last executing test programs: 3.619125977s ago: executing program 3 (id=2543): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x6, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2, 0x0, 0x0, 0x1000}, [@call={0x85, 0x0, 0x0, 0x36}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3.522106578s ago: executing program 3 (id=2549): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa1000000000000070100"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x6, 0x4, 0xdd, 0xa}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x43}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) 3.521833078s ago: executing program 3 (id=2552): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32], 0x20) 970.727034ms ago: executing program 3 (id=2559): bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x10}, 0x0, 0x0, 0x5, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000140)=""/31}, 0x20) bpf$ENABLE_STATS(0x20, &(0x7f0000000200), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x4, 0x4, &(0x7f0000001240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f00000000c0)=ANY=[@ANYBLOB="180800002d98afeb000000000000000018280000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000000000b7020000000000007b9af8ff00000000b5090000000000007baaf0ff00000000bf9700000000000007080000fffdffffbfa400000000000007040000f0ffffff740200000800000018220000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608f0ff760000007d9800000000000056080000000000008500000005000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 749.983735ms ago: executing program 1 (id=2572): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xa, 0x4, 0xdd, 0xa}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xe, 0x4, 0x8, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000300)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x43}}, &(0x7f0000000480)='syzkaller\x00'}, 0x94) 731.010975ms ago: executing program 1 (id=2576): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000600000007"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 649.590846ms ago: executing program 1 (id=2580): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000b00)=ANY=[], 0x0, 0x4c}, 0x28) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="b40000060400000100010000000000008000000b34659e9086"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x20) 649.408396ms ago: executing program 1 (id=2582): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffd}, [@call={0x85, 0x0, 0x0, 0x27}, @call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f0000000080)='GPL\x00', 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 622.238186ms ago: executing program 1 (id=2583): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0xdd, 0xa, 0x0, 0xffffffffffffffff, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000001680)=ANY=[@ANYBLOB="1800000000030000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8}, 0x94) 590.577066ms ago: executing program 0 (id=2585): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b705000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x1f, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018", @ANYRES32=r0], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 522.072057ms ago: executing program 1 (id=2587): r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x76}, [@call={0x27}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0xf, 0x4, 0x8, 0x1}, 0x37) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xf, &(0x7f00000016c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000400b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000280)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000300)=ANY=[@ANYRES32=r1, @ANYRES32=r4, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r1}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) sendmsg(r2, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001400)='H', 0x20001401}], 0x1}, 0x0) 519.718026ms ago: executing program 0 (id=2588): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=@framed={{}, [@printk={@p, {}, {}, {}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x5}, {}, {0x85, 0x0, 0x0, 0xb0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000400)='percpu_alloc_percpu\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 496.240877ms ago: executing program 2 (id=2589): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x8100, 0x0) sendmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18, 0x4040101}, 0x4000800) 484.916477ms ago: executing program 0 (id=2590): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000400008500000001000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r0}, &(0x7f00000001c0), &(0x7f0000000200)='%pK \x00'}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f00000000c0)={r1}, 0xc) 410.090867ms ago: executing program 2 (id=2591): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 409.993947ms ago: executing program 0 (id=2592): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)) 409.900597ms ago: executing program 2 (id=2593): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="08000000040000000400000006"], 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x8b, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x4108, 0x0, 0x0, 0x9, 0xf8, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 409.150057ms ago: executing program 2 (id=2594): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x13, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x5, 0x1a82}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x11, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000740), 0x80000002, r0}, 0x38) 399.735877ms ago: executing program 4 (id=2595): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x10, 0x4, 0x8, 0x8}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bc00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000400850000003300000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xdc0, 0x0, &(0x7f0000000000), 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="030000000400000004000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x12, 0x0, 0x0, &(0x7f0000000c40)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9}, 0x94) 373.531358ms ago: executing program 4 (id=2596): socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002300)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b402000000000000791100000000000085000000a000000095"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xc5, &(0x7f0000000300)=""/197, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x94) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair(0x2, 0x6, 0x960, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x8, &(0x7f00000005c0)=ANY=[@ANYBLOB="b40100000000008937d86219eecd95c68791f5ff006111740000000000260000008574307018440000f9ffffff0000000000000000186000000700000000000000020000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="85000006c8"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, r4}, 0x94) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x2) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYRES8=r3, @ANYRES8], 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000100000000000000000000007112bb000000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 298.066738ms ago: executing program 0 (id=2597): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x1fa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x13, 0x2, 0x0, 0x0, 0x0, 0x2, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x420, 0x5, 0x3, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x0, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="9fedcb7968ddc36c8f263408008daa"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 297.934618ms ago: executing program 4 (id=2598): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x10, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@snprintf={{}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0xa7}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 297.757528ms ago: executing program 0 (id=2599): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x12, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x2, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x5, 0x0, 0x7fff, 0xfffd, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x880000000000, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) syz_clone(0x164000, 0x0, 0x0, 0x0, 0x0, 0x0) 297.682578ms ago: executing program 4 (id=2600): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000180)=r1, 0x4) sendmsg$inet(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) 267.851198ms ago: executing program 4 (id=2601): r0 = perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa0100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x80000001, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x37}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x68000000}, 0x48) 239.968709ms ago: executing program 2 (id=2602): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000240), &(0x7f0000000280)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0xc}, 0x50) 165.877859ms ago: executing program 4 (id=2603): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB], 0x0, 0x56, 0x0, 0x8}, 0x28) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, @perf_bp={0x0}, 0x105d30, 0x0, 0x0, 0x0, 0x6, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x1c0) bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000300000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="19000000040000000800000005"], 0x48) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000010b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r3, 0x3, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) close(r2) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x3, 