last executing test programs: 9.46703647s ago: executing program 4 (id=8753): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={0x0, r2}, 0x18) 7.441619703s ago: executing program 4 (id=8753): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={0x0, r2}, 0x18) 6.276454076s ago: executing program 4 (id=8753): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={0x0, r2}, 0x18) 4.339160392s ago: executing program 4 (id=8753): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={0x0, r2}, 0x18) 2.407796697s ago: executing program 1 (id=8945): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r0}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) 2.37596098s ago: executing program 1 (id=8946): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 2.358458231s ago: executing program 1 (id=8947): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="060000000400000004"], 0x50) 1.488100921s ago: executing program 4 (id=8753): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={0x0, r2}, 0x18) 586.362943ms ago: executing program 2 (id=8980): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000500)=""/92, 0x5c}], 0x1}, 0x0) 534.270877ms ago: executing program 2 (id=8983): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) recvmsg$unix(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f00000009c0)=""/119, 0x77}], 0x1}, 0x2000) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0x1}], 0x1}, 0x0) 508.737749ms ago: executing program 0 (id=8984): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x161f, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0xc8, 0x0, 0x6, 0xbe20}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc200b2c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa3a200007"], 0xfdef) 492.07329ms ago: executing program 1 (id=8986): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) unlink(0x0) 487.477701ms ago: executing program 3 (id=8987): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x1d, &(0x7f0000000100), 0x4) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xee01, 0xee00}}}], 0x20, 0x1}, 0x20000000) 462.559593ms ago: executing program 1 (id=8988): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000b40)="a2", 0xfffffd2a}], 0x1, 0x0, 0x0, 0x20000000}, 0x4000041) close(r1) 450.220104ms ago: executing program 0 (id=8989): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a500000005000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) 438.403885ms ago: executing program 2 (id=8990): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='fib_table_lookup\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) 428.582395ms ago: executing program 1 (id=8991): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x800}, 0x100001, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x7d}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 402.956308ms ago: executing program 0 (id=8992): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xc, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x5}, 0x400, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4000, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 389.599029ms ago: executing program 3 (id=8993): r0 = getpid() r1 = getpid() r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r0, 0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000001c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 352.561592ms ago: executing program 0 (id=8994): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) 334.326363ms ago: executing program 2 (id=8995): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0x3, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100033a00fc08000000110200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 314.075225ms ago: executing program 3 (id=8996): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) 280.245527ms ago: executing program 3 (id=8997): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x5, 0x7, 0x8, 0x5, 0x80}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r0}, &(0x7f0000000600), &(0x7f00000006c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r2}, 0xc) 277.937418ms ago: executing program 2 (id=8998): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r2}, 0x10) 202.874703ms ago: executing program 2 (id=8999): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) 202.664023ms ago: executing program 3 (id=9000): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00082b00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa3b2000"], 0xfdef) 202.228883ms ago: executing program 0 (id=9001): bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10104, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x10, 0x3, 0x0, 0x1, 0xfffffefffff7bbfe, 0xfffefffb, 0x0, 0x0, 0x5fd}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 17.979928ms ago: executing program 0 (id=9002): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 17.782258ms ago: executing program 3 (id=9003): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000e00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x31) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000007d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='tlb_flush\x00', r1}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 10.630099ms ago: executing program 32 (id=9003): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000e00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x31) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000007d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='tlb_flush\x00', r1}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 4.44066ms ago: executing program 4 (id=8753): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={0x0, r2}, 0x18) 3.4523ms ago: executing program 33 (id=8753): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={0x0, r2}, 0x18) 0s ago: executing program 34 (id=9002): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.89' (ED25519) to the list of known hosts. [ 26.210533][ T30] audit: type=1400 audit(1755565592.493:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.211540][ T273] cgroup: Unknown subsys name 'net' [ 26.233310][ T30] audit: type=1400 audit(1755565592.493:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.260594][ T30] audit: type=1400 audit(1755565592.523:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.260773][ T273] cgroup: Unknown subsys name 'devices' [ 26.430301][ T273] cgroup: Unknown subsys name 'hugetlb' [ 26.435937][ T273] cgroup: Unknown subsys name 'rlimit' [ 26.633096][ T30] audit: type=1400 audit(1755565592.913:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.656458][ T30] audit: type=1400 audit(1755565592.913:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.681807][ T30] audit: type=1400 audit(1755565592.913:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.687811][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 26.714323][ T30] audit: type=1400 audit(1755565592.993:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.741815][ T30] audit: type=1400 audit(1755565592.993:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.755006][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.769142][ T30] audit: type=1400 audit(1755565593.033:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.803212][ T30] audit: type=1400 audit(1755565593.033:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.185267][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.192572][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.200445][ T281] device bridge_slave_0 entered promiscuous mode [ 27.207469][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.216572][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.224076][ T281] device bridge_slave_1 entered promiscuous mode [ 27.369344][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.376400][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.383954][ T285] device bridge_slave_0 entered promiscuous mode [ 27.398574][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.405632][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.413080][ T285] device bridge_slave_1 entered promiscuous mode [ 27.422919][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.430293][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.437600][ T288] device bridge_slave_0 entered promiscuous mode [ 27.451820][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.459178][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.466603][ T288] device bridge_slave_1 entered promiscuous mode [ 27.495560][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.502905][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.510200][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.517318][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.525108][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.532221][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.539762][ T283] device bridge_slave_0 entered promiscuous mode [ 27.546596][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.553829][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.561861][ T283] device bridge_slave_1 entered promiscuous mode [ 27.625422][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.632532][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.639974][ T287] device bridge_slave_0 entered promiscuous mode [ 27.653398][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.660485][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.668320][ T287] device bridge_slave_1 entered promiscuous mode [ 27.781953][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.790602][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.799831][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.807755][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.815802][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.825569][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.833727][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.879295][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.887397][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.895015][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.903939][ T281] device veth0_vlan entered promiscuous mode [ 27.929137][ T281] device veth1_macvtap entered promiscuous mode [ 