38.419539][ T715] device veth1 entered promiscuous mode [ 38.428695][ T715] bridge0: port 3(veth1) entered blocking state [ 38.435616][ T715] bridge0: port 3(veth1) entered forwarding state [ 38.454946][ T24] audit: type=1400 audit(1756346080.290:125): avc: denied { create } for pid=717 comm="syz.2.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 38.841987][ T752] device syzkaller0 entered promiscuous mode [ 39.067976][ T766] syz.0.129[766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.068064][ T766] syz.0.129[766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.868775][ T798] syz.0.139[798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.884212][ T798] syz.0.139[798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.025170][ T800] device syzkaller0 entered promiscuous mode [ 40.238722][ T810] device pim6reg1 entered promiscuous mode [ 41.480392][ T24] audit: type=1400 audit(1756346083.310:126): avc: denied { create } for pid=891 comm="syz.1.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 41.691138][ T914] device pim6reg1 entered promiscuous mode [ 43.055834][ T95] udevd[95]: worker [300] terminated by signal 33 (Unknown signal 33) [ 43.107472][ T95] udevd[95]: worker [300] failed while handling '/devices/virtual/block/loop1' [ 43.142271][ T987] device wg2 entered promiscuous mode [ 43.274978][ T24] audit: type=1400 audit(1756346085.110:127): avc: denied { create } for pid=1009 comm="syz.1.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 43.617056][ T24] audit: type=1400 audit(1756346085.450:128): avc: denied { create } for pid=1038 comm="syz.4.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 44.185996][ T24] audit: type=1400 audit(1756346086.020:129): avc: denied { create } for pid=1085 comm="syz.3.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 44.348740][ T1109] syz.4.234[1109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.348798][ T1109] syz.4.234[1109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.693115][ T1135] pim6reg0: tun_chr_ioctl cmd 1074025673 [ 45.544802][ T24] audit: type=1400 audit(1756346087.380:130): avc: denied { create } for pid=1180 comm="syz.3.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 47.926080][ T1338] device veth0_vlan left promiscuous mode [ 47.952816][ T1338] device veth0_vlan entered promiscuous mode [ 48.010820][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.026008][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.072582][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.854328][ T1364] : port 1(veth0_vlan) entered blocking state [ 48.861242][ T1364] : port 1(veth0_vlan) entered disabled state [ 49.142105][ T24] audit: type=1400 audit(1756346090.980:131): avc: denied { create } for pid=1371 comm="syz.0.311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 51.116481][ T1443] device syzkaller0 entered promiscuous mode [ 52.464206][ T1514] syz.3.355 uses obsolete (PF_INET,SOCK_PACKET) [ 52.518730][ T24] audit: type=1400 audit(1756346094.350:132): avc: denied { create } for pid=1513 comm="syz.3.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 52.522544][ T1516] device sit0 entered promiscuous mode [ 53.034306][ T1527] device sit0 left promiscuous mode [ 53.049623][ T1519] device sit0 entered promiscuous mode [ 53.167676][ T1548] device sit0 left promiscuous mode [ 53.497308][ T1596] device wg2 entered promiscuous mode [ 53.925987][ T1629] device syzkaller0 entered promiscuous mode [ 54.238950][ T1647] device wg2 entered promiscuous mode [ 54.395597][ T1651] device syzkaller0 entered promiscuous mode [ 54.464077][ T1662] device sit0 entered promiscuous mode [ 54.867768][ T1670] : renamed from team_slave_1 [ 55.020955][ T24] audit: type=1400 audit(1756346096.860:133): avc: denied { create } for pid=1669 comm="syz.2.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 55.694698][ T24] audit: type=1400 audit(1756346097.530:134): avc: denied { create } for pid=1699 comm="syz.3.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 55.835227][ T1707] device syzkaller0 entered promiscuous mode [ 56.023457][ T24] audit: type=1400 audit(1756346097.840:135): avc: denied { create } for pid=1717 comm="syz.3.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 56.230769][ T24] audit: type=1400 audit(1756346097.850:136): avc: denied { create } for pid=1717 comm="syz.3.