0x0, 0x8, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0, 0x7}, 0xa100, 0xc8, 0x3, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x80000000, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x8) recvmsg$unix(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x1c0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x9a) getpid() perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x4, 0x6, 0x0, 0x3, 0x0, 0x1000, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={0x0, 0x2}, 0x10000, 0x1, 0x5, 0x9, 0x4, 0x17a, 0x8, 0x0, 0x0, 0x0, 0xde5b}, 0x0, 0xe, 0xffffffffffffffff, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={r0}, 0xc) 154.786419ms ago: executing program 32 (id=2603): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB], 0x0, 0x56, 0x0, 0x8}, 0x28) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, @perf_bp={0x0}, 0x105d30, 0x0, 0x0, 0x0, 0x6, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x1c0) bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000300000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="19000000040000000800000005"], 0x48) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000010b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r3, 0x3, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) close(r2) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x3, 0x0, 0x8, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0, 0x7}, 0xa100, 0xc8, 0x3, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x80000000, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x8) recvmsg$unix(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x1c0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x9a) getpid() perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x4, 0x6, 0x0, 0x3, 0x0, 0x1000, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={0x0, 0x2}, 0x10000, 0x1, 0x5, 0x9, 0x4, 0x17a, 0x8, 0x0, 0x0, 0x0, 0xde5b}, 0x0, 0xe, 0xffffffffffffffff, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={r0}, 0xc) 54.77644ms ago: executing program 2 (id=2605): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f00000004c0)="630b008646dc3f0adf33c9f7b986", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) 54.66038ms ago: executing program 33 (id=2605): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f00000004c0)="630b008646dc3f0adf33c9f7b986", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) 52.89131ms ago: executing program 3 (id=2606): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x2}, 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x87}]}, &(0x7f0000000040)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @flow_dissector}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r6 = openat$cgroup_devices(r5, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r6, &(0x7f0000000180)={'a', ' *:* ', 'rm\x00'}, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xf}, 0x806, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x2, 0x300}, {0x6e, 0x0, 0xd}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x20000f19}, {0x3, 0x0, 0x6, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r3}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0xe, 0x300, &(0x7f00000002c0)="f57b0bb7994307a7ac95a7c71016", 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, &(0x7f0000000180)="b8"}, 0x3a) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) 144.86µs ago: executing program 3 (id=2608): mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x13, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4}, 0x0, 0x5, 0x3, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x94) socketpair(0xa, 0x2, 0x0, &(0x7f0000000040)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000001d71185f000000000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sk_skb=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) r2 = perf_event_open(0x0, 0x0, 0x0, r1, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_type(r5, 0x0, 0xfffffd37) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x7f) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f00000018c0)=ANY=[@ANYBLOB="180800001bc81a000000000000000001851000000600000018", @ANYRES32=0x0, @ANYBLOB="00000000000000006608000000000101180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a000021000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0xcb4c7493edfac1bd, 0x25}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6c}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x90) socketpair(0x1b, 0x3, 0xa, &(0x7f0000000200)) 0s ago: executing program 34 (id=2608): mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x13, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4}, 0x0, 0x5, 0x3, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x94) socketpair(0xa, 0x2, 0x0, &(0x7f0000000040)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000001d71185f000000000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sk_skb=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) r2 = perf_event_open(0x0, 0x0, 0x0, r1, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_type(r5, 0x0, 0xfffffd37) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x7f) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f00000018c0)=ANY=[@ANYBLOB="180800001bc81a000000000000000001851000000600000018", @ANYRES32=0x0, @ANYBLOB="00000000000000006608000000000101180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a000021000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0xcb4c7493edfac1bd, 0x25}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x6c}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x90) socketpair(0x1b, 0x3, 0xa, &(0x7f0000000200)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.63' (ED25519) to the list of known hosts. [ 19.069921][ T24] audit: type=1400 audit(1762653397.850:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.070740][ T267] cgroup: Unknown subsys name 'net' [ 19.078067][ T24] audit: type=1400 audit(1762653397.850:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.085790][ T24] audit: type=1400 audit(1762653397.860:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.085988][ T267] cgroup: Unknown subsys name 'devices' [ 19.218171][ T267] cgroup: Unknown subsys name 'hugetlb' [ 19.224013][ T267] cgroup: Unknown subsys name 'rlimit' [ 19.388954][ T24] audit: type=1400 audit(1762653398.170:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.412394][ T24] audit: type=1400 audit(1762653398.170:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.418113][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 19.437781][ T24] audit: type=1400 audit(1762653398.170:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 19.470050][ T24] audit: type=1400 audit(1762653398.220:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.495963][ T24] audit: type=1400 audit(1762653398.220:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.530705][ T24] audit: type=1400 audit(1762653398.310:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.556820][ T24] audit: type=1400 audit(1762653398.310:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.583308][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.167414][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.174469][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.181958][ T275] device bridge_slave_0 entered promiscuous mode [ 20.191265][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.198600][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.205938][ T275] device bridge_slave_1 entered promiscuous mode [ 20.277964][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.285107][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.292447][ T277] device bridge_slave_0 entered promiscuous mode [ 20.301213][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.308893][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.316226][ T277] device bridge_slave_1 entered promiscuous mode [ 20.327538][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.334669][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.342439][ T276] device bridge_slave_0 entered promiscuous mode [ 20.351191][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.358386][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.365790][ T276] device bridge_slave_1 entered promiscuous mode [ 20.384469][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.391734][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.399088][ T279] device bridge_slave_0 entered promiscuous mode [ 20.409953][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.417153][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.424785][ T278] device bridge_slave_0 entered promiscuous mode [ 20.438158][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.445418][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.453123][ T279] device bridge_slave_1 entered promiscuous mode [ 20.472360][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.479419][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.486985][ T278] device bridge_slave_1 entered promiscuous mode [ 