27.944686][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.953606][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.962676][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.971190][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.989130][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.997266][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.004326][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.011932][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.020346][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.027693][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.036954][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.055124][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.062653][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.070950][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.079318][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.087408][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.094451][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.102340][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.118714][ T281] request_module fs-gadgetfs succeeded, but still no fs? [ 28.126262][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.135218][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.142313][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.163218][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.171882][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.202851][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.212204][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.222148][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.229239][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.236979][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.245873][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.254542][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.262458][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.270855][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.279363][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.287407][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.296338][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.304754][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.312885][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.320988][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.330404][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.338788][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.345833][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.353628][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.362198][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.370813][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.377882][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.385619][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.393583][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.403857][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.412573][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.431557][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.439803][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.447780][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.456255][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.474307][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.483615][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.492776][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.501781][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.521626][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.530870][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.539859][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.549093][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.558506][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.578805][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.588441][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.595899][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.604081][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.611889][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.620126][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.628483][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.637811][ T285] device veth0_vlan entered promiscuous mode [ 28.646318][ T283] device veth0_vlan entered promiscuous mode [ 28.653232][ T287] device veth0_vlan entered promiscuous mode [ 28.660520][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.671390][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.685839][ T285] device veth1_macvtap entered promiscuous mode [ 28.702527][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.711756][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.724855][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.736858][ T283] device veth1_macvtap entered promiscuous mode [ 28.749352][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.757718][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.771396][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.784349][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.797335][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.811565][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.825153][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.843964][ T287] device veth1_macvtap entered promiscuous mode [ 28.853097][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.861979][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.875156][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.883882][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.897029][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.906086][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.914593][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.927773][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.936393][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.954326][ T288] device veth0_vlan entered promiscuous mode [ 28.974740][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.982887][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.992803][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.001102][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.017441][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.026393][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.039768][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.053917][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.077557][ T288] device veth1_macvtap entered promiscuous mode [ 29.123128][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.152263][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.172888][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.199128][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.214059][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.228622][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.247790][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.395073][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 31.395089][ T30] audit: type=1400 audit(1755565597.673:112): avc: denied { create } for pid=792 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 31.779793][ T30] audit: type=1400 audit(1755565598.063:113): avc: denied { create } for pid=838 comm="syz.3.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 32.170275][ T30] audit: type=1400 audit(1755565598.453:114): avc: denied { create } for pid=892 comm="syz.4.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 32.841029][ T30] audit: type=1400 audit(1755565599.123:115): avc: denied { create } for pid=1009 comm="syz.0.333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 33.805827][ T30] audit: type=1400 audit(1755565600.083:116): avc: denied { create } for pid=1183 comm="syz.2.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 33.965748][ T1207] syz.4.429[1207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.965824][ T1207] syz.4.429[1207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.463348][ T30] audit: type=1400 audit(1755565600.743:117): avc: denied { create } for pid=1305 comm="syz.3.480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 35.435776][ T30] audit: type=1400 audit(1755565601.713:118): avc: denied { create } for pid=1426 comm="syz.3.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 35.670651][ T30] audit: type=1400 audit(1755565601.953:119): avc: denied { create } for pid=1456 comm="syz.2.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 35.752062][ T30] audit: type=1400 audit(1755565602.023:120): avc: denied { create } for pid=1463 comm="syz.1.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 36.219252][ T30] audit: type=1400 audit(1755565602.503:121): avc: denied { create } for pid=1521 comm="syz.4.584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 37.653810][ T30] audit: type=1400 audit(1755565603.933:122): avc: denied { create } for pid=1681 comm="syz.0.656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 38.356107][ T30] audit: type=1400 audit(1755565604.633:123): avc: denied { create } for pid=1767 comm="syz.2.700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 39.009337][ T30] audit: type=1400 audit(1755565605.293:124): avc: denied { create } for pid=1841 comm="syz.0.748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 41.136051][ T30] audit: type=1400 audit(1755565607.413:125): avc: denied { create } for pid=2144 comm="syz.1.887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 41.186091][ T30] audit: type=1400 audit(1755565607.463:126): avc: denied { create } for pid=2157 comm="syz.2.894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 41.426625][ T30] audit: type=1400 audit(1755565607.703:127): avc: denied { create } for pid=2198 comm="syz.4.912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 41.660394][ T30] audit: type=1400 audit(1755565607.943:128): avc: denied { tracepoint } for pid=2236 comm="syz.4.932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 42.268554][ T30] audit: type=1400 audit(1755565608.553:129): avc: denied { create } for pid=2367 comm="syz.4.997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 43.368523][ T30] audit: type=1400 audit(1755565609.653:130): avc: denied { create } for pid=2535 comm="syz.1.1081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 46.430200][ T30] audit: type=1400 audit(1755565612.713:131): avc: denied { create } for pid=3106 comm="syz.1.1364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 46.862065][ T30] audit: type=1400 audit(1755565613.143:132): avc: denied { create } for pid=3180 comm="syz.2.1401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 48.040030][ T30] audit: type=1400 audit(1755565614.323:133): avc: denied { create } for pid=3411 comm="syz.0.1516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 48.398497][ T30] audit: type=1400 audit(1755565614.683:134): avc: denied { create } for pid=3477 comm="syz.0.1549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 