last executing test programs: 1.069925195s ago: executing program 1 (id=4240): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r2, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r3, r1, 0x0, r0}, 0x10) 1.01577777s ago: executing program 1 (id=4242): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r0}, &(0x7f00000005c0), &(0x7f0000000600)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x2, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x81}}, 0x0, 0x5, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}, 0x94) 1.01475216s ago: executing program 1 (id=4247): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x840, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x541b, 0x0) 964.748585ms ago: executing program 1 (id=4251): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000100), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r2 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x31, 0x0, 0x0, 0x10, &(0x7f0000000240), &(0x7f00000002c0), 0x8, 0xf3, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x20000002) recvmsg$unix(0xffffffffffffffff, 0x0, 0x1) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) syz_clone(0x40148000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000340)=0x1, 0x12) 803.498661ms ago: executing program 4 (id=4270): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@typedef={0x1, 0x0, 0x0, 0x8, 0x2}, @ptr]}, {0x0, [0x2e]}}, 0x0, 0x33, 0x0, 0x1}, 0x28) 749.922536ms ago: executing program 4 (id=4275): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001840)={0x6, 0x4, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1f}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x7, 0xfffffffffffffffe}]}, &(0x7f0000000000)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb}, 0x94) 749.705357ms ago: executing program 3 (id=4276): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xb, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, [@printk={@d, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x17}}]}, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) 749.483267ms ago: executing program 4 (id=4277): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x24}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) 693.631202ms ago: executing program 3 (id=4279): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1b, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000001800000000000000000000095"], &(0x7f00000008c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 693.458692ms ago: executing program 4 (id=4280): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000000e00008500000031000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 693.311092ms ago: executing program 3 (id=4281): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_bp={0x0, 0x3}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x4c, &(0x7f0000000000), 0x4) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$SIOCSIFHWADDR(r5, 0xff0a, 0x0) 693.029632ms ago: executing program 4 (id=4283): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4d33, 0x110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x40000000010001, 0x8}, 0x0, 0x4, 0xfffffffe, 0x1, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000023c0), 0x0, 0x100, 0x2000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00', 0x400}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 662.016465ms ago: executing program 4 (id=4284): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x2e, &(0x7f0000000000)=r3, 0x4) recvmsg(r3, &(0x7f0000000f40)={0x0, 0x0, 0x0}, 0x40002002) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 656.069166ms ago: executing program 3 (id=4285): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', r1, 0xffffffffffffffff, 0x1, 0x4}, 0x50) 597.581512ms ago: executing program 3 (id=4286): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2501, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x8}, 0x200, 0x15, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10801, 0x800, 0x0, 0x5, 0x0, 0x0, 0x48a, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92344f242b416ae9eeefc0e9c60ebab1b4ddffffff7f82dc2b938189a7ca02f732e4c2eab72bf40c0682fd0a0c4ac106b29e220dc28d0072599456d4c4e6f3fe684ab8373bb4df9d72876ef3834293812e927c01c7da1322da44c7f2ed1084a12f56d1cb39df9858037458a4ca037604007600b6be484e4c9517af216bd8ed42f7dd5adb8e49f4a94608c9a20819e02fc22e6be45574d4ed88b37ab8d7674c644dca2f1b4d745fd95c41f9dfc1adafd1e5a3e7f2e898961cb43e438c4e41ae43ea118e14ffffffffe4b8a80366ce5401ec61921a1b529cc8b99bffffb1ac006c67767b03b95151aeb89e6d4a43c625aa228504e4afd8c1cc3eb215ba22f43115f4d39dc7beedb130d9f2be90133a4500000058b8c9370634060105baa664953514605fba3973aa021945b985a8a66e0200000057033815717b4fdbe55b37cb8d7f41aacfbd4089ea1bd22440f64909a09b5a759a703e71f358e11ac8e13db15d792e604a4f279b3bd6621bdf2c17bc0400001000000000ff8d01006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d095e9c1f973d091c198c1a11edb6b3cc425fe203d2f2655a76865c2c34e2470fcfb1248c0add5431a7fbcb0ef4f66a09af93a09fab1daae4b518d7a5d95a017864010067d6bab101446ebfe3fdeed7ee7bb0749cacf56cf27409c60fca2e0004000000000000a9cb6f4a78444986f9b1ab61f9dab53038010000004abbfc59d6d1b18fe380df4bf024f120bd755d82033f2fb7d8fc9e0de834f7646c8dd27da1297d0c77b294e097e293db7f002c0024ab2fb4d32972cba6f49051cec1ff6f16231bbb90a2d201a500000000000000007700b06fa191ebd3a0c2ef0058ffebd7cc4cf80f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f8107671141ffffffe0c7d8e94a27a06a4e3d9acee835fd0571e5bbb3e6d2b5eba505000000968983811f832dc5390f83e817c64ac4f1f0d0504255c22ee8674053d0e160e5255366139bbe5863e23c3dd42d21f542816edf56a93d0a7e6f08f9ffffff64875fea6ff57ba6ae25c5e8ca4f78d5a01308243b08f1caa46be5244d64f8e875857f083144c642f71cdc8e5634c1360c056430fe77ee7ed7ac1f9743786b2fb8e0fcfcc3d36c93230b7b059bc295aa0e38ff07edc3492b96e73d2060acfd8145e4a5851bc4d6fdc5ad939de5bfce461b42acd7da8842572825d1587795f3879baa88bd194d48e50c84892c97c800d156b059a718f6b10274b077a710f27ab8ee953de70ea860b74a0f3c3dc11177b11cc2e62a95f1ecf607a8dc38e525f415a1bd46b38845ebca04061bacbf627f7975fe599678fee48f83b5989543729e3600000000bc86cd51704f309130f534741377ea7b7bea3c46c0c4c4b7c27c5d057d95ac85a41cdcee8e6fa31f7d2137ed1fb4b21c13b9a2c5e3f7c9ef9e45a35adbf0b9312be929863f000000000000004a82bc080de1f87808d0711dd76f2977ca7f2684bfa5c14a0cd6f1f561e34e4e8e51e81d4a355a7d00d917c16a2bb0cfb284fcfde9015769b9ee2c8ff10e934847604d930f62924d0562ce17f6dadf5053ed8f33092a41bb46e10000000000000008c6d1f62da58c0002ea00000000009aa38a05e70591d5cdab1c488ef3c1984c7c0a566cfc2a080000009ec206a54fb49056a555414178ef00d8b8f3c59f010a5e83415994efcc6ec4b3c275cd6b1b5ff82ef7d7abb1d218e7a1d0afa285706841aac9ccc89df41c39dd58dd70569dde45f8adeaad7d3328fbb6e279f745d2872f0208635e465ca443a6a64c7803760880af23fb3f430a5d11fffc96dd13b951642f1433f65b4e170a62a5f7b7d0f9d5cef0d172a9c43d4aee0001f7a343899434594cc23e1c864164e130754b337e560f285dc670a31241bf657babf0615b85dc200a10294b7d5885b43ac62fc7f97a85586168483427072a535f2c7481ec261c00f725de74e48d9a86f7d4a5d28da3f099ca3e6472b9d7c86d961f525f799b4517141f018af0673b8296f867eca1ec07be11bc497a6f7d2b752bcf77c2908b64630ed5a0c2261bc2d5de6ee174534b8dfc0432ab6bbcf296d36807544aa7c3d3301fe227b713a371414c98695e559f9cbf6b046184064a5f24a4cc6f41f21fc24a3ad7d20a89e00a9dc99a40f890869d35fba3ce6f297661d3f8ba21c65badf55d1859581f9e7ef3e2693b46a8fc85be061ce79aa2832c04dc04de8b6536123b24be2ef80eb06b2db900fb30596c1574bda31f81d61ccfd58080d2330b9c7b87b5d17d48c32daffead3414b91603e250eeedc7d601000000037426f643797be3e93da96b5643d3feed0b7c885d06006b830d7cbf3152f27522f5142dcc84a9e48a07518f0142167abf5d6685d09945cbc778bcc3e7dcfaee5d9c1689a3bafc0d3b51b5a3bfd6007954c36d532960964183842601e5364ecb6ad9168040388c7640bfa2f88643de7eebf4da8d1c3e76daace5217761d933d06bbe9609fcf5971aa1e77c3123910e63daaadd8878ad468eabaf78a96012a4ada1a9cd217fb2a0da2d521454ea9e8fcd3b5badfd6f00003a73345b841d04a02bf441955b932c59608a555bc44873272812e0fb874618a0b56b4cf44990f60000000000000000000000b20000da0ca67905e877893646d185a75582f866785af6b0149e336c31fb177e3e85f4c60cbbde4ce6ea73a95f434328620fa493937386ad2e2a0d60eb815aa05c33e02c32276dab36d14c63af66a31409ab2a403ec387a4e07bd745efa2835a8c932f22aa6da40af9bcdf808b916bc8deb37d5b8c422b65c42d17e61751c561ce775a31b52703d398552694cfbb7d2b3791b030093b321d9f16b2f06676cf94d75cbba6491ae0b5a16ce92320321314d8d2e88d1cd7e7b1216bdaecba309a38e107103e649d46958cc6ba2d660dd41b78d832beb7206ae01508377273ea96e40760410aeed1866971e04f578e9d856d01000000045aea928f5f669be0636dc3f34f90c34531735f271527412d1ae755a9243da523d713071f9370b509a34eeb46415b2f0d271a7072cbd17e293f20132e6c15756e92776c6a0d7c3a9f512ce17edf3f1ea190853bbf93e220a6ce968b79d504c057000e7d8f8249a8158e68a90bbea8bfab2bd3045b9c790984c6fb65fd7887bd8bfcbe663df6b7770000f58fbad41e6eee5c9595950c4172b9c925403b2f99bbf3cb1981bb0d14bded8eae35e08278020a1ec7f508628056fd3d408a02a1cf8594bcbb21a88f477673442804f714212dedd245b9f563b5352fe460a30489b1b6a6d37daead86151492f7fd4b5c64007b68a1b04027eac124478a2ef7f59fe472795785de83578cb96334e0f7c1370dc397d3aa42d937b5718b7610cdcdfe104db7801ec74980b8b111a2748321f81512e4204eb2b024b9fc9e0f257f8c6037b93b2caa236d4354b32434d5a6b01e000000000000000000000087b97a200609c77e0000000000000000d3a54ccd6e13a966801e9341260d6cbce5fe03999214462cbaa297448677ab659102d0f430fbeae119a7ef2e962d2829d4dd2201c4b30d491269594c88252fbd09aced90609851bd9e5c307e7e0d39e73579c1f3563eff1a6237d3699f61acdc8e36010d76093ddd227df1c4181b0a0c4543b4249e9ff2f5e8b5e0ba2048d542de40f643fda4036124b8feb2dd45d0fa52300518c8052cc09ad73f89734fce82cc627356aa2c651ed2644f34cfb832e8b29cf29e895e43b473ddb9a43421b4b25f8bbce8e2d7cb8547d156d5972021ae4c9e30f85413276ddebde55999d2ec3c524632b74d703147ba09e0dcb26c4b89636d28428b67e955f53bfd0c9eebf33a260a9b26477267"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="b0ff02c66b0d698cb89e2fe086dd1f74ffff06000000fe80000000000000ac14140746647b7954c4c06b580febc28eb143d0f6c0bad63a67a04402ba4125c7024f63fdb0b6c8ee826b4dfe6042a2f057c66cad677d850ea9928bcfcb47e585e427746ed3b27c40060cbd030a6d675c9926af53cd3085b24f9b7a486775c4f284f8c5a572ca115bce90c0ee9d4e7a07f5f1518092cb1f156694036f6618a59196631e6303fd5307d1112601d3641c9492f7dc3503416836b14590c53b1fc1ac149b70cc1142d6bc57fc3a76839fa2f96878b520fedfb9f64d81584a2e85ab4f6ec718b02d78f2ebf04e6b3b94610a21616181629a03c3dc0bf05e0a71f887833b81db7a10bc53259cb80716f6804934a411d424c1db98d454be1adb2776fdbb92b299d3b80af6987a871b4549fdb4c8297ee31ad925c8b0fb1a9d2589b08ed52602cbc26b56df71201bc4ea8621c56f33d251c1d4589af2dcd78fbb4e34bde02cb3920a30cee9489ee72c3e19304c16c2110e1839712d484b80abe77786a7e2ba834874a4e16b93dd07297554a06c2ad2c906f8ebb1db8730df096709184728d48f0a806696bd0d4b12d0064b933d9675353dae77fe8419451f85da63be78b70ca2a84a77f572d9f289d4313e6f6039fe756ac13a5d08838315dff44cda433cc7bc6b77449f8c", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) 597.032671ms ago: executing program 3 (id=4289): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) write$cgroup_devices(r0, &(0x7f00000005c0)=ANY=[], 0xfffffeff) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) 366.276454ms ago: executing program 0 (id=4295): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 342.349477ms ago: executing program 0 (id=4296): openat$tun(0xffffffffffffff9c, 0x0, 0x7e7483, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000140), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000380)={[{0x2d, 'cpuset'}]}, 0x8) 330.667988ms ago: executing program 2 (id=4297): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0xb3d8, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 277.605433ms ago: executing program 0 (id=4298): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000f00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)={0x9}, 0x8) 277.270683ms ago: executing program 2 (id=4299): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x11, 0x4, 0x4, 0x9}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r0}, &(0x7f0000000200), &(0x7f0000000300)=r1}, 0x20) 276.998173ms ago: executing program 0 (id=4300): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c250000000000202020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r0, 0x0, 0x7}, 0x18) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 270.615824ms ago: executing program 2 (id=4301): perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x14000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x400000000002, 0x6}, 0x8224, 0x3, 0x200, 0x6, 0x2, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)=@o_path={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x18) 248.958186ms ago: executing program 0 (id=4302): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000400fff800000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x915940ab3f6031c7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r0, 0x18000000000002a0, 0xeff, 0x7, &(0x7f0000001240)="b9ff03076804268c989e14f088a8657986dd", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 205.6503ms ago: executing program 2 (id=4303): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x10, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x10828, 0x0, 0x0, 0x2, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$inet(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x8004) 205.40265ms ago: executing program 0 (id=4304): syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) 205.21135ms ago: executing program 2 (id=4305): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180000000000000000"], &(0x7f0000000280)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f3, &(0x7f0000000080)) 134.303787ms ago: executing program 1 (id=4306): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f7535f7866907dc6751dfb265a0e3ccae669e17fd6587d452d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce935b0f327cb3f011a7d06602e2fd52347125907000000000000003ed38ae89d24e1cebfba2f87925bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df262ad0a97aec7291c25447c106a99893e10db21901eb397b2f5fd71d20fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada12f7a1525320e716660000000000b02b001500a710eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d3294000000000000000000000000000000000000000000000000000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e2df3ad37b729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18a904c0e585a66c3b84b138efc20a546d3d5227e23b03f2a834391ad24fe7d9b20cf92cb151763d41f5c76e2ff3e93ee296c4082ee73e7e197253a2b66c353312c9d75711ce1623e9c54bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1c77a211bfa02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0843b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f04c7f0be31491eb8c9ff68236c8600000000000000000000000066e034c81c3cab4e33fc8dc55ce0ada18dcbf31c6e82893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e75741e39e5cb6a193e06a1043375b0f61b5d4e17c81baa31b924d84f2243471221c15fa12313ffbfa7c2730302b66a99f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94cf438d71873e540be16b6ca20508"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0xf, &(0x7f0000000480)=@ringbuf, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 