20.570574][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.577653][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.585109][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.592246][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.617282][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.624334][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.631663][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.639093][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.661757][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.668832][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.676169][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.683504][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.692247][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.699405][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.706622][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.713682][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.741570][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.749102][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.756272][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.763546][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.770681][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.779208][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.786322][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.793949][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.801341][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.831583][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.840058][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.847097][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.854407][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.862932][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.870525][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.878187][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.886155][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.893934][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.914276][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.922788][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.931314][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.938430][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.945860][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.954095][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.961119][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.969960][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.996217][ T279] device veth0_vlan entered promiscuous mode [ 21.003876][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.012310][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.020599][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.028724][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.036136][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.043643][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.052235][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.059295][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.066615][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.074684][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.082911][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.090110][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.097585][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.105535][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.113466][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.121321][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.129554][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.136547][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.144026][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.152141][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.159158][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.170732][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.178368][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.205332][ T279] device veth1_macvtap entered promiscuous mode [ 21.213491][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.222509][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.230909][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.239551][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.247544][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.255993][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.264486][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.272988][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.281632][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.290058][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.298368][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.305912][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.313915][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.321909][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.329660][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.337707][ T275] device veth0_vlan entered promiscuous mode [ 21.347122][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.355697][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.363910][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.371036][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.387925][ T277] device veth0_vlan entered promiscuous mode [ 21.397261][ T275] device veth1_macvtap entered promiscuous mode [ 21.404342][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.412725][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.422225][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.430914][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.439273][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.447773][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.455916][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.464279][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.471941][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.480287][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.488378][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.496635][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.504979][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.512073][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.519846][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.527826][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.544449][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.553024][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.562734][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.572105][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.581663][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.590099][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.598554][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.606679][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.616373][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.624817][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.638010][ T277] device veth1_macvtap entered promiscuous mode [ 21.644823][ T279] request_module fs-gadgetfs succeeded, but still no fs? [ 21.656030][ T279] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 21.657800][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.675018][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.695774][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.704762][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.713496][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.724439][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.732643][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.741946][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.749905][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.757517][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.764945][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.773140][ T276] device veth0_vlan entered promiscuous mode [ 21.785634][ T278] device veth0_vlan entered promiscuous mode [ 21.796246][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.805047][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.813674][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.822727][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.832079][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.840626][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.862191][ T278] device veth1_macvtap entered promiscuous mode [ 21.881817][ T276] device veth1_macvtap entered promiscuous mode [ 21.894297][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.904100][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.912584][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.920696][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.928919][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.937957][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.946739][ C0] hrtimer: interrupt took 24370 ns [ 21.995117][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.007552][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.016103][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.030088][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.039356][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.047721][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.059245][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.069257][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.439535][ T328] device sit0 entered promiscuous mode [ 22.496499][ T329] @ÿ: renamed from bond_slave_0 [ 22.710946][ T361] device syzkaller0 entered promiscuous mode [ 24.451792][ T417] device sit0 entered promiscuous mode [ 24.670349][ T423] device syzkaller0 entered promiscuous mode [ 24.769425][ T24] kauditd_printk_skb: 43 callbacks suppressed [ 24.769437][ T24] audit: type=1400 audit(1762653403.550:117): avc: denied { create } for pid=433 comm="syz.3.