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 58.336716][ T24] audit: type=1400 audit(1756346100.170:137): avc: denied { create } for pid=1791 comm="syz.1.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 58.442001][ T24] audit: type=1400 audit(1756346100.200:138): avc: denied { create } for pid=1791 comm="syz.1.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 58.853085][ T1810] device veth0_vlan left promiscuous mode [ 58.876403][ T1810] device veth0_vlan entered promiscuous mode [ 59.409412][ T1848] syz.0.440[1848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.409505][ T1848] syz.0.440[1848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.397461][ T24] audit: type=1400 audit(1756346103.230:139): avc: denied { create } for pid=1893 comm="syz.1.451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 61.704463][ T1913] 7B: renamed from syzkaller0 [ 61.719258][ T1915] : renamed from bond_slave_0 [ 61.725661][ T1912] device pim6reg1 entered promiscuous mode [ 62.029102][ T1935] device pim6reg1 entered promiscuous mode [ 62.269333][ T1959] bridge0: port 3(veth1) entered disabled state [ 62.276032][ T1959] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.283330][ T1959] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.899262][ T1990] device syzkaller0 entered promiscuous mode [ 63.489794][ T2034] device wg2 left promiscuous mode [ 63.509135][ T2037] device wg2 entered promiscuous mode [ 64.121529][ T24] audit: type=1400 audit(1756346105.960:140): avc: denied { create } for pid=2065 comm="syz.2.505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 64.407302][ T2079] device sit0 left promiscuous mode [ 64.539662][ T2079] device sit0 entered promiscuous mode [ 64.617182][ T2085] device pim6reg1 entered promiscuous mode [ 64.636033][ T2089] device veth1_macvtap left promiscuous mode [ 65.089067][ T2093] device syzkaller0 entered promiscuous mode [ 67.458533][ T24] audit: type=1400 audit(1756346109.300:141): avc: denied { ioctl } for pid=2178 comm="syz.0.536" path="mnt:[4026532455]" dev="nsfs" ino=4026532455 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 67.969680][ T2200] : renamed from team_slave_1 [ 68.146967][ T2215] device pim6reg1 entered promiscuous mode [ 68.752351][ T2251] device veth0_vlan left promiscuous mode [ 68.868998][ T2251] device veth0_vlan entered promiscuous mode [ 69.436686][ T2298] device pim6reg1 entered promiscuous mode [ 69.837383][ T2318] device syzkaller0 entered promiscuous mode [ 69.887331][ T2332] device sit0 left promiscuous mode [ 69.993312][ T2335] device sit0 entered promiscuous mode [ 70.399147][ T2370] device pim6reg1 entered promiscuous mode [ 70.769351][ T2398] device syzkaller0 entered promiscuous mode [ 70.799596][ T2400] device sit0 left promiscuous mode [ 70.962733][ T2402] device sit0 entered promiscuous mode [ 72.210335][ T24] audit: type=1400 audit(1756346114.050:142): avc: denied { create } for pid=2472 comm="syz.4.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 72.430815][ T2492] device syzkaller0 entered promiscuous mode [ 72.666720][ T2501] 7B: renamed from syzkaller0 [ 72.772410][ T2521] device pim6reg1 entered promiscuous mode [ 73.261677][ T2546] GPL: port 1(erspan0) entered blocking state [ 73.268910][ T2546] GPL: port 1(erspan0) entered disabled state [ 73.275874][ T2546] device erspan0 entered promiscuous mode [ 73.316606][ T2546] GPL: port 1(erspan0) entered blocking state [ 73.323130][ T2546] GPL: port 1(erspan0) entered forwarding state [ 73.525481][ T2571] device wg2 left promiscuous mode [ 74.035433][ T2613] gretap0: refused to change device tx_queue_len [ 74.044108][ T24] audit: type=1400 audit(1756346115.870:143): avc: denied { ioctl } for pid=2610 comm="syz.0.663" path="" dev="cgroup2" ino=221 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 74.172850][ T24] audit: type=1400 audit(1756346115.970:144): avc: denied { create } for pid=2612 comm="syz.3.664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 75.381819][ T2673] syz.3.681[2673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.381908][ T2673] syz.3.681[2673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.531358][ T2667] device syzkaller0 entered promiscuous mode [ 76.058537][ T2698] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.066744][ T2698] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.148113][ T2700] syz.2.690[2700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.148201][ T2700] syz.2.690[2700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.280674][ T2710] device syzkaller0 entered promiscuous mode [ 76.549665][ T24] audit: type=1400 audit(1756346118.390:145): avc: denied { create } for pid=2728 comm="syz.4.