122.226958ms ago: executing program 2 (id=4307): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getpid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)={0x0, 0x0, 0x5}, 0x4a, 0x0, 0xffffffffffffffff, 0x37}, 0x24) 75.464613ms ago: executing program 32 (id=4307): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getpid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)={0x0, 0x0, 0x5}, 0x4a, 0x0, 0xffffffffffffffff, 0x37}, 0x24) 263.13ТЕs ago: executing program 1 (id=4309): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0xa38, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x7, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="620ac4ff000000007110b30000000000180100002020692500000000002020207b1af8ff00000000bfa10000000000000701000001ffffffb702000008000000b7030000a523ffff850000000600000095"], &(0x7f0000000480)='GPL\x00'}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') 0s ago: executing program 33 (id=4309): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0xa38, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x7, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="620ac4ff000000007110b30000000000180100002020692500000000002020207b1af8ff00000000bfa10000000000000701000001ffffffb702000008000000b7030000a523ffff850000000600000095"], &(0x7f0000000480)='GPL\x00'}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') kernel console output (not intermixed with test programs): ss permissive=1 [ 15.467378][ T30] audit: type=1400 audit(1760653040.029:63): avc: denied { siginh } for pid=223 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.89' (ED25519) to the list of known hosts. [ 22.590003][ T30] audit: type=1400 audit(1760653047.209:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.591435][ T273] cgroup: Unknown subsys name 'net' [ 22.612664][ T30] audit: type=1400 audit(1760653047.209:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.639993][ T30] audit: type=1400 audit(1760653047.239:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.640257][ T273] cgroup: Unknown subsys name 'devices' [ 22.787402][ T273] cgroup: Unknown subsys name 'hugetlb' [ 22.793044][ T273] cgroup: Unknown subsys name 'rlimit' [ 22.993635][ T30] audit: type=1400 audit(1760653047.609:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.016922][ T30] audit: type=1400 audit(1760653047.609:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.041707][ T30] audit: type=1400 audit(1760653047.609:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 23.049306][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 23.073633][ T30] audit: type=1400 audit(1760653047.689:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.099051][ T30] audit: type=1400 audit(1760653047.689:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.151895][ T30] audit: type=1400 audit(1760653047.769:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.177498][ T30] audit: type=1400 audit(1760653047.769:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.177613][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.830094][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.837321][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.844749][ T281] device bridge_slave_0 entered promiscuous mode [ 23.852907][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.860014][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.867510][ T281] device bridge_slave_1 entered promiscuous mode [ 23.925524][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.932601][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.940241][ T282] device bridge_slave_0 entered promiscuous mode [ 23.948014][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.955072][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.962872][ T282] device bridge_slave_1 entered promiscuous mode [ 23.997289][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.004364][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.012085][ T284] device bridge_slave_0 entered promiscuous mode [ 24.027032][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.034107][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.041608][ T283] device bridge_slave_0 entered promiscuous mode [ 24.048378][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.055663][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.063036][ T284] device bridge_slave_1 entered promiscuous mode [ 24.073157][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.080381][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.087899][ T283] device bridge_slave_1 entered promiscuous mode [ 24.186882][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.194077][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.201655][ T285] device bridge_slave_0 entered promiscuous mode [ 24.218251][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.225392][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.232775][ T285] device bridge_slave_1 entered promiscuous mode [ 24.304498][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.311595][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.319055][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.326111][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.383376][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.390472][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.397773][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.404809][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.421180][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.428511][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.436799][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.444075][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.453111][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.460580][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.477160][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.485513][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.492559][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.500052][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.508255][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.515402][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.546360][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.554410][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.573682][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.616024][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.623732][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.632717][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.641860][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.650294][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.657434][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.664856][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.673125][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.680169][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.687675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.695765][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.703872][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.710923][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.718488][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.726756][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.733790][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.741217][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.749232][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.757267][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.775230][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.782972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.791327][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.798408][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.806472][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.814672][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.823077][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.830140][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.837685][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.846105][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.853131][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.861058][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.868871][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.880080][ T281] device veth0_vlan entered promiscuous mode [ 24.887062][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.895925][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.904138][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.911202][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.918750][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.926849][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.944081][ T284] device veth0_vlan entered promiscuous mode [ 24.955752][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.963318][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.971046][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.979672][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.988241][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.996218][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.004202][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.011877][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.030108][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.038704][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.047342][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.055725][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.063698][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.071983][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.080106][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.088287][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.096326][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.104142][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.112305][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.119991][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.129577][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.137867][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.152467][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.160631][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.168724][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.177120][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.185893][ T283] device veth0_vlan entered promiscuous mode [ 25.195365][ T281] device veth1_macvtap entered promiscuous mode [ 25.206713][ T284] device veth1_macvtap entered promiscuous mode [ 25.216102][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.223923][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.231833][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.240326][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.255390][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.263890][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.274288][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.282776][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.291392][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.299702][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.309787][ T282] device veth0_vlan entered promiscuous mode [ 25.316706][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.324649][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.332804][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.341260][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.356661][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.364223][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.371988][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.380321][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.388718][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.397089][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.406676][ T283] device veth1_macvtap entered promiscuous mode [ 25.422149][ T285] device veth0_vlan entered promiscuous mode [ 25.428853][ T281] request_module fs-gadgetfs succeeded, but still no fs? [ 25.436050][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.443712][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.452279][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.460885][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.469145][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.478439][ T282] device veth1_macvtap entered promiscuous mode [ 25.485289][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.493165][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.500856][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.555523][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.565569][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.569482][ C1] hrtimer: interrupt took 26293 ns [ 25.574099][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.588817][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.597375][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.606077][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.614993][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.629735][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.645284][ T285] device veth1_macvtap entered promiscuous mode [ 25.665477][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.673819][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.689001][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.707679][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.719070][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.745939][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.754340][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.780114][ T30] kauditd_printk_skb: 40 callbacks suppressed [ 27.780130][ T30] audit: type=1400 audit(1760653052.399:114): avc: denied { read } for pid=414 comm="syz.1.23" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.912341][ T30] audit: type=1400 audit(1760653052.439:115): avc: denied { open } for pid=414 comm="syz.1.23" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.072151][ T30] audit: type=1400 audit(1760653052.449:116): avc: denied { ioctl } for pid=414 comm="syz.1.23" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x7451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.113035][ T30] audit: type=1400 audit(1760653052.479:117): avc: denied { setopt } for pid=411 comm="syz.4.