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 24.906549][ T24] audit: type=1400 audit(1762653403.670:118): avc: denied { ioctl } for pid=426 comm="syz.4.35" path="mnt:[4026532283]" dev="nsfs" ino=4026532283 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 25.143987][ T447] device sit0 entered promiscuous mode [ 25.239735][ T454] syz.1.41[454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.239787][ T454] syz.1.41[454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.619438][ T469] device veth0_vlan left promiscuous mode [ 25.636862][ T469] device veth0_vlan entered promiscuous mode [ 25.664283][ T480] device pim6reg1 entered promiscuous mode [ 25.993110][ T24] audit: type=1400 audit(1762653404.770:119): avc: denied { create } for pid=498 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 26.013226][ T499] device pim6reg1 entered promiscuous mode [ 26.026486][ T24] audit: type=1400 audit(1762653404.800:120): avc: denied { tracepoint } for pid=500 comm="syz.2.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 26.079265][ T24] audit: type=1400 audit(1762653404.830:121): avc: denied { create } for pid=503 comm="syz.4.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 26.103662][ T24] audit: type=1400 audit(1762653404.840:122): avc: denied { create } for pid=489 comm="syz.0.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 26.215684][ T538] device pim6reg1 entered promiscuous mode [ 26.426484][ T24] audit: type=1400 audit(1762653405.200:123): avc: denied { create } for pid=547 comm="syz.3.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 26.684341][ T548] device syzkaller0 entered promiscuous mode [ 27.025233][ T24] audit: type=1400 audit(1762653405.800:124): avc: denied { create } for pid=599 comm="syz.4.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 27.442078][ T612] device pim6reg1 entered promiscuous mode [ 27.642942][ T620] cgroup: syz.4.81 (620) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 27.767488][ T620] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 28.488462][ T661] device sit0 entered promiscuous mode [ 28.592525][ T674] device veth0_vlan left promiscuous mode [ 28.625645][ T674] device veth0_vlan entered promiscuous mode [ 28.632602][ T24] audit: type=1400 audit(1762653407.420:125): avc: denied { write } for pid=679 comm="syz.2.100" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.660016][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.687421][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.707698][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.820407][ T24] audit: type=1400 audit(1762653407.600:126): avc: denied { create } for pid=684 comm="syz.3.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 29.333643][ T711] IPv6: pim6reg1: Disabled Multicast RS [ 30.407249][ T747] device sit0 left promiscuous mode [ 30.495532][ T758] device ip6gretap0 entered promiscuous mode [ 30.756760][ T776] device veth1_macvtap left promiscuous mode [ 31.469200][ T801] syz.4.135 (801) used obsolete PPPIOCDETACH ioctl [ 31.600996][ T24] kauditd_printk_skb: 1 callbacks suppressed [ 31.601007][ T24] audit: type=1400 audit(1762653410.380:128): avc: denied { create } for pid=810 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 31.705229][ T821] device sit0 left promiscuous mode [ 32.130562][ T24] audit: type=1400 audit(1762653410.910:129): avc: denied { create } for pid=820 comm="syz.3.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 32.184776][ T828] device sit0 entered promiscuous mode [ 32.522564][ T837] device pim6reg1 entered promiscuous mode [ 32.622302][ T845] device veth1_macvtap left promiscuous mode [ 32.662848][ T843] device wg2 entered promiscuous mode [ 33.251098][ T873] device sit0 left promiscuous mode [ 33.410693][ T873] device sit0 entered promiscuous mode [ 33.459900][ T24] audit: type=1400 audit(1762653412.240:130): avc: denied { create } for pid=884 comm="syz.3.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 33.571415][ T894] device syzkaller0 entered promiscuous mode [ 34.031414][ T907] device syzkaller0 entered promiscuous mode [ 34.377677][ T929] device sit0 left promiscuous mode [ 34.672096][ T936] device syzkaller0 entered promiscuous mode [ 34.705140][ T929] device sit0 entered promiscuous mode [ 34.983136][ T957] device veth0_vlan left promiscuous mode [ 35.032684][ T957] device veth0_vlan entered promiscuous mode [ 36.312378][ T24] audit: type=1400 audit(1762653415.090:131): avc: denied { create } for pid=1038 comm="syz.2.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 36.456879][ T1029] device pim6reg1 entered promiscuous mode [ 36.818759][ T1080] device sit0 left promiscuous mode [ 36.845052][ T1080] device sit0 entered promiscuous mode [ 37.104878][ T24] audit: type=1400 audit(1762653415.880:132): avc: denied { create } for pid=1088 comm="syz.1.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 37.290274][ T1093] syz.1.214[1093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.292361][ T1093] syz.1.214[1093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.534772][ T1098] device syzkaller0 entered promiscuous mode [ 37.729770][ T1118] device pim6reg1 entered promiscuous mode [ 37.795223][ T1121] tun0: tun_chr_ioctl cmd 1074025681 [ 39.370833][ T1229] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.380253][ T1229] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.438835][ T24] audit: type=1400 audit(1762653418.220:133): avc: denied { create } for pid=1232 comm="syz.2.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 39.838364][ T1251] device sit0 left promiscuous mode [ 40.887473][ T1314] ------------[ cut here ]------------ [ 40.892978][ T1314] trace type BPF program uses run-time allocation [ 40.899630][ T1314] WARNING: CPU: 0 PID: 1314 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 40.911137][ T1314] Modules linked in: [ 40.915165][ T1314] CPU: 0 PID: 1314 Comm: syz.1.277 Not tainted syzkaller #0 [ 40.922671][ T1314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 40.933058][ T1314] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 40.952630][ T1314] Code: 85 e9 14 fe ff ff e8 99 fa ef ff 31 c0 e9 15 fe ff ff e8 8d fa ef ff c6 05 34 c9 2c 05 01 48 c7 c7 80 7a 05 85 e8 7a a4 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 40.976190][ T1314] RSP: 0018:ffffc90000e67468 EFLAGS: 00010246 [ 40.985466][ T1314] RAX: 531ae72d3dc47700 RBX: 0000000000000001 RCX: 0000000000080000 [ 40.993985][ T1314] RDX: ffffc9000155b000 RSI: 0000000000003047 RDI: 0000000000003048 [ 41.002555][ T1314] RBP: ffffc90000e674b0 R08: dffffc0000000000 R09: ffffed103ee0a5f8 [ 41.010786][ T1314] R10: ffffed103ee0a5f8 R11: 1ffff1103ee0a5f7 R12: ffff888119870000 [ 41.019162][ T1314] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88810f1c6800 [ 41.027671][ T1314] FS: 00007eff81a276c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 41.037205][ T1314] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 41.043923][ T1314] CR2: 0000001b2e123ffc CR3: 0000000130576000 CR4: 00000000003506a0 [ 41.052478][ T1314] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000200000000300 [ 41.060857][ T1314] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 41.069048][ T1314] Call Trace: [ 41.072412][ T1314] ? __fdget+0x1a1/0x230 [ 41.076686][ T1314] resolve_pseudo_ldimm64+0x526/0x1020 [ 41.082409][ T1314] ? bpf_check+0xd680/0xd680 [ 41.087164][ T1314] ? kvmalloc_node+0x88/0x130 [ 41.092031][ T1314] bpf_check+0x8d4b/0xd680 [ 41.096649][ T24] audit: type=1400 audit(1762653419.870:134): avc: denied { create } for pid=1321 comm="syz.3.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 41.117703][ T1314] ? bpf_get_btf_vmlinux+0x60/0x60 [ 41.122948][ T1314] ? 0xffffffffa0016000 [ 41.127676][ T1314] ? is_bpf_text_address+0x177/0x190 [ 41.133007][ T1314] ? selinux_bpf_prog_alloc+0x51/0x140 [ 41.138683][ T1314] ? __kernel_text_address+0xa0/0x100 [ 41.144351][ T1314] ? unwind_get_return_address+0x4d/0x90 [ 41.150220][ T1314] ? stack_trace_save+0xe0/0xe0 [ 41.155354][ T1314] ? arch_stack_walk+0xee/0x140 [ 41.160714][ T1314] ? stack_trace_save+0x98/0xe0 [ 41.166296][ T1314] ? stack_trace_snprint+0xf0/0xf0 [ 41.171635][ T1314] ? __kasan_slab_alloc+0x69/0xf0 [ 41.176904][ T1314] ? pcpu_block_update+0x53b/0x900 [ 41.182060][ T1314] ? selinux_bpf_prog_alloc+0x51/0x140 [ 41.187821][ T1314] ? __kasan_kmalloc+0xec/0x110 [ 41.218419][ T1314] ? __kasan_kmalloc+0xda/0x110 [ 41.223452][ T1314] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 41.229669][ T1314] ? selinux_bpf_prog_alloc+0x51/0x140 [ 41.236464][ T1314] ? security_bpf_prog_alloc+0x62/0x90 [ 41.242987][ T1314] ? bpf_prog_load+0x949/0x1420 [ 41.248353][ T1314] ? __se_sys_bpf+0x442/0x680 [ 41.253044][ T1314] ? __x64_sys_bpf+0x7b/0x90 [ 41.257928][ T1314] ? do_syscall_64+0x31/0x40 [ 41.262540][ T1314] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 41.269031][ T1314] ? memset+0x35/0x40 [ 41.277260][ T1314] ? bpf_obj_name_cpy+0x193/0x1e0 [ 41.283603][ T1314] bpf_prog_load+0xf5a/0x1420 [ 41.288590][ T1314] ? map_freeze+0x320/0x320 [ 41.293177][ T1314] ? selinux_bpf+0xc7/0xf0 [ 41.304881][ T1314] ? security_bpf+0x82/0xa0 [ 41.309663][ T1314] __se_sys_bpf+0x442/0x680 [ 41.333501][ T1314] ? __x64_sys_bpf+0x90/0x90 [ 41.359962][ T1329] syz.2.280 uses obsolete (PF_INET,SOCK_PACKET) [ 41.367645][ T1314] ? __kasan_check_read+0x11/0x20 [ 41.378583][ T1314] __x64_sys_bpf+0x7b/0x90 [ 41.383185][ T1314] do_syscall_64+0x31/0x40 [ 41.388036][ T1314] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 41.396675][ T1314] RIP: 0033:0x7eff82fbf6c9 [ 41.405637][ T1314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.426831][ T1314] RSP: 002b:00007eff81a27038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 41.439117][ T1314] RAX: ffffffffffffffda RBX: 00007eff83215fa0 RCX: 00007eff82fbf6c9 [ 41.455950][ T1314] RDX: 0000000000000094 RSI: 0000200000000500 RDI: 0000000000000005 [ 41.483304][ T1314] RBP: 00007eff83041f91 R08: 0000000000000000 R09: 0000000000000000 [ 41.496958][ T1314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 41.536869][ T1314] R13: 00007eff83216038 R14: 00007eff83215fa0 R15: 00007ffd3d22ace8 [ 41.547212][ T1314] ---[ end trace b1a1283b6392ed3f ]--- [ 43.260730][ T24] audit: type=1400 audit(1762653422.040:135): avc: denied { create } for pid=1442 comm="syz.1.