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 76.630748][ T2734] device syzkaller0 entered promiscuous mode [ 76.746431][ T2732] device syzkaller0 entered promiscuous mode [ 76.839218][ T2743] device syzkaller0 entered promiscuous mode [ 77.466280][ T2781] device syzkaller0 entered promiscuous mode [ 77.562977][ T24] audit: type=1400 audit(1756346119.400:146): avc: denied { create } for pid=2787 comm="syz.3.713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 78.258263][ T24] audit: type=1400 audit(1756346120.090:147): avc: denied { create } for pid=2815 comm="syz.1.720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 78.328288][ T24] audit: type=1400 audit(1756346120.160:148): avc: denied { create } for pid=2837 comm="syz.2.728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 78.687219][ T2841] device wg2 left promiscuous mode [ 78.762331][ T24] audit: type=1400 audit(1756346120.600:149): avc: denied { create } for pid=2840 comm="syz.0.729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 79.336611][ T2867] device syzkaller0 entered promiscuous mode [ 80.372118][ T2895] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.379778][ T2895] bridge0: port 2(bridge_slave_1) entered forwarding state [ 80.387234][ T2895] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.394579][ T2895] bridge0: port 1(bridge_slave_0) entered forwarding state [ 81.030688][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 81.990530][ T2973] device sit0 entered promiscuous mode [ 82.804953][ T3000] device syzkaller0 entered promiscuous mode [ 85.563554][ T3136] device sit0 left promiscuous mode [ 85.670784][ T3136] device sit0 entered promiscuous mode [ 86.363058][ T3175] device sit0 left promiscuous mode [ 86.421367][ T3175] device sit0 entered promiscuous mode [ 86.562726][ T3189] syz.2.827[3189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.562782][ T3189] syz.2.827[3189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.619421][ T3190] syz.2.827[3190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.651714][ T3197] syz.2.827[3197] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.684613][ T24] audit: type=1400 audit(1756346128.520:150): avc: denied { ioctl } for pid=3193 comm="syz.0.829" path="socket:[24850]" dev="sockfs" ino=24850 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 86.690684][ T3190] syz.2.827[3190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.722179][ T3197] syz.2.827[3197] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.874243][ T3189] device wg2 entered promiscuous mode [ 87.338744][ T3225] : renamed from bond_slave_0 [ 87.803269][ T3242] device wg2 left promiscuous mode [ 88.055921][ T3252] device syzkaller0 entered promiscuous mode [ 88.435238][ T3277] device pim6reg1 entered promiscuous mode [ 88.998410][ T3289] device syzkaller0 entered promiscuous mode [ 89.066989][ T3287] device macsec0 entered promiscuous mode [ 89.115415][ T3306] syz.2.860[3306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.115493][ T3306] syz.2.860[3306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.368178][ T3343] device pim6reg1 entered promiscuous mode [ 89.662182][ T3352] device wg2 entered promiscuous mode [ 89.894081][ T3370] tap0: tun_chr_ioctl cmd 1074025677 [ 89.907727][ T3370] tap0: linktype set to 773 [ 91.260054][ T24] audit: type=1400 audit(1756346133.090:151): avc: denied { create } for pid=3446 comm="syz.3.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 91.579948][ T3464] device sit0 entered promiscuous mode [ 91.723570][ T3475] device pim6reg1 entered promiscuous mode [ 91.971648][ T24] audit: type=1400 audit(1756346133.810:152): avc: denied { create } for pid=3488 comm="syz.2.912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 93.598018][ T3607] Q6\bY4: renamed from lo [ 93.801851][ T3612] device bridge0 entered promiscuous mode [ 94.176513][ T3629] device syzkaller0 entered promiscuous mode [ 94.257842][ T3635] device pimreg0 entered promiscuous mode [ 95.686147][ T3700] device bridge_slave_1 left promiscuous mode [ 95.693112][ T3700] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.701413][ T3700] device