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.426341][ T30] audit: type=1400 audit(1760653053.039:118): avc: denied { write } for pid=428 comm="syz.1.27" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.815269][ T30] audit: type=1400 audit(1760653054.429:119): avc: denied { create } for pid=488 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 30.849161][ T30] audit: type=1400 audit(1760653055.469:120): avc: denied { create } for pid=546 comm="syz.3.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 32.214945][ T30] audit: type=1400 audit(1760653056.829:121): avc: denied { create } for pid=580 comm="syz.3.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 33.944311][ T30] audit: type=1400 audit(1760653058.559:122): avc: denied { ioctl } for pid=592 comm="syz.2.73" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 34.042191][ T604] syz.4.75[604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.042266][ T604] syz.4.75[604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.375309][ C0] sched: RT throttling activated [ 37.458522][ T611] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.465891][ T611] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.596565][ T613] device bridge_slave_1 left promiscuous mode [ 37.602783][ T613] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.631873][ T613] device bridge_slave_0 left promiscuous mode [ 37.638555][ T613] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.787340][ T621] device sit0 entered promiscuous mode [ 38.263229][ T30] audit: type=1400 audit(1760653062.859:123): avc: denied { create } for pid=642 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 38.380670][ T30] audit: type=1400 audit(1760653062.959:124): avc: denied { create } for pid=644 comm="syz.2.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 39.116845][ T676] device wg2 entered promiscuous mode [ 39.136464][ T30] audit: type=1400 audit(1760653063.739:125): avc: denied { create } for pid=679 comm="syz.4.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 39.232792][ T30] audit: type=1400 audit(1760653063.849:126): avc: denied { create } for pid=679 comm="syz.4.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 39.553976][ T607] syz.3.76 (607) used greatest stack depth: 22144 bytes left [ 39.926998][ T702] device sit0 entered promiscuous mode [ 40.188565][ T30] audit: type=1400 audit(1760653064.809:127): avc: denied { tracepoint } for pid=712 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 40.686397][ T733] device pim6reg1 entered promiscuous mode [ 41.392812][ T30] audit: type=1400 audit(1760653066.009:128): avc: denied { create } for pid=744 comm="syz.4.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 41.624190][ T30] audit: type=1400 audit(1760653066.239:129): avc: denied { create } for pid=758 comm="syz.2.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 44.187485][ T810] device veth0_vlan left promiscuous mode [ 44.282009][ T810] device veth0_vlan entered promiscuous mode [ 44.957408][ T30] audit: type=1400 audit(1760653069.579:130): avc: denied { create } for pid=816 comm="syz.0.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 46.550292][ T853] device pim6reg1 entered promiscuous mode [ 48.224091][ T899] device syzkaller0 entered promiscuous mode [ 48.321178][ T910] device sit0 entered promiscuous mode [ 48.812614][ T924] device veth1_macvtap left promiscuous mode [ 48.882021][ T929] device veth0_vlan left promiscuous mode [ 48.903892][ T929] device veth0_vlan entered promiscuous mode [ 48.988301][ T924] device veth1_macvtap entered promiscuous mode [ 48.999253][ T924] device macsec0 entered promiscuous mode [ 49.763135][ T960] cgroup: fork rejected by pids controller in /syz3 [ 49.846927][ T969] €Т0: renamed from pim6reg1 [ 49.925836][ T282] syz-executor (282) used greatest stack depth: 21792 bytes left [ 50.250971][ T971] device syzkaller0 entered promiscuous mode [ 50.504714][ T981] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.511953][ T981] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.519775][ T981] device bridge_slave_0 entered promiscuous mode [ 50.562932][ T981] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.571872][ T981] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.579673][ T981] device bridge_slave_1 entered promiscuous mode [ 50.684649][ T30] audit: type=1400 audit(1760653075.299:131): avc: denied { create } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 50.705574][ T30] audit: type=1400 audit(1760653075.309:132): avc: denied { write } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 50.726296][ T30] audit: type=1400 audit(1760653075.309:133): avc: denied { read } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 50.729444][ T981] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.753659][ T981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.760984][ T981] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.768053][ T981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.973954][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.981874][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.989318][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.005631][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.015575][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.022665][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.034566][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.042773][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.049863][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.061898][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.142513][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.176971][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.188046][ T981] device veth0_vlan entered promiscuous mode [ 51.204311][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.225035][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 51.234277][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.254067][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.264247][ T981] device veth1_macvtap entered promiscuous mode [ 51.323327][ T875] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 51.346057][ T875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.360341][ T1011] device pim6reg1 entered promiscuous mode [ 51.371089][ T875] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 51.381084][ T875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 51.434422][ T1024] device pim6reg1 entered promiscuous mode [ 51.547732][ T1027] device sit0 entered promiscuous mode [ 52.201175][ T450] device veth1_macvtap left promiscuous mode [ 52.216254][ T450] device veth0_vlan left promiscuous mode [ 53.961428][ T1108] device pim6reg1 entered promiscuous mode [ 54.210338][ T1123] device pim6reg1 entered promiscuous mode [ 54.655849][ T1142] device sit0 entered promiscuous mode [ 55.551144][ T30] audit: type=1400 audit(1760653080.169:134): avc: denied { create } for pid=1169 comm="syz.4.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 55.663136][ T30] audit: type=1400 audit(1760653080.169:135): avc: denied { create } for pid=1169 comm="syz.4.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 55.800285][ T30] audit: type=1400 audit(1760653080.359:136): avc: denied { create } for pid=1178 comm="syz.4.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 55.983858][ T1175] device syzkaller0 entered promiscuous mode [ 56.085115][ T30] audit: type=1400 audit(1760653080.699:137): avc: denied { create } for pid=1189 comm="syz.2.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 56.380482][ T1201] device wg2 entered promiscuous mode [ 56.410653][ T1204] device sit0 left promiscuous mode [ 56.455859][ T30] audit: type=1400 audit(1760653081.069:138): avc: denied { create } for pid=1192 comm="syz.4.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 56.861428][ T1212] device sit0 entered promiscuous mode [ 57.401362][ T1217] device syzkaller0 entered promiscuous mode [ 57.492118][ T1232] device wg2 entered promiscuous mode [ 57.666715][ T1234] device syzkaller0 entered promiscuous mode [ 58.022166][ T1244] veth0_virt_wifi: mtu less than device minimum [ 58.551267][ T1257] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.359396][ T30] audit: type=1400 audit(1760653083.979:139): avc: denied { create } for pid=1276 comm="syz.2.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 59.612524][ T1286] device veth1_macvtap left promiscuous mode [ 59.634094][ T1286] device veth1_macvtap entered promiscuous mode [ 59.646335][ T1286] device macsec0 entered promiscuous mode [ 59.652865][ T30] audit: type=1400 audit(1760653084.269:140): avc: denied { create } for pid=1287 comm="syz.2.269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 59.860124][ T1293] device sit0 left promiscuous mode [ 60.267263][ T1311] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.066199][ T1335] device wg2 left promiscuous mode [ 61.148480][ T1337] device sit0 left promiscuous mode [ 61.660811][ T1341] device syzkaller0 entered promiscuous mode [ 64.302402][ T1427] syz.2.309[1427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.302489][ T1427] syz.2.309[1427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.511009][ T1432] syz.0.320[1432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.615935][ T1432] syz.0.320[1432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.851626][ T1441] device sit0 entered promiscuous mode [ 65.869735][ T1460] device syzkaller0 entered promiscuous mode [ 66.125519][ T1476] tap0: tun_chr_ioctl cmd 2148553947 [ 67.858584][ T1537] sock: sock_set_timeout: `syz.1.340' (pid 1537) tries to set negative timeout [ 72.707700][ T1654] device syzkaller0 entered promiscuous mode [ 73.214389][ T30] audit: type=1400 audit(1760653097.829:141): avc: denied { setattr } for pid=1677 comm="syz.4.380" path="/net/tun" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 73.874973][ T1693] syz.3.383[1693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.877006][ T1693] syz.3.383[1693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.954118][ T1690] syz.4.382 (1690) used obsolete PPPIOCDETACH ioctl [ 74.200155][ T1700] device sit0 entered promiscuous mode [ 74.622559][ T1720] device sit0 left promiscuous mode [ 76.903058][ T1791] device sit0 left promiscuous mode [ 77.481379][ T1816] device pim6reg1 entered promiscuous mode [ 78.835378][ T30] audit: type=1400 audit(1760653103.449:142): avc: denied { create } for pid=1838 comm="syz.2.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 79.216695][ T1845] device sit0 left promiscuous mode [ 79.612140][ T1864] device veth1_macvtap left promiscuous mode [ 80.856520][ T1889] device sit0 left promiscuous mode [ 81.286123][ T1904] device syzkaller0 entered promiscuous mode [ 82.078128][ T1932] device wg2 left promiscuous mode [ 82.137301][ T1928] device wg2 entered promiscuous mode [ 82.428451][ T1956] device syzkaller0 entered promiscuous mode [ 82.436189][ T1955] device macsec0 left promiscuous mode [ 82.443699][ T30] audit: type=1400 audit(1760653107.059:143): avc: denied { create } for pid=1952 comm="syz.3.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 82.906377][ T1977] bond_slave_1: mtu less than device minimum [ 83.908615][ T2011] device pim6reg1 entered promiscuous mode [ 83.999041][ T30] audit: type=1400 audit(1760653108.619:144): avc: denied { ioctl } for pid=2020 comm="syz.1.481" path="socket:[21041]" dev="sockfs" ino=21041 ioctlcmd=0x8924 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 84.165694][ T2027] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.412507][ T2031] device bridge_slave_1 left promiscuous mode [ 84.423636][ T2031] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.441814][ T2031] device bridge_slave_0 left promiscuous mode [ 84.449093][ T2031] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.161542][ T2073] device wg2 left promiscuous mode [ 86.216021][ T2074] device wg2 entered promiscuous mode [ 87.830936][ T2142] device veth1_macvtap left promiscuous mode [ 87.885217][ T2131] device wg2 entered promiscuous mode [ 88.425470][ T2168] device sit0 entered promiscuous mode [ 89.299677][ T30] audit: type=1400 audit(1760653113.899:145): avc: denied { create } for pid=2190 comm="syz.1.526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 89.592611][ T2204] device pim6reg1 entered promiscuous mode [ 90.519690][ T30] audit: type=1400 audit(1760653115.139:146): avc: denied { create } for pid=2208 comm="syz.1.531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 90.694334][ T30] audit: type=1400 audit(1760653115.309:147): avc: denied { append } for pid=2227 comm="syz.3.536" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 90.986275][ T2245] device sit0 entered promiscuous mode [ 92.973117][ T2319] device pim6reg1 entered promiscuous mode [ 94.000415][ T30] audit: type=1400 audit(1760653118.619:148): avc: denied { create } for pid=2349 comm="syz.0.567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 95.019657][ T2399] ip6_vti0: mtu greater than device maximum [ 95.617239][ T2422] device syzkaller0 entered promiscuous mode [ 96.093897][ T2434] device veth0_vlan left promiscuous mode [ 96.120111][ T2434] device veth0_vlan entered promiscuous mode [ 96.140296][ T875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.167309][ T875] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 96.203679][ T875] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 98.001338][ T2474] device syzkaller0 entered promiscuous mode [ 98.153833][ T2493] bond_slave_1: mtu less than device minimum [ 98.523988][ T2498] device syzkaller0 entered promiscuous mode [ 98.560061][ T2492] pim6reg1: tun_chr_ioctl cmd 1074025677 [ 98.580388][ T2492] pim6reg1: linktype set to 780 [ 98.594559][ T2493] pim6reg1: tun_chr_ioctl cmd 1074812117 [ 98.738419][ T2526] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.745700][ T2526] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.929616][ T2535] device syzkaller0 entered promiscuous mode [ 99.200072][ T2560] device wg2 entered promiscuous mode [ 99.698771][ T2601] bond_slave_1: mtu less than device minimum [ 99.710950][ T2616] device pim6reg1 entered promiscuous mode [ 100.628032][ T2639] GPL: port 