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 43.428809][ T1453] device veth1_macvtap left promiscuous mode [ 43.438471][ T1453] device veth1_macvtap entered promiscuous mode [ 43.445200][ T1453] device macsec0 entered promiscuous mode [ 52.973399][ T1482] syz.4.330[1482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.973452][ T1482] syz.4.330[1482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.078042][ T1483] syz.4.330[1483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.644587][ T1512] device syzkaller0 entered promiscuous mode [ 53.749803][ T24] audit: type=1400 audit(1762653432.530:136): avc: denied { write } for pid=1511 comm="syz.2.337" name="cgroup.subtree_control" dev="cgroup2" ino=342 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 53.821854][ T24] audit: type=1400 audit(1762653432.600:137): avc: denied { open } for pid=1511 comm="syz.2.337" path="" dev="cgroup2" ino=342 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 53.965488][ T1516] device sit0 entered promiscuous mode [ 54.045053][ T24] audit: type=1400 audit(1762653432.820:138): avc: denied { create } for pid=1520 comm="syz.3.340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 54.388322][ T24] audit: type=1400 audit(1762653433.160:139): avc: denied { ioctl } for pid=1544 comm="syz.2.345" path="socket:[19419]" dev="sockfs" ino=19419 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 55.027357][ T24] audit: type=1400 audit(1762653433.810:140): avc: denied { create } for pid=1578 comm="syz.3.354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 55.114140][ T1586] device sit0 left promiscuous mode [ 55.163433][ T1597] device pim6reg1 entered promiscuous mode [ 55.188057][ T1586] device sit0 entered promiscuous mode [ 55.842917][ T1647] device syzkaller0 entered promiscuous mode [ 56.167452][ T24] audit: type=1400 audit(1762653434.950:141): avc: denied { create } for pid=1655 comm="syz.4.373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 56.701840][ T24] audit: type=1400 audit(1762653435.480:142): avc: denied { create } for pid=1678 comm="syz.0.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 56.741186][ T1682] device syzkaller0 entered promiscuous mode [ 57.044901][ T1694] device syzkaller0 entered promiscuous mode [ 57.340310][ T1699] device pim6reg1 entered promiscuous mode [ 57.385277][ T24] audit: type=1400 audit(1762653436.160:143): avc: denied { create } for pid=1700 comm="syz.0.384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 57.436117][ T1701] device sit0 entered promiscuous mode [ 57.639329][ T24] audit: type=1400 audit(1762653436.420:144): avc: denied { create } for pid=1710 comm="syz.3.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 58.414968][ T1761] device wg2 left promiscuous mode [ 58.427528][ T1763] syz.2.402[1763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.427586][ T1763] syz.2.402[1763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.526113][ T1761] syz.2.402[1761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.558034][ T1761] syz.2.402[1761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.650068][ T1861] device pim6reg1 entered promiscuous mode [ 59.739861][ T1873] device pim6reg1 entered promiscuous mode [ 59.753052][ T1874] device veth1_macvtap left promiscuous mode [ 59.762697][ T1874] device macsec0 entered promiscuous mode [ 59.931227][ T24] audit: type=1400 audit(1762653438.710:145): avc: denied { create } for pid=1882 comm="syz.4.436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 60.236927][ T1926] device wg2 entered promiscuous mode [ 60.289208][ T1930] device pim6reg1 entered promiscuous mode [ 60.354686][ T24] audit: type=1400 audit(1762653439.130:146): avc: denied { create } for pid=1927 comm="syz.4.447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 60.375278][ T1929] device sit0 left promiscuous mode [ 61.599171][ T1995] device syzkaller0 entered promiscuous mode [ 61.607081][ T1992] device pim6reg1 entered promiscuous mode [ 62.468173][ T2046] device wg2 entered promiscuous mode [ 62.943679][ T24] audit: type=1400 audit(1762653441.720:147): avc: denied { create } for pid=2078 comm="syz.2.491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 64.369989][ T279] cgroup: fork rejected by pids controller in /syz3 [ 64.919564][ T2139] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.963769][ T2139] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.972495][ T2139] device bridge_slave_0 entered promiscuous mode [ 65.004413][ T2139] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.011621][ T2139] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.019340][ T2139] device bridge_slave_1 entered promiscuous mode [ 65.202885][ T24] audit: type=1400 audit(1762653443.980:148): avc: denied { write } for pid=2139 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 65.231714][ T24] audit: type=1400 audit(1762653444.010:149): avc: denied { read } for pid=2139 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 65.350422][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.388909][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.467707][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.492232][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.508301][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.515658][ T303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.553872][ T2161] ±ÿ: renamed from team_slave_1 [ 65.706850][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.714626][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.774491][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.807161][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.814383][ T303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.868158][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 65.914863][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 65.933202][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 65.968453][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 65.983360][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.042183][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.080415][ T2139] device veth0_vlan entered promiscuous mode [ 66.147823][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 66.176085][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 66.232104][ T2139] device veth1_macvtap entered promiscuous mode [ 66.388270][ T2188] device syzkaller0 entered promiscuous mode [ 66.464777][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 66.494525][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 66.539596][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 66.565444][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 66.588495][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 66.651305][ T2197] device wg2 entered promiscuous mode [ 66.802239][ T24] audit: type=1400 audit(1762653445.580:150): avc: denied { create } for pid=2201 comm="syz.4.522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 66.853727][ T2199] device syzkaller0 entered promiscuous mode [ 66.891666][ T7] device bridge_slave_1 left promiscuous mode [ 66.908468][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.939058][ T7] device bridge_slave_0 left promiscuous mode [ 66.967206][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.332836][ T24] audit: type=1400 audit(1762653446.110:151): avc: denied { create } for pid=2209 comm="syz.0.524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 68.093771][ T2239] device veth0_vlan left promiscuous mode [ 68.129744][ T2239] device veth0_vlan entered promiscuous mode [ 68.153773][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.165773][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.197326][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.714203][ T24] audit: type=1400 audit(1762653447.490:152): avc: denied { create } for pid=2294 comm="syz.4.