bridge_slave_0 left promiscuous mode [ 95.711006][ T3700] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.959671][ T3714] device pim6reg1 entered promiscuous mode [ 98.390471][ T3857] device sit0 left promiscuous mode [ 98.702517][ T3870] device sit0 entered promiscuous mode [ 99.061174][ T3875] device sit0 left promiscuous mode [ 99.268821][ T3878] device pim6reg1 entered promiscuous mode [ 99.578478][ T3912] device syzkaller0 entered promiscuous mode [ 99.660823][ T3917] device pim6reg1 entered promiscuous mode [ 99.839128][ T3920] device pim6reg1 entered promiscuous mode [ 100.088493][ T3926] syz.1.1035[3926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.088553][ T3926] syz.1.1035[3926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.357005][ T3972] device pim6reg1 entered promiscuous mode [ 102.966624][ T4028] device syzkaller0 entered promiscuous mode [ 103.402641][ T4047] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 103.436647][ T4051] device pim6reg1 entered promiscuous mode [ 103.938293][ T4082] p: renamed from pim6reg1 [ 104.017793][ T24] audit: type=1400 audit(1756346145.860:153): avc: denied { create } for pid=4086 comm="syz.3.1081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 104.820453][ T4112] device wg2 left promiscuous mode [ 104.947995][ T4112] device wg2 entered promiscuous mode [ 105.065762][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.103248][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.115678][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 106.531401][ T4182] device syzkaller0 entered promiscuous mode [ 106.621822][ T4187] bridge0: port 3(veth0) entered blocking state [ 106.645128][ T4187] bridge0: port 3(veth0) entered disabled state [ 106.652340][ T4187] device veth0 entered promiscuous mode [ 106.674190][ T4187] bridge0: port 3(veth0) entered blocking state [ 106.681013][ T4187] bridge0: port 3(veth0) entered forwarding state [ 107.531064][ T4250] tap0: tun_chr_ioctl cmd 1074025680 [ 107.580298][ T4254] syz.0.1134[4254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.580359][ T4254] syz.0.1134[4254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.561098][ T4394] device wg2 entered promiscuous mode SYZFAIL: repeatedly failed to execute the program proc=6 req=1243 state=1 status=7 (errno 9: Bad file descriptor) [ 109.650330][ T24] audit: type=1400 audit(1756346151.490:154): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[12984]" dev="pipefs" ino=12984 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 110.318589][ T49] device bridge_slave_1 left promiscuous mode [ 110.324900][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.332793][ T49] device bridge_slave_0 left promiscuous mode [ 110.339265][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.347725][ T49] device veth1_macvtap left promiscuous mode [ 111.799632][ T49] GPL: port 1(erspan0) entered disabled state [ 111.809280][ T49] device erspan0 left promiscuous mode [ 111.815355][ T49] GPL: port 1(erspan0) entered disabled state [ 112.118387][ T49] device veth1 left promiscuous mode [ 112.124371][ T49] bridge0: port 3(veth1) entered disabled state [ 112.131316][ T49] device bridge_slave_1 left promiscuous mode [ 112.137686][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.145459][ T49] device bridge_slave_0 left promiscuous mode [ 112.151675][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.159890][ T49] : port 1(veth0_vlan) entered disabled state [ 112.167455][ T49] device bridge_slave_1 left promiscuous mode [ 112.173990][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.181838][ T49] device bridge_slave_0 left promiscuous mode [ 112.189133][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.197655][ T49] device veth0 left promiscuous mode [ 112.203717][ T49] bridge0: port 3(veth0) entered disabled state [ 112.211747][ T49] device bridge_slave_1 left promiscuous mode [ 112.218955][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.227217][ T49] device bridge_slave_0 left promiscuous mode [ 112.234073][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.243187][ T49] device veth1_macvtap left promiscuous mode [ 112.249598][ T49] device veth0_vlan left promiscuous mode [ 112.256444][ T49] device veth1_macvtap left promiscuous mode [ 112.263521][ T49] device veth0_vlan left promiscuous mode [ 112.270621][ T49] device veth1_macvtap left promiscuous mode