1(vlan1) entered blocking state [ 100.634312][ T2639] GPL: port 1(vlan1) entered disabled state [ 100.705229][ T2639] device vlan1 entered promiscuous mode [ 101.022929][ T2686] device syzkaller0 entered promiscuous mode [ 103.902950][ T2782] device syzkaller0 left promiscuous mode [ 106.003327][ T2856] ip6_vti0: mtu greater than device maximum [ 106.193808][ T30] audit: type=1400 audit(1760653130.809:149): avc: denied { create } for pid=2861 comm="syz.1.700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 107.958408][ T2920] device pim6reg1 entered promiscuous mode [ 108.344039][ T2925] device sit0 left promiscuous mode [ 108.551614][ T2931] device sit0 entered promiscuous mode [ 109.457201][ T2973] device sit0 entered promiscuous mode [ 110.599299][ T2993] syz.1.733[2993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.599415][ T2993] syz.1.733[2993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.736929][ T3034] device syzkaller0 entered promiscuous mode [ 112.894036][ T3075] syz.0.756[3075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.894117][ T3075] syz.0.756[3075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.926951][ T3078] ip6_vti0: mtu greater than device maximum [ 112.946590][ T3079] syz.1.758[3079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.946665][ T3079] syz.1.758[3079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.895709][ T3099] device veth0_vlan left promiscuous mode [ 114.006269][ T3099] device veth0_vlan entered promiscuous mode [ 114.030146][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.057304][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.130080][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.036420][ T3138] device wg2 left promiscuous mode [ 115.140457][ T3138] device veth0_vlan left promiscuous mode [ 115.195721][ T3138] device veth0_vlan entered promiscuous mode [ 115.273720][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.296122][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.336305][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 117.055092][ T3175] џџџџџџ: renamed from vlan1 [ 117.269537][ T3183] device sit0 left promiscuous mode [ 118.333485][ T3232] device wg2 left promiscuous mode [ 118.477740][ T30] audit: type=1400 audit(1760653143.099:150): avc: denied { create } for pid=3234 comm="syz.0.801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 118.588623][ T3239] bond_slave_1: mtu less than device minimum [ 118.603710][ T3243] device macsec0 entered promiscuous mode [ 119.339083][ T30] audit: type=1400 audit(1760653143.959:151): avc: denied { create } for pid=3283 comm="syz.0.813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 119.454622][ T3288] Т: renamed from pim6reg1 [ 119.932362][ T3311] syz.0.822[3311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.932454][ T3311] syz.0.822[3311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.779691][ T3325] GPL: port 1(erspan0) entered blocking state [ 120.798395][ T30] audit: type=1400 audit(1760653145.419:152): avc: denied { create } for pid=3326 comm="syz.1.825" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 120.993023][ T3325] GPL: port 1(erspan0) entered disabled state [ 121.026066][ T3325] device erspan0 entered promiscuous mode [ 121.340863][ T3335] GPL: port 1(erspan0) entered blocking state [ 121.347058][ T3335] GPL: port 1(erspan0) entered forwarding state [ 121.399907][ T3344] device wg2 entered promiscuous mode [ 121.582310][ T30] audit: type=1400 audit(1760653146.199:153): avc: denied { read } for pid=3354 comm="syz.1.833" dev="nsfs" ino=4026532352 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 121.776353][ T30] audit: type=1400 audit(1760653146.199:154): avc: denied { open } for pid=3354 comm="syz.1.833" path="net:[4026532352]" dev="nsfs" ino=4026532352 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 122.405370][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 122.880217][ T3398] device pim6reg1 entered promiscuous mode [ 123.062443][ T3404] device veth0_vlan left promiscuous mode [ 123.076199][ T3404] device veth0_vlan entered promiscuous mode [ 123.220694][ T3428] cgroup: fork rejected by pids controller in /syz4 [ 123.416193][ T284] syz-executor (284) used greatest stack depth: 21760 bytes left [ 124.146838][ T3464] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.170148][ T3464] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.186086][ T3464] device bridge_slave_0 entered promiscuous mode [ 124.246700][ T3464] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.253793][ T3464] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.272588][ T3464] device bridge_slave_1 entered promiscuous mode [ 124.519517][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 124.559062][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 124.616588][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 124.646600][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 124.692110][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.699276][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 124.799502][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 124.852678][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 124.925621][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.932889][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.036918][ T3506] device veth1_macvtap left promiscuous mode [ 125.043538][ T3506] device macsec0 left promiscuous mode [ 125.102718][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 125.111097][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 125.119748][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 125.168389][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 125.273881][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 125.371511][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.380042][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.388051][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 125.442912][ T3464] device veth0_vlan entered promiscuous mode [ 125.530086][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 125.554611][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 125.567866][ T3464] device veth1_macvtap entered promiscuous mode [ 125.599164][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 125.607538][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 125.618836][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 125.648535][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 125.665815][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 125.840933][ T3533] device pim6reg1 entered promiscuous mode [ 125.986717][ T875] device bridge_slave_1 left promiscuous mode [ 125.993974][ T875] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.005057][ T875] device bridge_slave_0 left promiscuous mode [ 126.017894][ T875] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.031769][ T875] device veth0_vlan left promiscuous mode [ 127.849226][ T3599] device syzkaller0 entered promiscuous mode [ 129.409035][ T3655] device veth0_vlan left promiscuous mode [ 129.415105][ T3655] device veth0_vlan entered promiscuous mode [ 129.499777][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 129.523918][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 129.551702][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 129.610156][ T3665] device wg2 left promiscuous mode [ 129.973509][ T3681] device syzkaller0 entered promiscuous mode [ 130.574400][ T3700] device syzkaller0 entered promiscuous mode [ 130.589342][ T3703] device sit0 entered promiscuous mode [ 131.647422][ T3733] device veth0_vlan left promiscuous mode [ 131.676652][ T3733] device veth0_vlan entered promiscuous mode [ 133.281532][ T3815] device veth1_macvtap entered promiscuous mode [ 133.316480][ T3815] device macsec0 entered promiscuous mode [ 133.346847][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 135.124995][ T3894] device syzkaller0 entered promiscuous mode [ 135.137266][ T3896] device sit0 left promiscuous mode [ 135.264199][ T2903] syzkaller0: tun_net_xmit 48 [ 135.275884][ T3897] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 135.284776][ T3897] syzkaller0: Linktype set failed because interface is up [ 135.379123][ T3913] syz.3.992[3913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.379202][ T3913] syz.3.992[3913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.599863][ T3931] device syzkaller0 entered promiscuous mode [ 136.483012][ T3966] device veth1_macvtap left promiscuous mode [ 136.568945][ T3966] device veth1_macvtap entered promiscuous mode [ 136.593978][ T3966] device macsec0 entered promiscuous mode [ 136.862204][ T3988] device wg2 left promiscuous mode [ 136.957567][ T3996] device wg2 entered promiscuous mode [ 137.131298][ T3976] device pim6reg1 entered promiscuous mode [ 139.286393][ T4094] device veth0_vlan left promiscuous mode [ 139.392521][ T4094] device veth0_vlan entered promiscuous mode [ 139.512760][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.528634][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 139.536696][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 139.724677][ T4099] @џ: renamed from bond_slave_0 [ 141.021368][ T4164] device wg2 left promiscuous mode [ 141.316933][ T4171] device veth0_vlan left promiscuous mode [ 141.356002][ T4171] device veth0_vlan entered promiscuous mode [ 141.496047][ T875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.504426][ T875] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.546886][ T875] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.889021][ T4189] device veth0_vlan left promiscuous mode [ 141.896134][ T4189] device veth0_vlan entered promiscuous mode [ 143.669086][ T4248] device veth0_vlan left promiscuous mode [ 143.690756][ T4248] device veth0_vlan entered promiscuous mode [ 143.735955][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.754810][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.774685][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 144.114265][ T4273] bond_slave_1: mtu less than device minimum [ 144.533580][ T4281] device pim6reg1 entered promiscuous mode [ 144.879532][ T4288] device veth1_macvtap left promiscuous mode [ 144.929975][ T4288] device macsec0 left promiscuous mode [ 144.972336][ T4294] device veth1_macvtap entered promiscuous mode [ 144.978891][ T4294] device macsec0 entered promiscuous mode [ 145.068502][ T4307] device syzkaller0 entered promiscuous mode [ 145.412518][ T4319] device veth0_vlan left promiscuous mode [ 145.483522][ T4319] device veth0_vlan entered promiscuous mode [ 145.768477][ T4335] tun0: tun_chr_ioctl cmd 1074025681 [ 146.557525][ T30] audit: type=1400 audit(1760653171.179:155): avc: denied { setattr } for pid=4379 comm="syz.3.1125" path="pipe:[17325]" dev="pipefs" ino=17325 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 148.406963][ T4466] device veth1_macvtap left promiscuous mode [ 148.485685][ T4466] device macsec0 left promiscuous mode [ 149.887675][ T4513] device syzkaller0 entered promiscuous mode [ 149.976320][ T4532] device veth1_macvtap left promiscuous mode [ 150.827398][ T4572] device sit0 entered promiscuous mode [ 151.421720][ T4599] bond_slave_1: mtu less than device minimum [ 152.028830][ T4607] device veth0_vlan left promiscuous mode [ 152.081580][ T4607] device veth0_vlan entered promiscuous mode [ 153.598123][ T4665] device veth0_vlan left promiscuous mode [ 153.606291][ T4665] device veth0_vlan entered promiscuous mode [ 155.665692][ T4705] device veth1_macvtap left promiscuous mode [ 155.679780][ T4705] device macsec0 left promiscuous mode [ 156.625423][ T4727] device veth0_vlan left promiscuous mode [ 156.699238][ T4727] device veth0_vlan entered promiscuous mode [ 158.344615][ T4768] device syzkaller0 entered promiscuous mode [ 161.658476][ T4846] device sit0 left promiscuous mode [ 162.110998][ T4879] device sit0 entered promiscuous mode [ 162.270975][ T4882] device sit0 left promiscuous mode [ 162.464527][ T4884] device sit0 entered promiscuous mode [ 162.482946][ T4886] device sit0 entered promiscuous mode [ 164.296616][ T4961] syz.4.1285[4961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.296755][ T4961] syz.4.1285[4961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.523643][ T4961] device syzkaller0 entered promiscuous mode [ 167.361367][ T5046] device wg2 entered promiscuous mode [ 167.550863][ T5059] device syzkaller0 entered promiscuous mode [ 169.054454][ T5169] tap0: tun_chr_ioctl cmd 1074025680 [ 169.132251][ T30] audit: type=1400 audit(1760653193.749:156): avc: denied { write } for pid=5184 comm="syz.2.1338" name="cgroup.subtree_control" dev="cgroup2" ino=298 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 169.203675][ T30] audit: type=1400 audit(1760653193.749:157): avc: denied { open } for pid=5184 comm="syz.2.1338" path="" dev="cgroup2" ino=298 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 169.250501][ T5183] device syzkaller0 entered promiscuous mode [ 169.306580][ T30] audit: type=1400 audit(1760653193.749:158): avc: denied { ioctl } for pid=5184 comm="syz.2.1338" path="" dev="cgroup2" ino=298 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 169.412073][ T5195] device sit0 left promiscuous mode [ 169.471060][ T5195] device ip6tnl0 entered promiscuous mode [ 169.583877][ T5200] device sit0 left promiscuous mode [ 169.746163][ T5201] device sit0 entered promiscuous mode [ 170.735501][ T5243] device wg2 left promiscuous mode [ 170.865164][ T5243] device wg2 entered promiscuous mode [ 172.082861][ T5288] device wg2 left promiscuous mode [ 172.166625][ T5280] device wg2 entered promiscuous mode [ 172.202421][ T5307] device sit0 left promiscuous mode [ 172.307483][ T5307] device sit0 entered promiscuous mode [ 172.334860][ T5314] syz.1.1371[5314] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.334938][ T5314] syz.1.1371[5314] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.704243][ T5325] FAULT_INJECTION: forcing a failure. [ 172.704243][ T5325] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 172.986835][ T5325] CPU: 1 PID: 5325 Comm: syz.3.1374 Not tainted syzkaller #0 [ 172.994297][ T5325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 173.004398][ T5325] Call Trace: [ 173.007709][ T5325] [ 173.010661][ T5325] __dump_stack+0x21/0x30 [ 173.015054][ T5325] dump_stack_lvl+0xee/0x150 [ 173.019671][ T5325] ? show_regs_print_info+0x20/0x20 [ 173.024898][ T5325] ? dump_stack+0x9/0x20 [ 173.029168][ T5325] dump_stack+0x15/0x20 [ 173.033354][ T5325] should_fail+0x3c1/0x510 [ 173.037816][ T5325] should_fail_usercopy+0x1a/0x20 [ 173.042869][ T5325] _copy_from_user+0x20/0xd0 [ 173.047512][ T5325] __sys_bpf+0x233/0x730 [ 173.051778][ T5325] ? bpf_link_show_fdinfo+0x310/0x310 [ 173.057175][ T5325] __x64_sys_bpf+0x7c/0x90 [ 173.061608][ T5325] x64_sys_call+0x4b9/0x9a0 [ 173.066131][ T5325] do_syscall_64+0x4c/0xa0 [ 173.070572][ T5325] ? clear_bhb_loop+0x50/0xa0 [ 173.075269][ T5325] ? clear_bhb_loop+0x50/0xa0 [ 173.079969][ T5325] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 173.085899][ T5325] RIP: 0033:0x7f6aa48f6ec9 [ 173.090332][ T5325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 173.109974][ T5325] RSP: 002b:00007f6aa335f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 173.118420][ T5325] RAX: ffffffffffffffda RBX: 00007f6aa4b4dfa0 RCX: 00007f6aa48f6ec9 [ 173.126412][ T5325] RDX: 0000000000000038 RSI: 0000200000000380 RDI: 000000000000001a [ 173.134399][ T5325] RBP: 00007f6aa335f090 R08: 0000000000000000 R09: 0000000000000000 [ 173.142387][ T5325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.150377][ T5325] R13: 00007f6aa4b4e038 R14: 00007f6aa4b4dfa0 R15: 00007ffd0ed0cdb8 [ 173.158386][ T5325] [ 173.959753][ T5384] ЊЊЊЊЊЊ: renamed from vlan0 [ 174.308218][ T5396] FAULT_INJECTION: forcing a failure. [ 174.308218][ T5396] name failslab, interval 1, probability 0, space 0, times 1 [ 174.369283][ T5396] CPU: 0 PID: 5396 Comm: syz.2.1393 Not tainted syzkaller #0 [ 174.376757][ T5396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 174.386862][ T5396] Call Trace: [ 174.390168][ T5396] [ 174.393119][ T5396] __dump_stack+0x21/0x30 [ 174.397493][ T5396] dump_stack_lvl+0xee/0x150 [ 174.402116][ T5396] ? show_regs_print_info+0x20/0x20 [ 174.407329][ T5396] ? __this_cpu_preempt_check+0x13/0x20 [ 174.413002][ T5396] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 174.419346][ T5396] ? hrtimer_forward+0x18f/0x2a0 [ 174.424315][ T5396] dump_stack+0x15/0x20 [ 174.428492][ T5396] should_fail+0x3c1/0x510 [ 174.432924][ T5396] __should_failslab+0xa4/0xe0 [ 174.437702][ T5396] should_failslab+0x9/0x20 [ 174.442230][ T5396] slab_pre_alloc_hook+0x3b/0xe0 [ 174.447176][ T5396] __kmalloc+0x6d/0x2c0 [ 174.451343][ T5396] ? kvmalloc_node+0x206/0x300 [ 174.456109][ T5396] kvmalloc_node+0x206/0x300 [ 174.460705][ T5396] ? vm_mmap+0xb0/0xb0 [ 174.464779][ T5396] ? __kasan_check_write+0x14/0x20 [ 174.469890][ T5396] ? proc_fail_nth_write+0x17a/0x1f0 [ 174.475208][ T5396] generic_map_update_batch+0x382/0x740 [ 174.480884][ T5396] ? security_file_permission+0x83/0xa0 [ 174.486453][ T5396] ? generic_map_delete_batch+0x510/0x510 [ 174.492226][ T5396] ? __fdget+0x1a1/0x230 [ 174.496506][ T5396] ? generic_map_delete_batch+0x510/0x510 [ 174.502244][ T5396] bpf_map_do_batch+0x463/0x5f0 [ 174.507118][ T5396] __sys_bpf+0x5e3/0x730 [ 174.511365][ T5396] ? bpf_link_show_fdinfo+0x310/0x310 [ 174.516740][ T5396] ? debug_smp_processor_id+0x17/0x20 [ 174.522111][ T5396] __x64_sys_bpf+0x7c/0x90 [ 174.526527][ T5396] x64_sys_call+0x4b9/0x9a0 [ 174.531028][ T5396] do_syscall_64+0x4c/0xa0 [ 174.535447][ T5396] ? clear_bhb_loop+0x50/0xa0 [ 174.540133][ T5396] ? clear_bhb_loop+0x50/0xa0 [ 174.544822][ T5396] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 174.550734][ T5396] RIP: 0033:0x7f80b5644ec9 [ 174.555158][ T5396] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 174.574767][ T5396] RSP: 002b:00007f80b40ad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 174.583208][ T5396] RAX: ffffffffffffffda RBX: 00007f80b589bfa0 RCX: 00007f80b5644ec9 [ 174.591197][ T5396] RDX: 0000000000000038 RSI: 0000200000000380 RDI: 000000000000001a [ 174.599180][ T5396] RBP: 00007f80b40ad090 R08: 0000000000000000 R09: 0000000000000000 [ 174.607165][ T5396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 174.615161][ T5396] R13: 00007f80b589c038 R14: 00007f80b589bfa0 R15: 00007ffd8fcd1638 [ 174.623155][ T5396] [ 174.718653][ T5404] GPL: port 2(erspan0) entered blocking state [ 174.724993][ T5404] GPL: port 2(erspan0) entered disabled state [ 174.744824][ T5404] device erspan0 entered promiscuous mode [ 174.799647][ T5405] GPL: port 2(erspan0) entered blocking state [ 174.805925][ T5405] GPL: port 2(erspan0) entered forwarding state [ 174.845465][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 179.552571][ T5432] bond_slave_1: mtu less than device minimum [ 184.237537][ T30] audit: type=1400 audit(1760653208.849:159): avc: denied { create } for pid=5542 comm="syz.1.1436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 190.482858][ T5734] device veth1_macvtap left promiscuous mode [ 190.549903][ T5734] device macsec0 left promiscuous mode [ 190.804497][ T5754] device pim6reg1 entered promiscuous mode [ 190.992463][ T5768] device veth0_vlan left promiscuous mode [ 191.069433][ T5768] device veth0_vlan entered promiscuous mode [ 191.146398][ T875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.164989][ T875] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.243739][ T875] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.346257][ T5781] device sit0 left promiscuous mode [ 196.207061][ T5924] device bridge_slave_1 left promiscuous mode [ 196.239445][ T5924] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.286185][ T5924] device bridge_slave_0 left promiscuous mode [ 196.302648][ T5924] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.511483][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.900135][ T5987] device veth0_vlan left promiscuous mode [ 197.925749][ T5987] device veth0_vlan entered promiscuous mode [ 197.932762][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.945795][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.973709][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.599156][ T6020] device syzkaller0 entered promiscuous mode [ 199.680421][ T6027] bond_slave_1: mtu less than device minimum [ 199.755389][ T6031] .€: renamed from bond_slave_1 [ 200.905125][ T6084] device syzkaller0 entered promiscuous mode [ 202.984385][ T6188] bridge0: port 3(veth1) entered blocking state [ 203.009903][ T6188] bridge0: port 3(veth1) entered disabled state [ 203.079257][ T6188] device veth1 entered promiscuous mode [ 210.115165][ T6265] syz.0.1640[6265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.115285][ T6265] syz.0.1640[6265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.515914][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 210.556195][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 210.563898][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 210.619368][ T45] GPL: port 1(џџџџџџ) entered blocking state [ 210.625457][ T45] GPL: port 1(џџџџџџ) entered forwarding state [ 211.798583][ T6307] QБ6уз\b‹ЁY­4: renamed from lo [ 211.881556][ T6351] device sit0 left promiscuous mode [ 211.906706][ T6351] ЊЊЊЊЊЊ: renamed from vlan0 [ 211.921371][ T6351] device sit0 entered promiscuous mode [ 212.761140][ T30] audit: type=1400 audit(1760653237.379:160): avc: denied { create } for pid=6392 comm="syz.2.1670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 212.908093][ T6396] device sit0 entered promiscuous mode [ 213.125783][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 213.155779][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 213.245815][ T6403] device syzkaller0 entered promiscuous mode [ 213.368312][ T6415] device pim6reg1 entered promiscuous mode [ 213.771517][ T6439] ЊЊЊЊЊЊ: renamed from vlan0 [ 214.483001][ T30] audit: type=1400 audit(1760653239.099:161): avc: denied { ioctl } for pid=6458 comm="syz.2.1686" path="cgroup:[4026532625]" dev="nsfs" ino=4026532625 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 214.623373][ T6466] device syzkaller0 entered promiscuous mode [ 214.761941][ T6468] device syzkaller0 entered promiscuous mode [ 215.038760][ T6489] device syzkaller0 entered promiscuous mode [ 215.252437][ T6508] device macsec0 entered promiscuous mode [ 215.378620][ T6506] device veth1_macvtap entered promiscuous mode [ 215.457485][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 216.475984][ T6546] device syzkaller0 entered promiscuous mode [ 216.879571][ T6565] syz.4.1719 uses obsolete (PF_INET,SOCK_PACKET) [ 216.980858][ T6555] device syzkaller0 entered promiscuous mode [ 220.199918][ T6666] syz.4.1748[6666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.200020][ T6666] syz.4.1748[6666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.285719][ T6674] syz.4.1748[6674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.348450][ T6674] syz.4.1748[6674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.099582][ T6734] €Т0: renamed from pim6reg1 [ 222.173973][ T6754] device pim6reg1 entered promiscuous mode [ 222.704622][ T6771] device syzkaller0 entered promiscuous mode [ 222.768687][ T6776] device veth0_vlan left promiscuous mode [ 222.781826][ T6776] device veth0_vlan entered promiscuous mode [ 222.868036][ T6784] device wg2 left promiscuous mode [ 223.117010][ T6808] device sit0 left promiscuous mode [ 223.286477][ T6802] device syzkaller0 entered promiscuous mode [ 223.636864][ T6832] bridge0: port 3(veth0) entered blocking state [ 223.644213][ T6832] bridge0: port 3(veth0) entered disabled state [ 223.676843][ T6832] device veth0 entered promiscuous mode [ 223.685723][ T6832] bridge0: port 3(veth0) entered blocking state [ 223.692132][ T6832] bridge0: port 3(veth0) entered forwarding state [ 225.660247][ T30] audit: type=1400 audit(1760653250.279:162): avc: denied { create } for pid=6911 comm="syz.3.1820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 227.113136][ T6963] GPL: port 1(erspan0) entered disabled state [ 229.366923][ T7053] device sit0 entered promiscuous mode [ 229.652700][ T7061] device syzkaller0 entered promiscuous mode [ 230.216171][ T7079] device sit0 left promiscuous mode [ 230.276503][ T7079] device sit0 entered promiscuous mode [ 230.985792][ T7116] device pim6reg1 entered promiscuous mode [ 231.277115][ T7125] device wg2 entered promiscuous mode [ 231.738650][ T7151] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 231.967261][ T7143] device syzkaller0 entered promiscuous mode [ 233.833468][ T7208] device syzkaller0 entered promiscuous mode [ 234.552747][ T30] audit: type=1400 audit(1760653259.169:163): avc: denied { create } for pid=7237 comm="syz.4.1905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 238.304192][ T7334] device syzkaller0 entered promiscuous mode [ 238.696759][ T7374] sock: sock_set_timeout: `syz.2.1942' (pid 7374) tries to set negative timeout [ 238.866998][ T7374] device pim6reg1 entered promiscuous mode [ 239.293751][ T7386] device sit0 entered promiscuous mode [ 240.791632][ T7439] device syzkaller0 entered promiscuous mode [ 240.839706][ T60] syzkaller0: tun_net_xmit 48 [ 240.844765][ T7441] syzkaller0: create flow: hash 4169228298 index 0 [ 241.005708][ T7438] syzkaller0 (unregistered): delete flow: hash 4169228298 index 0 [ 243.037189][ T7530] device syzkaller0 entered promiscuous mode [ 243.437050][ T450] bridge0: port 3(veth0) entered disabled state [ 245.415660][ T7655] device veth0_vlan left promiscuous mode [ 245.422635][ T7655] device veth0_vlan entered promiscuous mode [ 245.534482][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 245.568721][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 245.586709][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 245.989551][ T7690] device veth0_vlan left promiscuous mode [ 246.019735][ T7690] device veth0_vlan entered promiscuous mode [ 246.176080][ T7705] device pim6reg1 entered promiscuous mode [ 247.364556][ T7731] syz.4.2045[7731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.403006][ T7728] device syzkaller0 entered promiscuous mode [ 247.982359][ T7763] GPL: port 1(џџџџџџ) entered disabled state [ 248.034091][ T7763] GPL: port 1(џџџџџџ) entered blocking state [ 248.040282][ T7763] GPL: port 1(џџџџџџ) entered forwarding state [ 248.207294][ T7780] device pim6reg1 entered promiscuous mode [ 248.493225][ T7793] device pim6reg1 entered promiscuous mode [ 250.281141][ T7858] device pim6reg1 entered promiscuous mode [ 252.435632][ T7911] device pim6reg1 entered promiscuous mode [ 252.860237][ T7916] device syzkaller0 entered promiscuous mode [ 253.086377][ T7933] syz.0.2096[7933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.296228][ T7952] device sit0 left promiscuous mode [ 253.407820][ T7959] syz.1.2103[7959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.407896][ T7959] syz.1.2103[7959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.426018][ T7959] syz.1.2103[7959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.445332][ T7959] syz.1.2103[7959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.474211][ T7956] device sit0 entered promiscuous mode [ 254.301662][ T7989] GPL: port 1(џџџџџџ) entered disabled state [ 258.079266][ T30] audit: type=1400 audit(1760653282.699:164): avc: denied { create } for pid=8030 comm="syz.2.2121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 260.708991][ T8129] device sit0 left promiscuous mode [ 260.758936][ T8129] device sit0 entered promiscuous mode [ 262.446118][ T8220] device sit0 entered promiscuous mode [ 262.665913][ T8231] device team_slave_1 entered promiscuous mode [ 262.679984][ T8233] device wg2 entered promiscuous mode [ 262.710781][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 262.731250][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 263.327321][ T8244] @џ: renamed from bond_slave_0 [ 263.465784][ T8251] device syzkaller0 entered promiscuous mode [ 268.082994][ T8362] syz.4.2214[8362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.083070][ T8362] syz.4.2214[8362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.984972][ T8443] bond_slave_1: mtu less than device minimum [ 271.512452][ T8470] syz.1.2245[8470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.512529][ T8470] syz.1.2245[8470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.141593][ T8487] device syzkaller0 entered promiscuous mode [ 272.384619][ T8499] device sit0 left promiscuous mode [ 272.461183][ T8499] device sit0 entered promiscuous mode [ 273.423989][ T8539] device syzkaller0 entered promiscuous mode [ 274.785401][ T8610] device pim6reg1 entered promiscuous mode [ 278.199446][ T8691] device wg2 left promiscuous mode [ 278.381035][ T8691] device wg2 entered promiscuous mode [ 279.162375][ T8730] device syzkaller0 entered promiscuous mode [ 279.545866][ T8734] device syzkaller0 entered promiscuous mode [ 279.646823][ T8752] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.654068][ T8752] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.785351][ T8763] @џ: renamed from bond_slave_0 [ 280.715461][ T8778] device sit0 left promiscuous mode [ 280.986953][ T8778] device sit0 entered promiscuous mode [ 282.870179][ T8814] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.879406][ T8814] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.686602][ T8837] device syzkaller0 entered promiscuous mode [ 285.003123][ T8875] device syzkaller0 entered promiscuous mode [ 285.361912][ T8869] device syzkaller0 entered promiscuous mode [ 285.703383][ T8896] @џ: renamed from bond_slave_0 [ 285.879527][ T8897] device syzkaller0 entered promiscuous mode [ 286.270615][ T8896] device syzkaller0 entered promiscuous mode [ 291.955017][ T8941] device syzkaller0 entered promiscuous mode [ 292.623184][ T8967] device syzkaller0 entered promiscuous mode [ 293.750095][ T8984] device veth0_vlan left promiscuous mode [ 293.762738][ T8984] device veth0_vlan entered promiscuous mode [ 294.274139][ T8995] device sit0 left promiscuous mode [ 297.496775][ T8995] device sit0 entered promiscuous mode [ 300.099881][ T9044] device veth0_vlan left promiscuous mode [ 300.178248][ T9044] device veth0_vlan entered promiscuous mode [ 300.854518][ T9091] device sit0 left promiscuous mode [ 302.616111][ T9129] device sit0 left promiscuous mode [ 304.432808][ T9175] device sit0 left promiscuous mode [ 304.466099][ T9176] device sit0 entered promiscuous mode [ 304.716683][ T9185] device syzkaller0 entered promiscuous mode [ 305.198071][ T9195] device pim6reg1 entered promiscuous mode [ 306.211251][ T9223] syz.1.2457[9223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.211329][ T9223] syz.1.2457[9223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.148094][ T9232] device sit0 entered promiscuous mode [ 307.162381][ T101] udevd[101]: worker [9006] terminated by signal 33 (Unknown signal 33) [ 307.247285][ T101] udevd[101]: worker [9006] failed while handling '/devices/virtual/block/loop3' [ 307.336209][ T9245] device lo entered promiscuous mode [ 307.495440][ T9249] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 307.528186][ T9249] syzkaller0: linktype set to 778 [ 307.600082][ T9249] device syzkaller0 entered promiscuous mode [ 311.644898][ T9348] device sit0 entered promiscuous mode [ 313.592239][ T9422] device pim6reg1 entered promiscuous mode [ 313.690310][ T9424] device pim6reg1 entered promiscuous mode [ 313.815823][ T9443] device pim6reg1 entered promiscuous mode [ 314.123574][ T9459] device sit0 left promiscuous mode [ 318.018688][ T9595] device sit0 left promiscuous mode [ 318.071380][ T9595] device sit0 entered promiscuous mode [ 318.718877][ T9630] device veth0_vlan left promiscuous mode [ 318.782468][ T9630] device veth0_vlan entered promiscuous mode [ 318.833543][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 318.844301][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 318.856399][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 319.893908][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 319.933110][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 319.965010][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 319.993807][ T8] GPL: port 1(џџџџџџ) entered blocking state [ 319.999891][ T8] GPL: port 1(џџџџџџ) entered forwarding state [ 320.959808][ T9710] device pim6reg1 entered promiscuous mode [ 322.719362][ T9796] device sit0 left promiscuous mode [ 323.039918][ T9823] device pim6reg1 entered promiscuous mode [ 323.398193][ T9849] syz.3.2633[9849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.398272][ T9849] syz.3.2633[9849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.558002][ T30] audit: type=1400 audit(1760653349.179:165): avc: denied { create } for pid=9888 comm="syz.0.2643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 324.861439][ T9912] syz.4.2649[9912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.861525][ T9912] syz.4.2649[9912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.074860][ T9915] device pim6reg1 entered promiscuous mode [ 325.725133][ T9928] device syzkaller0 entered promiscuous mode [ 326.922547][ T9967] syz.4.2666[9967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.922627][ T9967] syz.4.2666[9967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.555157][ T9996] device sit0 entered promiscuous mode [ 328.238864][ T30] audit: type=1400 audit(1760653352.859:166): avc: denied { associate } for pid=10017 comm="syz.3.2680" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 330.268891][T10058] device sit0 left promiscuous mode [ 330.344511][T10061] device sit0 entered promiscuous mode [ 330.683439][T10064] device veth0_vlan left promiscuous mode [ 330.696813][T10064] device veth0_vlan entered promiscuous mode [ 330.955214][T10067] device veth1_macvtap entered promiscuous mode [ 330.962668][T10067] device macsec0 entered promiscuous mode [ 331.079497][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 332.020751][ T30] audit: type=1400 audit(1760653356.639:167): avc: denied { create } for pid=10082 comm="syz.3.2696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 332.353782][ T30] audit: type=1400 audit(1760653356.969:168): avc: denied { create } for pid=10085 comm="syz.3.2697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 333.248834][T10110] device pim6reg1 entered promiscuous mode [ 333.290998][T10119] device veth0_vlan left promiscuous mode [ 333.327358][T10119] device veth0_vlan entered promiscuous mode [ 333.641595][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 333.653411][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 333.661449][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 334.265599][T10165] device wg2 entered promiscuous mode [ 336.490613][T10256] syz.1.2741[10256] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.490716][T10256] syz.1.2741[10256] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.560861][T10257] device syzkaller0 entered promiscuous mode [ 336.719019][T10272] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 336.724950][T10272] syzkaller1: linktype set to 773 [ 337.074082][T10272] device syzkaller0 entered promiscuous mode [ 337.930020][T10318] device sit0 left promiscuous mode [ 339.025387][T10338] device veth0_vlan left promiscuous mode [ 339.045953][T10338] device veth0_vlan entered promiscuous mode [ 339.890990][T10359] device syzkaller0 entered promiscuous mode [ 343.505050][T10394] device sit0 left promiscuous mode [ 343.752109][T10394] device sit0 entered promiscuous mode [ 345.621957][T10462] device sit0 left promiscuous mode [ 345.691837][T10462] device sit0 entered promiscuous mode [ 345.990773][T10465] device wg2 left promiscuous mode [ 346.044826][T10469] device wg2 entered promiscuous mode [ 347.089325][T10483] device pim6reg1 entered promiscuous mode [ 348.965593][T10536] device veth0_vlan left promiscuous mode [ 349.027738][T10536] device veth0_vlan entered promiscuous mode [ 349.115279][T10544] device wg2 entered promiscuous mode [ 349.508212][T10564] device veth1_macvtap left promiscuous mode [ 349.514259][T10564] device macsec0 left promiscuous mode [ 349.759162][T10576] veth0_to_bridge: mtu less than device minimum [ 349.786775][T10574] device pim6reg1 entered promiscuous mode [ 350.141595][T10604] device sit0 entered promiscuous mode [ 350.466202][T10614] device sit0 left promiscuous mode [ 350.591194][T10616] device sit0 entered promiscuous mode [ 352.554530][T10668] device veth0_vlan left promiscuous mode [ 352.591440][T10668] device veth0_vlan entered promiscuous mode [ 353.409450][T10688] device pim6reg1 entered promiscuous mode [ 353.655936][T10706] device pim6reg1 entered promiscuous mode [ 353.889536][T10724] device syzkaller0 entered promiscuous mode [ 354.263340][T10741] device pim6reg1 entered promiscuous mode [ 354.736278][T10761] device pim6reg1 entered promiscuous mode [ 356.786237][T10828] device syzkaller0 entered promiscuous mode [ 357.906640][T10859] bond_slave_1: mtu less than device minimum [ 358.829194][T10882] device sit0 left promiscuous mode [ 358.947424][T10888] device pim6reg1 entered promiscuous mode [ 359.126398][T10896] bond_slave_1: mtu less than device minimum [ 359.520897][T10913] bond_slave_1: mtu less than device minimum [ 359.530209][T10911] GPL: port 1(џџџџџџ) entered disabled state [ 359.620065][ T30] audit: type=1400 audit(1760653384.239:169): avc: denied { create } for pid=10910 comm="syz.0.2922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 359.674334][T10911] GPL: port 1(џџџџџџ) entered blocking state [ 359.680439][T10911] GPL: port 1(џџџџџџ) entered forwarding state [ 359.967132][T10925] device pim6reg1 entered promiscuous mode [ 360.692905][T10945] device sit0 left promiscuous mode [ 361.720674][T10980] device syzkaller0 entered promiscuous mode [ 362.134370][T10986] device veth0_vlan left promiscuous mode [ 362.218426][T10986] device veth0_vlan entered promiscuous mode [ 362.594566][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 362.613853][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 362.687584][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 362.953565][T11004] device syzkaller0 entered promiscuous mode [ 363.609427][T11052] device veth0_vlan left promiscuous mode [ 363.651332][T11052] device veth0_vlan entered promiscuous mode [ 365.689420][T11090] device macsec0 entered promiscuous mode [ 366.502869][T11104] device syzkaller0 entered promiscuous mode [ 366.675275][T11109] device macsec0 left promiscuous mode [ 366.697442][T11109] device veth1_macvtap entered promiscuous mode [ 368.379821][T11109] device macsec0 entered promiscuous mode [ 369.034741][T11116] device pim6reg1 entered promiscuous mode [ 369.056021][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 369.253472][T11141] device syzkaller0 entered promiscuous mode [ 370.579718][T11201] .€: renamed from bond_slave_1 [ 371.235938][T11226] GPL: port 1(џџџџџџ) entered disabled state [ 371.348603][T11227] GPL: port 1(џџџџџџ) entered blocking state [ 371.354679][T11227] GPL: port 1(џџџџџџ) entered forwarding state [ 371.735116][ T30] audit: type=1400 audit(1760653396.349:170): avc: denied { mounton } for pid=11248 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 371.882953][ T281] syz-executor (281) used greatest stack depth: 21280 bytes left [ 372.138245][T11248] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.153914][T11248] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.161862][T11248] device bridge_slave_0 entered promiscuous mode [ 372.321263][T11248] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.335123][T11248] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.343259][T11248] device bridge_slave_1 entered promiscuous mode [ 372.911238][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 372.919442][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 372.937322][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 372.981561][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 373.000649][ T450] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.007784][ T450] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.026474][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 373.035533][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 373.045592][ T450] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.052678][ T450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.061769][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 373.091063][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 373.098949][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 373.127750][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 373.137381][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 373.145935][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 373.153565][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 373.166897][T11248] device veth0_vlan entered promiscuous mode [ 373.179205][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 373.195378][T11248] device veth1_macvtap entered promiscuous mode [ 373.211865][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 373.222349][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 373.243687][ T30] audit: type=1400 audit(1760653397.859:171): avc: denied { unmount } for pid=11248 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 373.424319][T11308] device syzkaller0 entered promiscuous mode [ 373.766372][ T10] device veth0_vlan left promiscuous mode [ 375.065282][T11336] device pim6reg1 entered promiscuous mode [ 375.189337][T11331] bridge0: port 1(bridge_slave_0) entered blocking state [ 375.268308][T11331] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.336620][T11331] device bridge_slave_0 entered promiscuous mode [ 375.397073][T11331] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.427867][T11331] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.454779][T11331] device bridge_slave_1 entered promiscuous mode [ 375.712488][T11369] device veth0_vlan left promiscuous mode [ 375.800081][T11369] device veth0_vlan entered promiscuous mode [ 376.195609][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 376.210521][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 376.251041][T11410] GPL: port 1(erspan0) entered blocking state [ 376.257831][T11410] GPL: port 1(erspan0) entered forwarding state [ 376.306098][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 376.314817][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 376.323316][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.330408][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 376.341632][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 376.350402][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 376.360312][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.367399][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 376.375522][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 376.409775][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 376.461399][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 376.502819][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 376.545744][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 376.587469][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 376.638603][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 376.693472][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 376.742040][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 376.785037][T11331] device