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 68.834406][ T2293] device pim6reg1 entered promiscuous mode [ 69.580015][ T2324] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.587692][ T2324] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.513771][ T2422] device veth0_vlan left promiscuous mode [ 70.530510][ T2422] device veth0_vlan entered promiscuous mode [ 70.618127][ T2432] device syzkaller0 entered promiscuous mode [ 71.427464][ T2461] device syzkaller0 entered promiscuous mode [ 71.447868][ T2474] device wg2 left promiscuous mode [ 71.653581][ T2480] device pim6reg1 entered promiscuous mode [ 71.674861][ T2494] : renamed from pim6reg1 [ 72.272269][ T2533] device syzkaller0 entered promiscuous mode [ 73.609093][ T2661] device syzkaller0 entered promiscuous mode [ 75.526955][ T2772] device syzkaller0 entered promiscuous mode [ 76.697890][ T2832] device pim6reg1 entered promiscuous mode [ 77.347264][ T2894] device sit0 entered promiscuous mode [ 77.928766][ T24] audit: type=1400 audit(1762653456.710:153): avc: denied { ioctl } for pid=2923 comm="syz.4.717" path="" dev="cgroup2" ino=165 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 79.778961][ T3005] device syzkaller0 entered promiscuous mode [ 79.932906][ T3025] tap0: tun_chr_ioctl cmd 1074025677 [ 79.939441][ T3025] tap0: linktype set to 774 [ 80.148723][ T3035] device veth0_vlan left promiscuous mode [ 80.166524][ T3035] device veth0_vlan entered promiscuous mode [ 80.189199][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 80.197709][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 80.205312][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 82.577856][ T3158] device pim6reg1 entered promiscuous mode [ 82.904155][ T3170] device veth0_vlan left promiscuous mode [ 82.960295][ T3170] device veth0_vlan entered promiscuous mode [ 83.029640][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.054392][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.091042][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.845342][ T3242] device sit0 entered promiscuous mode [ 86.674653][ T3325] device wg2 entered promiscuous mode [ 86.928524][ T3342] device pim6reg1 entered promiscuous mode [ 88.398180][ T3421] device syzkaller0 entered promiscuous mode [ 88.448500][ T3430] device syzkaller0 entered promiscuous mode [ 89.808083][ T3555] device veth1_macvtap left promiscuous mode [ 89.823052][ T3555] device macsec0 left promiscuous mode [ 89.839822][ T3555] device veth1_macvtap entered promiscuous mode [ 89.851547][ T3555] device macsec0 entered promiscuous mode [ 90.718938][ T3604] device macsec0 entered promiscuous mode [ 91.144540][ T3644] cgroup: fork rejected by pids controller in /syz4 [ 91.277148][ T3650] device syzkaller0 entered promiscuous mode [ 91.469754][ T3667] device sit0 left promiscuous mode [ 91.725645][ T3672] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.733100][ T3672] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.742112][ T3672] device bridge_slave_0 entered promiscuous mode [ 91.751394][ T3672] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.758574][ T3672] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.766176][ T3672] device bridge_slave_1 entered promiscuous mode [ 91.952065][ T3701] device syzkaller0 entered promiscuous mode [ 92.034642][ T3672] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.041949][ T3672] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.049297][ T3672] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.056513][ T3672] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.074203][ T3701] device syzkaller0 left promiscuous mode [ 92.158679][ T3716] device pim6reg1 entered promiscuous mode [ 92.178666][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.187284][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.194681][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.228456][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.242142][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.249579][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.258232][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.266488][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.273702][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.301979][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.325967][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.342017][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 92.363012][ T3672] device veth0_vlan entered promiscuous mode [ 92.369596][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.385799][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 92.403305][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.432571][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 92.467845][ T3738] tap0: tun_chr_ioctl cmd 2147767521 [ 92.478841][ T3738] tap0: tun_chr_ioctl cmd 2147767520 [ 92.502673][ T3672] device veth1_macvtap entered promiscuous mode [ 92.568387][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 92.608777][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 92.678957][ T9] device bridge_slave_1 left promiscuous mode [ 92.710769][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.727291][ T9] device bridge_slave_0 left promiscuous mode [ 92.742829][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.758861][ T9] device veth1_macvtap left promiscuous mode [ 92.912581][ T3765] device syzkaller0 entered promiscuous mode [ 93.050824][ T3770] device sit0 entered promiscuous mode [ 93.165776][ T3778] device syzkaller0 entered promiscuous mode [ 93.622317][ T3816] device syzkaller0 entered promiscuous mode [ 93.685533][ T3817] device syzkaller0 entered promiscuous mode [ 93.895156][ T3837] device macsec0 left promiscuous mode [ 93.907099][ T3837] device veth1_macvtap entered promiscuous mode [ 93.913898][ T3837] device macsec0 entered promiscuous mode [ 93.962325][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 93.989893][ T3849] device syzkaller0 entered promiscuous mode [ 94.003632][ T3851] device pim6reg1 left promiscuous mode [ 94.131843][ T24] audit: type=1400 audit(1762653472.910:154): avc: denied { create } for pid=3868 comm="syz.3.989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 94.180967][ T3878] device veth0_vlan left promiscuous mode [ 94.190700][ T3878] device veth0_vlan entered promiscuous mode [ 94.210549][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.237240][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.250136][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 94.292682][ T3882] device veth0_vlan left promiscuous mode [ 94.301986][ T3882] device veth0_vlan entered promiscuous mode [ 95.095709][ T3928] device macsec0 entered promiscuous mode [ 95.152393][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 96.438723][ T3986] syz.4.1020[3986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.438804][ T3986] syz.4.1020[3986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.273099][ T4035] device wg2 left promiscuous mode [ 97.390193][ T4045] device pim6reg1 entered promiscuous mode [ 99.333102][ T4126] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.340353][ T4126] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.847504][ T4158] device veth0_vlan left promiscuous mode [ 100.000742][ T4158] device veth0_vlan entered promiscuous mode [ 100.160788][ T4161] device syzkaller0 entered promiscuous mode [ 101.108097][ T4220] device veth0_vlan left promiscuous mode [ 101.125572][ T4220] device veth0_vlan entered promiscuous mode [ 101.187056][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.207844][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.224432][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 101.481374][ T4248] device syzkaller0 entered promiscuous mode [ 101.543081][ T24] audit: type=1400 audit(1762653480.320:155): avc: denied { create } for pid=4262 comm="syz.3.1099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 102.519364][ T4295] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 102.561584][ T4295] device syzkaller0 entered promiscuous mode [ 103.179842][ T4356] device sit0 left promiscuous mode [ 103.202384][ T4342] device syzkaller0 entered promiscuous mode [ 103.310186][ T4356] device sit0 entered promiscuous mode [ 104.040173][ T4384] device syzkaller0 entered promiscuous mode [ 104.142641][ T4391] device sit0 left promiscuous mode [ 104.272117][ T4391] device sit0 entered promiscuous mode [ 105.095835][ T4427] device macsec0 left promiscuous mode [ 105.131918][ T4427] device macsec0 entered promiscuous mode [ 105.373282][ T4457] device sit0 left promiscuous mode [ 105.582036][ T4467] device pim6reg1 entered promiscuous mode [ 109.226625][ T4625] device pim6reg1 entered promiscuous mode [ 110.899140][ T4693] device syzkaller0 entered promiscuous mode [ 111.188041][ T4706] device veth1_macvtap left promiscuous mode [ 111.224320][ T4704] device veth1_macvtap entered promiscuous mode [ 111.247938][ T4704] device macsec0 entered promiscuous mode [ 111.455422][ T4715] device veth1_to_team entered promiscuous mode [ 111.462445][ T24] audit: type=1400 audit(1762653490.240:156): avc: denied { append } for pid=4719 comm="syz.3.1238" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 111.534243][ T4715] device wg2 entered promiscuous mode [ 111.913946][ T4735] syz.3.1243[4735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.914006][ T4735] syz.3.1243[4735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.086447][ T4750] syz.2.1246[4750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.134243][ T4750] syz.2.1246[4750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.516166][ T4788] device pim6reg1 entered promiscuous mode [ 112.740391][ T24] audit: type=1400 audit(1762653491.520:157): avc: denied { create } for pid=4793 comm="syz.4.1258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 113.320859][ T4839] device pim6reg1 entered promiscuous mode [ 113.490299][ T4849] ÿÿÿÿÿÿ: renamed from vlan1 [ 114.501997][ T4902] device syzkaller0 entered promiscuous mode [ 115.135441][ T4919] device syzkaller0 entered promiscuous mode [ 115.621254][ T4940] device pim6reg1 entered promiscuous mode [ 115.673276][ T4938] device bridge_slave_1 left promiscuous mode [ 115.705127][ T4938] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.738298][ T4938] device bridge_slave_0 left promiscuous mode [ 115.777957][ T4938] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.525413][ T4981] device syzkaller0 entered promiscuous mode [ 116.552009][ T367] syzkaller0: tun_net_xmit 48 [ 116.576366][ T4981] syzkaller0: create flow: hash 1635393931 index 0 [ 116.808253][ T4985] syzkaller0 (unregistered): delete flow: hash 1635393931 index 0 [ 117.884831][ T24] audit: type=1400 audit(1762653496.660:158): avc: denied { attach_queue } for pid=5072 comm="syz.1.1333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 118.021687][ T5081] device veth0_vlan left promiscuous mode [ 118.077183][ T5081] device veth0_vlan entered promiscuous mode [ 118.096028][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.118799][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 118.306390][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 119.149640][ T5150] device pim6reg1 entered promiscuous mode [ 119.920262][ T5186] device veth1_macvtap left promiscuous mode [ 119.926565][ T5186] device macsec0 left promiscuous mode [ 122.329591][ T24] audit: type=1400 audit(1762653501.110:159): avc: denied { create } for pid=5269 comm="syz.1.1390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 123.560558][ T5306] device syzkaller0 entered promiscuous mode [ 126.910740][ T5470] device sit0 left promiscuous mode [ 126.963443][ T5471] device sit0 entered promiscuous mode [ 127.097888][ T5488] device veth0_vlan left promiscuous mode [ 127.104531][ T5488] device veth0_vlan entered promiscuous mode [ 127.509413][ T5532] device syzkaller0 entered promiscuous mode [ 127.700303][ T5537] device sit0 left promiscuous mode [ 127.804215][ T5539] device sit0 entered promiscuous mode [ 128.046576][ T5562] device wg2 left promiscuous mode [ 128.071820][ T5563] device wg2 entered promiscuous mode [ 128.429945][ T5587] device wg2 left promiscuous mode [ 129.281611][ T5669] syz.2.1493[5669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.281703][ T5669] syz.2.1493[5669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.566779][ T5700] device syzkaller0 entered promiscuous mode [ 130.558508][ T5757] device syzkaller0 entered promiscuous mode [ 131.120514][ T5807] device veth1_macvtap left promiscuous mode [ 131.159830][ T5808] device veth1_macvtap entered promiscuous mode [ 131.184121][ T5808] device macsec0 entered promiscuous mode [ 132.195790][ T5843] device pim6reg1 entered promiscuous mode [ 132.484402][ T5865] device syzkaller0 entered promiscuous mode [ 132.784786][ T5875] device wg2 entered promiscuous mode [ 133.428255][ T5896] device syzkaller0 entered promiscuous mode [ 134.350998][ T5938] device pim6reg1 left promiscuous mode [ 134.922933][ T5994] device pim6reg1 entered promiscuous mode [ 135.175596][ T5990] device syzkaller0 entered promiscuous mode [ 136.229725][ T6060] syz.2.1601[6060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.229785][ T6060] syz.2.1601[6060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.594396][ T6124] device sit0 left promiscuous mode [ 138.183876][ T6201] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 138.190442][ T6201] syzkaller0: persist disabled [ 138.621994][ T6223] device syzkaller0 entered promiscuous mode [ 139.082634][ T6254] device bridge_slave_1 left promiscuous mode [ 139.094308][ T6254] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.109889][ T6254] device bridge_slave_0 left promiscuous mode [ 139.121716][ T6254] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.941327][ T6267] device syzkaller0 entered promiscuous mode [ 140.501595][ T6309] device syzkaller0 entered promiscuous mode [ 141.419237][ T6366] device syzkaller0 entered promiscuous mode [ 141.744851][ T6390] device pim6reg1 entered promiscuous mode [ 142.240896][ T6420] device pim6reg1 entered promiscuous mode [ 142.380969][ T24] audit: type=1400 audit(1762653521.160:160): avc: denied { create } for pid=6448 comm="syz.3.1713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 142.454430][ T6456] device macsec0 left promiscuous mode [ 142.658155][ T6472] device sit0 entered promiscuous mode [ 143.099001][ T6500] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 143.150577][ T6500] device syzkaller0 entered promiscuous mode [ 143.412733][ T6529] device macsec0 left promiscuous mode [ 143.507581][ T6525] device veth1_macvtap entered promiscuous mode [ 143.560702][ T6525] device macsec0 entered promiscuous mode [ 143.631955][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 144.003352][ T6562] device syzkaller0 entered promiscuous mode [ 144.168268][ T6573] device pim6reg1 entered promiscuous mode [ 144.188738][ T6573] device pim6reg1 left promiscuous mode [ 145.268617][ T24] audit: type=1400 audit(1762653524.050:161): avc: denied { read } for pid=6626 comm="syz.4.1764" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 145.304669][ T24] audit: type=1400 audit(1762653524.080:162): avc: denied { open } for pid=6626 comm="syz.4.1764" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 145.986033][ T6670] device veth1_macvtap left promiscuous mode [ 146.009126][ T6670] device macsec0 left promiscuous mode [ 146.049593][ T6670] device veth1_macvtap entered promiscuous mode [ 146.056357][ T6670] device macsec0 entered promiscuous mode [ 146.118759][ T6670] device wg2 entered promiscuous mode [ 147.011064][ T6723] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 148.338912][ T6796] device pim6reg1 entered promiscuous mode [ 148.395972][ T6792] device sit0 entered promiscuous mode [ 149.162297][ T6857] device syzkaller0 entered promiscuous mode [ 150.501717][ T6912] device syzkaller0 entered promiscuous mode [ 150.819643][ T6938] device veth0_vlan left promiscuous mode [ 150.876572][ T6938] device veth0_vlan entered promiscuous mode [ 150.918511][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 150.936525][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 150.950037][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 151.061187][ T6948] device sit0 left promiscuous mode [ 151.232260][ T6962] device sit0 entered promiscuous mode [ 151.787645][ T7011] device sit0 left promiscuous mode [ 151.820360][ T7011] device sit0 entered promiscuous mode [ 152.129904][ T7021] tap0: tun_chr_ioctl cmd 1074025680 [ 152.295860][ T7034] device wg1 entered promiscuous mode [ 153.621744][ T24] audit: type=1400 audit(1762653532.400:163): avc: denied { ioctl } for pid=7090 comm="syz.3.1894" path="uts:[4026533084]" dev="nsfs" ino=4026533084 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 154.354417][ T7128] device syzkaller0 entered promiscuous mode [ 155.002832][ T7174] device syzkaller0 entered promiscuous mode [ 158.144600][ T7335] device syzkaller0 entered promiscuous mode [ 158.558592][ T7378] device wg2 left promiscuous mode [ 158.686263][ T7378] device wg2 entered promiscuous mode [ 158.846856][ T7409] device pim6reg1 left promiscuous mode [ 159.130042][ T7432] device veth0_vlan left promiscuous mode [ 159.163135][ T7432] device veth0_vlan entered promiscuous mode [ 159.213699][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.229322][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 159.240469][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.389196][ T7473] device pim6reg1 entered promiscuous mode [ 159.496869][ T7488] cgroup: fork rejected by pids controller in /syz0 [ 159.617057][ T7491] ªªªªªª: renamed from vlan0 [ 160.152186][ T7642] device syzkaller0 entered promiscuous mode [ 160.177083][ T7642] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 160.253950][ T7633] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.287822][ T7633] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.347112][ T7633] device bridge_slave_0 entered promiscuous mode [ 160.382076][ T7633] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.435411][ T7633] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.489681][ T7633] device bridge_slave_1 entered promiscuous mode [ 161.086775][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.097123][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.114820][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.136248][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.145100][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.152369][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.176966][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.205798][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.236111][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.243324][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.435260][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.443748][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.452293][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.460851][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.469634][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.492726][ T7633] device veth0_vlan entered promiscuous mode [ 161.507536][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 161.516326][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 161.525436][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 161.534872][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.543437][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.551106][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.576471][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 161.586235][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 161.606638][ T7633] device veth1_macvtap entered promiscuous mode [ 161.634896][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 161.638094][ T24] audit: type=1400 audit(1762653540.420:164): avc: denied { create } for pid=7705 comm="syz.3.2034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 161.645217][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 161.772997][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 161.785928][ T24] audit: type=1400 audit(1762653540.570:165): avc: denied { create } for pid=7715 comm="syz.3.2037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 161.869320][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 161.883674][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 161.967448][ T7720] device pim6reg1 entered