veth0_vlan entered promiscuous mode [ 376.799312][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 376.822369][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 376.855341][T11445] џџџџџџ: renamed from vlan1 [ 376.891932][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 376.910062][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 376.928573][T11331] device veth1_macvtap entered promiscuous mode [ 376.966874][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 376.978933][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 377.000649][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 377.036530][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 377.054787][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 377.132365][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 377.156547][ T10] GPL: port 2(erspan0) entered disabled state [ 377.177453][ T10] device erspan0 left promiscuous mode [ 377.183113][ T10] GPL: port 2(erspan0) entered disabled state [ 377.548627][T11481] device syzkaller0 entered promiscuous mode [ 378.025683][ T10] device џџџџџџ left promiscuous mode [ 378.031622][ T10] GPL: port 1(џџџџџџ) entered disabled state [ 378.039316][ T10] device veth0 left promiscuous mode [ 378.044809][ T10] bridge0: port 3(veth0) entered disabled state [ 378.055879][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.063554][ T10] device bridge_slave_0 left promiscuous mode [ 378.070015][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.078770][ T10] device veth0_vlan left promiscuous mode [ 378.444390][T11484] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.451658][T11484] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.459430][T11484] device bridge_slave_0 entered promiscuous mode [ 378.475219][T11484] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.482297][T11484] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.493236][T11484] device bridge_slave_1 entered promiscuous mode [ 378.744479][T11513] device syzkaller0 entered promiscuous mode [ 378.808116][T11524] device syzkaller0 entered promiscuous mode [ 379.223225][T11484] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.230322][T11484] bridge0: port 2(bridge_slave_1) entered forwarding state [ 379.237665][T11484] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.244805][T11484] bridge0: port 1(bridge_slave_0) entered forwarding state [ 379.503874][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.511937][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.539802][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 379.547549][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 379.567328][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 379.585903][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 379.594321][ T450] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.601374][ T450] bridge0: port 1(bridge_slave_0) entered forwarding state [ 379.637538][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 379.647682][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 379.661084][ T450] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.668248][ T450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 379.693065][T11484] device veth0_vlan entered promiscuous mode [ 379.700311][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 379.711221][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 379.720034][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 379.757417][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 379.769456][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 379.779440][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 379.788197][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 379.796462][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 379.812385][T11484] device veth1_macvtap entered promiscuous mode [ 379.857405][T11568] device veth1_macvtap left promiscuous mode [ 379.952109][T11573] device veth1_macvtap entered promiscuous mode [ 379.962769][T11573] device macsec0 entered promiscuous mode [ 379.971020][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 379.979597][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 379.987515][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 379.996012][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 380.006360][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 380.058229][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 380.068514][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 380.137518][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 380.157027][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 380.418780][T11604] GPL: port 1(erspan0) entered blocking state [ 380.435267][T11604] GPL: port 1(erspan0) entered disabled state [ 380.449466][T11604] device erspan0 entered promiscuous mode [ 380.517099][T11590] GPL: port 1(erspan0) entered blocking state [ 380.523488][T11590] GPL: port 1(erspan0) entered forwarding state [ 380.555997][ T10] GPL: port 1(erspan0) entered disabled state [ 380.572402][ T10] device erspan0 left promiscuous mode [ 380.583491][ T10] GPL: port 1(erspan0) entered disabled state [ 380.798021][ T10] device veth0_vlan left promiscuous mode [ 381.187837][T11634] device wg2 left promiscuous mode [ 381.209928][T11637] device wg2 entered promiscuous mode [ 381.224833][T11638] device wg2 entered promiscuous mode [ 381.566266][T11671] device veth0_vlan left promiscuous mode [ 381.607384][T11671] device veth0_vlan entered promiscuous mode [ 381.673698][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 381.696451][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 381.705904][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 382.210089][ T30] audit: type=1400 audit(1760653406.829:172): avc: denied { create } for pid=11727 comm="syz.1.3139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 382.307447][T11724] device syzkaller0 entered promiscuous mode [ 382.558989][T11754] ref_ctr_offset mismatch. inode: 0xa8 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 382.604544][T11754] GPL: port 1(erspan0) entered blocking state [ 382.646200][T11754] GPL: port 1(erspan0) entered disabled state [ 382.698967][T11754] device erspan0 entered promiscuous mode [ 382.757176][T11757] GPL: port 1(erspan0) entered blocking state [ 382.763315][T11757] GPL: port 1(erspan0) entered forwarding state [ 383.071345][T11760] device syzkaller0 entered promiscuous mode [ 383.288264][T11775] device pim6reg1 entered promiscuous mode [ 383.445777][T11780] device syzkaller0 entered promiscuous mode [ 383.627200][ T30] audit: type=1400 audit(1760653408.249:173): avc: denied { attach_queue } for pid=11795 comm="syz.0.3161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 384.261054][T11805] device syzkaller0 entered promiscuous mode [ 384.360359][T11822] device pim6reg1 entered promiscuous mode [ 395.190342][T11866] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.197531][T11866] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.216054][T11866] device bridge_slave_0 entered promiscuous mode [ 395.236986][T11866] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.244190][T11866] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.252045][T11866] device bridge_slave_1 entered promiscuous mode [ 395.397293][T11906] device veth1_macvtap left promiscuous mode [ 395.668958][T11917] device syzkaller0 entered promiscuous mode [ 395.802870][T11866] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.810200][T11866] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.817680][T11866] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.824779][T11866] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.996824][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.035468][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.139289][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 396.150437][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 396.209550][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 396.222889][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.230066][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 396.238658][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 396.247315][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.254384][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 396.262366][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 396.300763][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 396.325585][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 396.339038][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 396.347787][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 396.370632][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 396.383403][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 396.468507][T11866] device veth0_vlan entered promiscuous mode [ 396.509595][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 396.517530][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 396.540357][T11866] device veth1_macvtap entered promiscuous mode [ 396.614941][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 396.623615][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 396.632002][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 396.643231][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 396.652826][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 396.764087][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 396.775909][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 398.763218][T12055] device syzkaller0 entered promiscuous mode [ 399.886221][T12083] device syzkaller0 entered promiscuous mode [ 403.142761][T12208] syz.0.3270[12208] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.142847][T12208] syz.0.3270[12208] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.176919][T12207] syz.0.3270[12207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.400391][T12251] device veth1_macvtap left promiscuous mode [ 404.418089][T12251] device macsec0 entered promiscuous mode [ 405.302577][T12265] device veth1_macvtap left promiscuous mode [ 405.308647][T12265] device macsec0 entered promiscuous mode [ 405.798091][T12275] device pim6reg1 entered promiscuous mode [ 408.094770][T12326] device veth1_macvtap left promiscuous mode [ 408.101464][T12326] device macsec0 left promiscuous mode [ 409.503179][T12375] device syzkaller0 entered promiscuous mode [ 409.756665][T12388] device syzkaller0 entered promiscuous mode [ 409.776259][T10727] syzkaller0: tun_net_xmit 48 [ 411.514816][T12443] lo: mtu less than device minimum [ 411.841929][T12459] device pim6reg1 entered promiscuous mode [ 413.116070][T12528] device syzkaller0 entered promiscuous mode [ 413.507041][T12542] device macsec0 left promiscuous mode [ 419.229661][T12644] device syzkaller0 entered promiscuous mode [ 419.582459][T12653] device pim6reg1 entered promiscuous mode [ 420.854814][T12684] syz.1.3408[12684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.862455][T12684] syz.1.3408[12684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.942307][T12684] device wg2 entered promiscuous mode [ 420.994171][T12684] syz.1.3408[12684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.995191][T12684] syz.1.3408[12684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.614927][T12747] device syzkaller0 entered promiscuous mode [ 421.768107][T12760] device veth0_vlan left promiscuous mode [ 421.774260][T12760] device veth0_vlan entered promiscuous mode [ 421.791564][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 421.806122][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 421.813888][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 422.931718][T12832] FAULT_INJECTION: forcing a failure. [ 422.931718][T12832] name failslab, interval 1, probability 0, space 0, times 0 [ 422.949248][T12832] CPU: 0 PID: 12832 Comm: syz.0.3451 Not tainted syzkaller #0 [ 422.956757][T12832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 422.966832][T12832] Call Trace: [ 422.970121][T12832] [ 422.973060][T12832] __dump_stack+0x21/0x30 [ 422.977407][T12832] dump_stack_lvl+0xee/0x150 [ 422.982010][T12832] ? show_regs_print_info+0x20/0x20 [ 422.987226][T12832] ? kmem_cache_free+0x100/0x320 [ 422.992180][T12832] ? kernfs_put+0x310/0x480 [ 422.996780][T12832] dump_stack+0x15/0x20 [ 423.000952][T12832] should_fail+0x3c1/0x510 [ 423.005388][T12832] __should_failslab+0xa4/0xe0 [ 423.010172][T12832] should_failslab+0x9/0x20 [ 423.014688][T12832] slab_pre_alloc_hook+0x3b/0xe0 [ 423.019665][T12832] kmem_cache_alloc_trace+0x48/0x270 [ 423.024977][T12832] ? kobject_uevent_env+0x272/0x700 [ 423.030205][T12832] kobject_uevent_env+0x272/0x700 [ 423.035248][T12832] kobject_uevent+0x1d/0x30 [ 423.039765][T12832] __kobject_del+0xd7/0x2f0 [ 423.044277][T12832] ? __traceiter_qdisc_reset+0x99/0xb0 [ 423.049750][T12832] kobject_put+0x1db/0x270 [ 423.054187][T12832] net_rx_queue_update_kobjects+0x40e/0x480 [ 423.060092][T12832] ? netif_set_real_num_tx_queues+0x5c8/0x780 [ 423.066173][T12832] netif_set_real_num_rx_queues+0x107/0x1f0 [ 423.072076][T12832] __tun_detach+0xb67/0x1450 [ 423.076681][T12832] __tun_chr_ioctl+0xb04/0x1eb0 [ 423.081546][T12832] ? tun_flow_create+0x320/0x320 [ 423.086495][T12832] ? mutex_unlock+0x89/0x220 [ 423.091095][T12832] ? __fget_files+0x2c4/0x320 [ 423.095801][T12832] tun_chr_ioctl+0x2a/0x40 [ 423.100228][T12832] ? tun_chr_poll+0x720/0x720 [ 423.104913][T12832] __se_sys_ioctl+0x121/0x1a0 [ 423.109608][T12832] __x64_sys_ioctl+0x7b/0x90 [ 423.114212][T12832] x64_sys_call+0x2f/0x9a0 [ 423.118695][T12832] do_syscall_64+0x4c/0xa0 [ 423.123123][T12832] ? clear_bhb_loop+0x50/0xa0 [ 423.127803][T12832] ? clear_bhb_loop+0x50/0xa0 [ 423.132495][T12832] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 423.138400][T12832] RIP: 0033:0x7f1c88a1cec9 [ 423.142826][T12832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 423.162448][T12832] RSP: 002b:00007f1c87485038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 423.170880][T12832] RAX: ffffffffffffffda RBX: 00007f1c88c73fa0 RCX: 00007f1c88a1cec9 [ 423.178864][T12832] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 000000000000000a [ 423.186845][T12832] RBP: 00007f1c87485090 R08: 0000000000000000 R09: 0000000000000000 [ 423.194820][T12832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 423.202795][T12832] R13: 00007f1c88c74038 R14: 00007f1c88c73fa0 R15: 00007ffea80847b8 [ 423.210786][T12832] [ 423.649623][T12864] device syzkaller0 entered promiscuous mode [ 424.047377][T12883] FAULT_INJECTION: forcing a failure. [ 424.047377][T12883] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 424.060705][T12883] CPU: 0 PID: 12883 Comm: syz.3.3467 Not tainted syzkaller #0 [ 424.068184][T12883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 424.078252][T12883] Call Trace: [ 424.081557][T12883] [ 424.084514][T12883] __dump_stack+0x21/0x30 [ 424.088868][T12883] dump_stack_lvl+0xee/0x150 [ 424.093479][T12883] ? show_regs_print_info+0x20/0x20 [ 424.098691][T12883] ? kasan_set_track+0x5b/0x70 [ 424.103471][T12883] ? kasan_set_track+0x4a/0x70 [ 424.108244][T12883] ? kasan_set_free_info+0x23/0x40 [ 424.113371][T12883] ? __kasan_slab_free+0x11/0x20 [ 424.118330][T12883] ? slab_free_freelist_hook+0xc2/0x190 [ 424.123899][T12883] dump_stack+0x15/0x20 [ 424.128070][T12883] should_fail+0x3c1/0x510 [ 424.132503][T12883] should_fail_usercopy+0x1a/0x20 [ 424.137542][T12883] strncpy_from_user+0x24/0x2e0 [ 424.142415][T12883] strncpy_from_user_nofault+0x73/0x150 [ 424.147987][T12883] bpf_probe_read_compat_str+0xe6/0x180 [ 424.153542][T12883] ? kernfs_put+0x310/0x480 [ 424.158065][T12883] bpf_prog_e42f6260c1b72fb3+0x35/0x1ec [ 424.163624][T12883] bpf_trace_run3+0xcc/0x1e0 [ 424.168238][T12883] ? bpf_trace_run2+0x1b0/0x1b0 [ 424.173101][T12883] ? kasan_quarantine_put+0x34/0x190 [ 424.178406][T12883] ? kernfs_put+0x310/0x480 [ 424.182928][T12883] ? kmem_cache_free+0x100/0x320 [ 424.187884][T12883] ? ____kasan_slab_free+0x130/0x160 [ 424.193185][T12883] ? kernfs_put+0x310/0x480 [ 424.197700][T12883] ? kernfs_put+0x310/0x480 [ 424.202220][T12883] __bpf_trace_kmem_cache_free+0x99/0xc0 [ 424.207867][T12883] kmem_cache_free+0x2f8/0x320 [ 424.212643][T12883] kernfs_put+0x310/0x480 [ 424.216990][T12883] sysfs_remove_group+0x286/0x2a0 [ 424.222024][T12883] netdev_queue_update_kobjects+0x373/0x3e0 [ 424.227927][T12883] netif_set_real_num_tx_queues+0x160/0x780 [ 424.233831][T12883] __tun_detach+0xb31/0x1450 [ 424.238446][T12883] __tun_chr_ioctl+0xb04/0x1eb0 [ 424.243305][T12883] ? tun_flow_create+0x320/0x320 [ 424.248262][T12883] ? mutex_unlock+0x89/0x220 [ 424.252858][T12883] ? __fget_files+0x2c4/0x320 [ 424.257548][T12883] tun_chr_ioctl+0x2a/0x40 [ 424.261987][T12883] ? tun_chr_poll+0x720/0x720 [ 424.266674][T12883] __se_sys_ioctl+0x121/0x1a0 [ 424.271369][T12883] __x64_sys_ioctl+0x7b/0x90 [ 424.275982][T12883] x64_sys_call+0x2f/0x9a0 [ 424.280409][T12883] do_syscall_64+0x4c/0xa0 [ 424.284841][T12883] ? clear_bhb_loop+0x50/0xa0 [ 424.289528][T12883] ? clear_bhb_loop+0x50/0xa0 [ 424.294211][T12883] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 424.300117][T12883] RIP: 0033:0x7f89fb686ec9 [ 424.304549][T12883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 424.324171][T12883] RSP: 002b:00007f89fa0ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 424.332606][T12883] RAX: ffffffffffffffda RBX: 00007f89fb8ddfa0 RCX: 00007f89fb686ec9 [ 424.340599][T12883] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 000000000000000a [ 424.348587][T12883] RBP: 00007f89fa0ef090 R08: 0000000000000000 R09: 0000000000000000 [ 424.356593][T12883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 424.364681][T12883] R13: 00007f89fb8de038 R14: 00007f89fb8ddfa0 R15: 00007ffef9e61d68 [ 424.372689][T12883] [ 425.250527][T12909] device syzkaller0 entered promiscuous mode [ 425.286554][T12911] device pim6reg1 entered promiscuous mode [ 425.574404][T12928] device macsec0 left promiscuous mode [ 425.632913][T12928] device veth1_macvtap entered promiscuous mode [ 425.670480][T12928] device macsec0 entered promiscuous mode [ 425.745869][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 426.446022][ T30] audit: type=1400 audit(1760653451.069:174): avc: denied { create } for pid=12958 comm="syz.3.3492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 427.662563][T12977] FAULT_INJECTION: forcing a failure. [ 427.662563][T12977] name failslab, interval 1, probability 0, space 0, times 0 [ 427.739250][T12977] CPU: 0 PID: 12977 Comm: syz.3.3497 Not tainted syzkaller #0 [ 427.746767][T12977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 427.756851][T12977] Call Trace: [ 427.760152][T12977] [ 427.763101][T12977] __dump_stack+0x21/0x30 [ 427.767462][T12977] dump_stack_lvl+0xee/0x150 [ 427.772072][T12977] ? show_regs_print_info+0x20/0x20 [ 427.777305][T12977] dump_stack+0x15/0x20 [ 427.781474][T12977] should_fail+0x3c1/0x510 [ 427.785908][T12977] ? alloc_uevent_skb+0x85/0x240 [ 427.790863][T12977] __should_failslab+0xa4/0xe0 [ 427.795645][T12977] should_failslab+0x9/0x20 [ 427.800164][T12977] slab_pre_alloc_hook+0x3b/0xe0 [ 427.805121][T12977] ? alloc_uevent_skb+0x85/0x240 [ 427.810084][T12977] ? alloc_uevent_skb+0x85/0x240 [ 427.815140][T12977] __kmalloc_track_caller+0x6c/0x2c0 [ 427.820475][T12977] ? alloc_uevent_skb+0x85/0x240 [ 427.825441][T12977] ? alloc_uevent_skb+0x85/0x240 [ 427.830406][T12977] __alloc_skb+0x21a/0x740 [ 427.834847][T12977] alloc_uevent_skb+0x85/0x240 [ 427.839703][T12977] ? rx_queue_release+0x170/0x170 [ 427.844727][T12977] kobject_uevent_net_broadcast+0x1a6/0x5a0 [ 427.850633][T12977] kobject_uevent_env+0x52e/0x700 [ 427.855696][T12977] kobject_uevent+0x1d/0x30 [ 427.860226][T12977] __kobject_del+0xd7/0x2f0 [ 427.864749][T12977] ? __traceiter_qdisc_reset+0x99/0xb0 [ 427.870224][T12977] kobject_put+0x1db/0x270 [ 427.874667][T12977] net_rx_queue_update_kobjects+0x40e/0x480 [ 427.880588][T12977] ? netif_set_real_num_tx_queues+0x5c8/0x780 [ 427.886685][T12977] netif_set_real_num_rx_queues+0x107/0x1f0 [ 427.892593][T12977] __tun_detach+0xb67/0x1450 [ 427.897212][T12977] __tun_chr_ioctl+0xb04/0x1eb0 [ 427.902097][T12977] ? tun_flow_create+0x320/0x320 [ 427.907054][T12977] ? mutex_unlock+0x89/0x220 [ 427.911671][T12977] ? __fget_files+0x2c4/0x320 [ 427.916376][T12977] tun_chr_ioctl+0x2a/0x40 [ 427.920821][T12977] ? tun_chr_poll+0x720/0x720 [ 427.925518][T12977] __se_sys_ioctl+0x121/0x1a0 [ 427.930224][T12977] __x64_sys_ioctl+0x7b/0x90 [ 427.934937][T12977] x64_sys_call+0x2f/0x9a0 [ 427.939372][T12977] do_syscall_64+0x4c/0xa0 [ 427.943809][T12977] ? clear_bhb_loop+0x50/0xa0 [ 427.948560][T12977] ? clear_bhb_loop+0x50/0xa0 [ 427.953271][T12977] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 427.959186][T12977] RIP: 0033:0x7f89fb686ec9 [ 427.963619][T12977] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 427.983252][T12977] RSP: 002b:00007f89fa0ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 427.991686][T12977] RAX: ffffffffffffffda RBX: 00007f89fb8ddfa0 RCX: 00007f89fb686ec9 [ 427.999683][T12977] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 000000000000000a [ 428.007679][T12977] RBP: 00007f89fa0ef090 R08: 0000000000000000 R09: 0000000000000000 [ 428.015671][T12977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 428.023656][T12977] R13: 00007f89fb8de038 R14: 00007f89fb8ddfa0 R15: 00007ffef9e61d68 [ 428.031651][T12977] [ 428.059060][T12986] syz.0.3500[12986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.529361][T13044] syz.2.3517[13044] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.559279][T13044] syz.2.3517[13044] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.159111][T13093] syz.1.3533[13093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.217893][T13098] џџџџџџ: renamed from vlan1 [ 432.279491][T13133] device syzkaller0 entered promiscuous mode [ 432.861780][T13156] syz.3.3551[13156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.302004][T13183] device pim6reg1 entered promiscuous mode [ 434.245818][T13218] syz.4.3569[13218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.245912][T13218] syz.4.3569[13218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.766930][T13247] device sit0 entered promiscuous mode [ 435.774565][T13275] device syzkaller0 entered promiscuous mode [ 435.806391][T13278] device pim6reg1 entered promiscuous mode [ 436.041912][T13288] device sit0 left promiscuous mode [ 436.083923][T13288] device sit0 entered promiscuous mode [ 436.353359][T13294] device wg2 left promiscuous mode [ 436.429903][T13295] device wg2 entered promiscuous mode [ 437.761325][T13329] device syzkaller0 entered promiscuous mode [ 437.901786][T13327] device syzkaller0 entered promiscuous mode [ 438.107677][T13343] device pim6reg1 entered promiscuous mode [ 438.353638][T13373] device syzkaller0 entered promiscuous mode [ 438.372447][T13378] device sit0 entered promiscuous mode [ 438.639249][T13399] device pim6reg1 entered promiscuous mode [ 438.654432][T13400] device wg2 entered promiscuous mode [ 438.787705][T13410] device wg2 left promiscuous mode [ 438.825407][T13410] device wg2 entered promiscuous mode [ 441.730462][T13487] device syzkaller0 entered promiscuous mode [ 441.816510][T13507] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.823764][T13507] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.864161][T13510] device bridge_slave_1 left promiscuous mode [ 441.875933][T13510] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.884499][T13510] device bridge_slave_0 left promiscuous mode [ 441.890906][T13510] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.558252][T13566] device wg2 left promiscuous mode [ 449.736571][T13700] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 449.766780][T13700] device syzkaller0 entered promiscuous mode [ 452.897469][T13828] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.906028][T13828] bridge0: port 1(bridge_slave_0) entered disabled state [ 452.913526][T13828] device bridge_slave_0 entered promiscuous mode [ 452.924173][T13828] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.931519][T13828] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.941723][T13828] device bridge_slave_1 entered promiscuous mode [ 453.085206][T13851] џџџџџџ: renamed from vlan1 [ 453.161839][T13828] bridge0: port 2(bridge_slave_1) entered blocking state [ 453.168939][T13828] bridge0: port 2(bridge_slave_1) entered forwarding state [ 453.176258][T13828] bridge0: port 1(bridge_slave_0) entered blocking state [ 453.183296][T13828] bridge0: port 1(bridge_slave_0) entered forwarding state [ 453.211945][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 453.220588][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.229868][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.246892][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 453.255522][ T450] bridge0: port 1(bridge_slave_0) entered blocking state [ 453.262570][ T450] bridge0: port 1(bridge_slave_0) entered forwarding state [ 453.273655][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 453.282576][ T450] bridge0: port 2(bridge_slave_1) entered blocking state [ 453.289666][ T450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 453.308093][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 453.316315][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 453.334370][T13828] device veth0_vlan entered promiscuous mode [ 453.618952][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 453.659639][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 453.668250][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 453.685051][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 456.013538][T13828] device veth1_macvtap entered promiscuous mode [ 456.113093][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 456.132380][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 456.141682][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 456.159594][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 456.168228][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 456.329749][ T10] device bridge_slave_1 left promiscuous mode [ 456.341700][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.359128][ T10] device bridge_slave_0 left promiscuous mode [ 456.365621][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.619963][T14389] device syzkaller0 entered promiscuous mode [ 467.027314][T14478] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 467.041038][T14478] syzkaller0: linktype set to 826 [ 467.370866][T14553] device syzkaller0 entered promiscuous mode [ 467.443434][T14570] device syzkaller0 entered promiscuous mode [ 467.982653][T14682] : renamed from veth0_vlan [ 468.066144][T14694] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 468.512508][T14778] tap0: tun_chr_ioctl cmd 1074025675 [ 468.526761][T14778] tap0: persist enabled [ 468.531307][T14778] tap0: tun_chr_ioctl cmd 1074025675 [ 468.536704][T14778] tap0: persist enabled [ 468.774148][T14838] syz.3.4254[14838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.774223][T14838] syz.3.4254[14838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 469.022692][T14896] device syzkaller0 entered promiscuous mode SYZFAIL: repeatedly failed to execute the program proc=5 req=4308 state=1 status=7 (errno 9: Bad file descriptor) [ 469.779860][ T30] audit: type=1400 audit(1760653494.399:175): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14813]" dev="pipefs" ino=14813 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 470.126491][ T450] GPL: port 1(erspan0) entered disabled state [ 470.134279][ T450] device erspan0 left promiscuous mode [ 470.140043][ T450] GPL: port 1(erspan0) entered disabled state [ 470.387989][ T450] device bridge_slave_1 left promiscuous mode [ 470.394166][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.402314][ T450] device bridge_slave_0 left promiscuous mode [ 470.408563][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.416914][ T450] device veth1_macvtap left promiscuous mode [ 471.799323][ T450] GPL: port 1(erspan0) entered disabled state [ 471.808846][ T450] device erspan0 left promiscuous mode [ 471.814339][ T450] GPL: port 1(erspan0) entered disabled state [ 472.126685][ T450] device bridge_slave_1 left promiscuous mode [ 472.132815][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.140408][ T450] device bridge_slave_0 left promiscuous mode [ 472.146598][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.154553][ T450] device bridge_slave_1 left promiscuous mode [ 472.160755][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.168313][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.176642][ T450] device bridge_slave_1 left promiscuous mode [ 472.182769][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.190333][ T450] device bridge_slave_0 left promiscuous mode [ 472.196504][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.205469][ T450] device veth1_macvtap left promiscuous mode [ 472.211466][ T450] device veth0_vlan left promiscuous mode [ 472.217745][ T450] device veth1_macvtap left promiscuous mode