promiscuous mode [ 162.213071][ T7743] syz.3.2043[7743] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.213146][ T7743] syz.3.2043[7743] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.264716][ T7738] device syzkaller0 entered promiscuous mode [ 162.312655][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.320090][ T49] device bridge_slave_0 left promiscuous mode [ 162.326479][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.334770][ T49] device veth1_macvtap left promiscuous mode [ 162.340886][ T49] device veth0_vlan left promiscuous mode [ 162.593052][ T7763] device pim6reg1 entered promiscuous mode [ 162.910384][ T7787] device syzkaller0 entered promiscuous mode [ 166.328351][ T8005] device pim6reg1 entered promiscuous mode [ 166.392587][ T8009] device syzkaller0 entered promiscuous mode [ 166.743755][ T8037] device sit0 left promiscuous mode [ 166.802715][ T8037] device sit0 entered promiscuous mode [ 166.897095][ T8047] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 166.944311][ T8030] ±ÿ: renamed from team_slave_1 [ 167.154215][ T8095] device syzkaller0 entered promiscuous mode [ 167.283268][ T8100] device pim6reg1 entered promiscuous mode [ 167.441632][ T8116] device pim6reg1 entered promiscuous mode [ 167.989056][ T8132] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.996397][ T8132] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.157619][ T8132] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.164786][ T8132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.172179][ T8132] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.179224][ T8132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.193306][ T8132] device bridge0 entered promiscuous mode [ 168.212430][ T8137] device pim6reg1 entered promiscuous mode [ 168.434504][ T8148] device syzkaller0 entered promiscuous mode [ 168.950349][ T8330] device syzkaller0 entered promiscuous mode [ 169.627046][ T8385] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 169.633182][ T8385] syzkaller0: linktype set to 778 [ 170.072065][ T8414] device syzkaller0 entered promiscuous mode [ 172.238374][ T8553] device pim6reg1 entered promiscuous mode [ 172.261946][ T8550] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.270567][ T8550] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.376809][ T8560] device bridge_slave_1 left promiscuous mode [ 172.389801][ T8560] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.420428][ T8560] device bridge_slave_0 left promiscuous mode [ 172.431195][ T8560] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.590770][ T8570] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.598132][ T8570] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.617314][ T8570] device bridge0 left promiscuous mode [ 172.627432][ T8576] device bridge_slave_1 left promiscuous mode [ 172.664316][ T8576] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.747735][ T8576] device bridge_slave_0 left promiscuous mode [ 172.754183][ T8576] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.577896][ T8626] device pim6reg1 entered promiscuous mode [ 173.645163][ T8631] device pim6reg1 entered promiscuous mode [ 173.813112][ T24] audit: type=1400 audit(1762653552.590:166): avc: denied { create } for pid=8644 comm="syz.3.2268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 174.233879][ T8652] device syzkaller0 entered promiscuous mode [ 175.470336][ T8717] device syzkaller0 entered promiscuous mode [ 176.499100][ T8743] device sit0 entered promiscuous mode [ 177.247157][ T8798] device sit0 left promiscuous mode [ 177.434064][ T8799] device veth0_vlan left promiscuous mode [ 177.504076][ T8799] device veth0_vlan entered promiscuous mode [ 177.691634][ T8810] device sit0 entered promiscuous mode [ 177.965820][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.984674][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 177.996293][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 178.274632][ T8815] device syzkaller0 entered promiscuous mode [ 178.519230][ T8829] device veth0_vlan left promiscuous mode [ 178.557523][ T8829] device veth0_vlan entered promiscuous mode [ 178.598695][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 178.617940][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 178.645875][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.904332][ T8913] device wg2 left promiscuous mode [ 180.274468][ T8926] device syzkaller0 entered promiscuous mode [ 182.632453][ T9010] device wg2 entered promiscuous mode [ 182.777438][ T9014] device syzkaller0 entered promiscuous mode [ 185.318413][ T9091] device sit0 entered promiscuous mode [ 187.205012][ T9143] device pim6reg1 entered promiscuous mode [ 197.869478][ T276] cgroup: fork rejected by pids controller in /syz1 [ 198.157250][ T9310] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.164430][ T9310] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.172474][ T9310] device bridge_slave_0 entered promiscuous mode [ 198.210968][ T9310] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.220743][ T9310] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.230122][ T9310] device bridge_slave_1 entered promiscuous mode [ 198.252413][ T9319] device sit0 left promiscuous mode [ 198.278593][ T9319] device sit0 entered promiscuous mode [ 198.487932][ T9310] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.495026][ T9310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.502692][ T9310] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.509948][ T9310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.574168][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.581962][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.596627][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.610662][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.619116][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.626392][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.636304][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.645960][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.653051][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.678321][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.686535][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.719589][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.733526][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.842022][ T9310] device veth0_vlan entered promiscuous mode [ 198.864322][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 198.881028][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 198.897457][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 198.914748][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 198.983869][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 199.011211][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.021970][ T9310] device veth1_macvtap entered promiscuous mode [ 199.037077][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 199.081534][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 199.177292][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 199.237259][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 199.245888][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 199.262377][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 199.272222][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 199.357488][ T9391] device sit0 entered promiscuous mode [ 199.994392][ T9425] device syzkaller0 entered promiscuous mode [ 200.074035][ T9454] device veth1_macvtap left promiscuous mode [ 200.084679][ T9454] device macsec0 left promiscuous mode [ 200.167525][ T9454] device veth1_macvtap entered promiscuous mode [ 200.187583][ T9454] device macsec0 entered promiscuous mode [ 200.193477][ T9454] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 200.244486][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 200.642462][ T9468] device syzkaller0 entered promiscuous mode [ 201.180931][ T9510] device veth0_vlan left promiscuous mode [ 201.201136][ T9510] device veth0_vlan entered promiscuous mode [ 201.284245][ T9518] syz.2.2519[9518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.284331][ T9518] syz.2.2519[9518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.044760][ T9670] device syzkaller0 entered promiscuous mode [ 205.225870][ T24] audit: type=1400 audit(1762653584.000:167): avc: denied { create } for pid=9690 comm="syz.4.2596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 SYZFAIL: repeatedly failed to execute the program proc=6 req=2607 state=1 status=7 (errno 9: Bad file descriptor) [ 205.641163][ T24] audit: type=1400 audit(1762653584.420:168): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[14363]" dev="pipefs" ino=14363 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 205.927723][ T9] device veth1_macvtap left promiscuous mode [ 207.457438][ T9] device bridge_slave_1 left promiscuous mode [ 207.463663][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.471452][ T9] device bridge_slave_0 left promiscuous mode [ 207.477617][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.485112][ T9] device bridge_slave_1 left promiscuous mode [ 207.491342][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.498652][ T9] device bridge_slave_0 left promiscuous mode [ 207.504958][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.513525][ T9] device veth1_macvtap left promiscuous mode [ 207.519619][ T9] device veth0_vlan left promiscuous mode [ 207.525646][ T9] device veth1_macvtap left promiscuous mode [ 207.531881][ T9] device veth1_macvtap left promiscuous mode [ 207.537984][ T9] device veth0_vlan left promiscuous mode