49.178189][ T30] audit: type=1400 audit(1755565615.463:135): avc: denied { write } for pid=3585 comm="syz.4.1603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 49.251429][ T30] audit: type=1400 audit(1755565615.513:136): avc: denied { ioctl } for pid=3589 comm="syz.4.1604" path="socket:[26503]" dev="sockfs" ino=26503 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 49.519124][ T30] audit: type=1400 audit(1755565615.803:137): avc: denied { write } for pid=3613 comm="syz.0.1616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 49.588876][ T30] audit: type=1400 audit(1755565615.833:138): avc: denied { setopt } for pid=3619 comm="syz.2.1619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 49.967986][ C0] hrtimer: interrupt took 16160 ns [ 50.701252][ T3717] lo: mtu less than device minimum [ 51.163167][ T3762] device veth1_to_bond entered promiscuous mode [ 51.364833][ T30] audit: type=1400 audit(1755565617.573:139): avc: denied { ioctl } for pid=3771 comm="syz.4.1690" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x54da scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 51.662562][ T30] audit: type=1400 audit(1755565617.943:140): avc: denied { ioctl } for pid=3807 comm="syz.3.1706" path="/dev/ppp" dev="devtmpfs" ino=153 ioctlcmd=0x743d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 53.833752][ T4009] device dummy0 entered promiscuous mode [ 54.159286][ T30] audit: type=1400 audit(1755565620.443:141): avc: denied { setattr } for pid=4026 comm="syz.0.1814" path="/dev/ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 54.864379][ T4094] ------------[ cut here ]------------ [ 54.882844][ T4094] trace type BPF program uses run-time allocation [ 54.898127][ T4094] WARNING: CPU: 1 PID: 4094 at kernel/bpf/verifier.c:11718 check_map_prog_compatibility+0x6cd/0x870 [ 54.921821][ T4094] Modules linked in: [ 54.925779][ T4094] CPU: 1 PID: 4094 Comm: syz.0.1847 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 54.961238][ T4094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 54.985928][ T4094] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 54.993032][ T4094] Code: ee ff 48 c7 c6 20 ec 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 56 4c ee ff c6 05 43 92 6b 05 01 48 c7 c7 80 e8 47 85 e8 a3 e9 24 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 55.032361][ T4094] RSP: 0000:ffffc90000ccf428 EFLAGS: 00010246 [ 55.038872][ T4094] RAX: e69d78297b942200 RBX: 0000000000000001 RCX: 0000000000080000 [ 55.052019][ T4094] RDX: ffffc9000133b000 RSI: 0000000000002bd4 RDI: 0000000000002bd5 [ 55.103037][ T4094] RBP: ffffc90000ccf470 R08: dffffc0000000000 R09: ffffed103ee265e8 [ 55.120350][ T4094] R10: ffffed103ee265e8 R11: 1ffff1103ee265e7 R12: ffff88811168c000 [ 55.128874][ T4094] R13: 0000000000000002 R14: dffffc0000000000 R15: ffff888112984000 [ 55.166023][ T4094] FS: 00007f35bd28f6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 55.178046][ T4094] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 55.184676][ T4094] CR2: 0000001b2ea1fff8 CR3: 0000000129cef000 CR4: 00000000003506a0 [ 55.218101][ T4094] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 55.244962][ T4094] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 55.269677][ T4094] Call Trace: [ 55.271156][ T4150] device vlan0 entered promiscuous mode [ 55.273021][ T4094] [ 55.273033][ T4094] resolve_pseudo_ldimm64+0x685/0x11d0 [ 55.273066][ T4094] ? check_attach_btf_id+0xde0/0xde0 [ 55.309189][ T4094] ? __mark_reg_known+0x1b0/0x1b0 [ 55.328086][ T4094] ? security_capable+0x87/0xb0 [ 55.348124][ T4094] bpf_check+0x2c44/0xf330 [ 55.352672][ T4094] ? 0xffffffffa002c000 [ 55.356850][ T4094] ? is_bpf_text_address+0x177/0x190 [ 55.378098][ T4094] ? bpf_get_btf_vmlinux+0x60/0x60 [ 55.983989][ T4094] ? unwind_get_return_address+0x4d/0x90 [ 57.247973][ C1] sched: RT throttling activated [ 57.249971][ T4094] ? stack_trace_save+0xe0/0xe0 [ 57.260066][ T4094] ? arch_stack_walk+0xee/0x140 [ 57.265037][ T4094] ? stack_trace_save+0x98/0xe0 [ 57.270094][ T4094] ? __stack_depot_save+0x34/0x480 [ 57.275563][ T4094] ? __kasan_slab_alloc+0x69/0xf0 [ 57.286320][ T4094] ? __kasan_kmalloc+0xec/0x110 [ 57.291379][ T4157] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.291619][ T4094] ? __kasan_kmalloc+0xda/0x110 [ 57.298738][ T4157] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.303814][ T4094] ? kmem_cache_alloc_trace+0x119/0x270 [ 57.316909][ T4094] ? selinux_bpf_prog_alloc+0x51/0x140 [ 57.342858][ T4094] ? security_bpf_prog_alloc+0x62/0x90 [ 57.355467][ T4094] ? bpf_prog_load+0x97c/0x1550 [ 57.360558][ T4094] ? __sys_bpf+0x4c3/0x730 [ 57.389098][ T4094] ? __x64_sys_bpf+0x7c/0x90 [ 57.405046][ T4094] ? x64_sys_call+0x4b9/0x9a0 [ 57.413725][ T4094] ? do_syscall_64+0x4c/0xa0 [ 57.430392][ T4094] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 57.443926][ T4094] ? check_stack_object+0x81/0x140 [ 57.471606][ T4094] ? memset+0x35/0x40 [ 57.484812][ T4094] ? bpf_obj_name_cpy+0x193/0x1e0 [ 57.510250][ T4094] bpf_prog_load+0x1042/0x1550 [ 57.530452][ T4094] ? __anon_inode_getfd+0x34b/0x3b0 [ 57.550645][ T4094] ? map_freeze+0x360/0x360 [ 57.575349][ T4094] ? selinux_bpf+0xc7/0xf0 [ 57.605642][ T4094] ? security_bpf+0x82/0xa0 [ 57.632714][ T4094] __sys_bpf+0x4c3/0x730 [ 57.637019][ T4094] ? bpf_link_show_fdinfo+0x310/0x310 [ 57.657544][ T4094] ? __kasan_check_write+0x14/0x20 [ 57.663938][ T4094] ? switch_fpu_return+0x15d/0x2c0 [ 57.669268][ T4094] __x64_sys_bpf+0x7c/0x90 [ 57.673761][ T4094] x64_sys_call+0x4b9/0x9a0 [ 57.678766][ T4094] do_syscall_64+0x4c/0xa0 [ 57.704985][ T4094] ? clear_bhb_loop+0x50/0xa0 [ 57.716162][ T4094] ? clear_bhb_loop+0x50/0xa0 [ 57.742549][ T4094] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 57.755083][ T4094] RIP: 0033:0x7f35be826be9 [ 57.781406][ T4094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 57.883436][ T4094] RSP: 002b:00007f35bd28f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 57.922361][ T4094] RAX: ffffffffffffffda RBX: 00007f35bea4dfa0 RCX: 00007f35be826be9 [ 57.946450][ T4094] RDX: 0000000000000080 RSI: 0000200000000440 RDI: 0000000000000005 [ 57.971767][ T4094] RBP: 00007f35be8a9e19 R08: 0000000000000000 R09: 0000000000000000 [ 57.999114][ T4094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 58.025912][ T4094] R13: 00007f35bea4e038 R14: 00007f35bea4dfa0 R15: 00007ffe3e3774c8 [ 58.064209][ T4094] [ 58.089122][ T4094] ---[ end trace e3e0f342d848861b ]--- [ 58.736368][ T30] audit: type=1400 audit(1755565625.013:142): avc: denied { write } for pid=4305 comm="syz.1.1952" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 59.111178][ T4370] @ÿ: renamed from bond_slave_0 [ 66.973015][ T4692] device team_slave_1 entered promiscuous mode [ 66.995577][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.019555][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.366469][ T4744] device veth1_macvtap left promiscuous mode [ 67.382630][ T4744] device macsec0 entered promiscuous mode [ 70.291164][ T4799] device veth1_macvtap left promiscuous mode [ 70.307444][ T4799] device macsec0 entered promiscuous mode [ 71.085296][ T4918] device vlan0 left promiscuous mode [ 78.116126][ T5104] device veth1_macvtap left promiscuous mode [ 78.122752][ T5104] device macsec0 entered promiscuous mode [ 82.886253][ T30] audit: type=1400 audit(1755565649.163:143): avc: denied { read } for pid=5304 comm="syz.2.2443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 85.668516][ T5683] device dummy0 left promiscuous mode [ 85.924086][ T5733] syz.1.2653[5733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.924174][ T5733] syz.1.2653[5733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.964809][ T5735] ------------[ cut here ]------------ [ 85.975181][ T30] audit: type=1400 audit(1755565652.253:144): avc: denied { create } for pid=5730 comm="syz.3.2651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 85.976340][ T5735] Please remove unsupported % in format string [ 86.007689][ T5735] WARNING: CPU: 1 PID: 5735 at lib/vsprintf.c:2667 format_decode+0xcfe/0x1520 [ 86.016704][ T5735] Modules linked in: [ 86.020714][ T5735] CPU: 1 PID: 5735 Comm: syz.0.2663 Tainted: G W 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 86.032396][ T5735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 86.042577][ T5735] RIP: 0010:format_decode+0xcfe/0x1520 [ 86.048090][ T5735] Code: 78 04 01 48 b8 00 00 00 00 00 fc ff df 41 0f b6 04 04 84 c0 0f 85 10 08 00 00 41 0f be 36 48 c7 c7 e0 a4 64 85 e8 f2 1a 32 02 <0f> 0b e9 d6 fc ff ff 48 8b 4d c0 80 e1 07 38 c1 0f 8c 47 f3 ff ff [ 86.067760][ T5735] RSP: 0018:ffffc90000c0f7f8 EFLAGS: 00010246 [ 86.073892][ T5735] RAX: f835f373de93ee00 RBX: 00000000ffffffdb RCX: 0000000000080000 [ 86.081895][ T5735] RDX: ffffc9000133b000 RSI: 0000000000028abf RDI: 0000000000028ac0 [ 86.090111][ T5735] RBP: ffffc90000c0f868 R08: dffffc0000000000 R09: ffffed103ee265e8 [ 86.098133][ T5735] R10: ffffed103ee265e8 R11: 1ffff1103ee265e7 R12: 1ffff92000181f45 [ 86.106152][ T5735] R13: ffff0000ffffff00 R14: ffffc90000c0fa2c R15: ffff0a00ffffff00 [ 86.114205][ T5735] FS: 00007f35bd28f6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 86.123294][ T5735] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 86.129947][ T5735] CR2: 0000001b2e423ffc CR3: 000000012ff88000 CR4: 00000000003506a0 [ 86.137987][ T5735] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 86.145983][ T5735] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 86.154026][ T5735] Call Trace: [ 86.157329][ T5735] [ 86.160338][ T5735] bstr_printf+0xc2/0xef0 [ 86.164774][ T5735] ? slab_post_alloc_hook+0x4f/0x2b0 [ 86.170204][ T5735] ? kmem_cache_alloc+0xf7/0x260 [ 86.175168][ T5735] bpf_trace_printk+0x106/0x250 [ 86.180096][ T5735] ? bpf_probe_write_user+0xf0/0xf0 [ 86.185325][ T5735] bpf_prog_12183cdb1cd51dab+0x2e/0x950 [ 86.191035][ T5735] bpf_test_run+0x33d/0x8d0 [ 86.195737][ T5735] ? convert___skb_to_skb+0x4f0/0x4f0 [ 86.201169][ T5735] ? eth_get_headlen+0x1f0/0x1f0 [ 86.206211][ T5735] ? convert___skb_to_skb+0x41/0x4f0 [ 86.211560][ T5735] ? bpf_prog_test_run_skb+0x99b/0x1150 [ 86.217124][ T5735] bpf_prog_test_run_skb+0x9ec/0x1150 [ 86.222654][ T5735] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 86.228586][ T5735] bpf_prog_test_run+0x3d5/0x620 [ 86.233620][ T5735] ? bpf_prog_query+0x230/0x230 [ 86.238526][ T5735] ? selinux_bpf+0xce/0xf0 [ 86.243129][ T5735] ? security_bpf+0x82/0xa0 [ 86.247651][ T5735] __sys_bpf+0x52c/0x730 [ 86.252010][ T5735] ? bpf_link_show_fdinfo+0x310/0x310 [ 86.257395][ T5735] ? __kasan_check_write+0x14/0x20 [ 86.262533][ T5735] ? switch_fpu_return+0x15d/0x2c0 [ 86.267656][ T5735] __x64_sys_bpf+0x7c/0x90 [ 86.272105][ T5735] x64_sys_call+0x4b9/0x9a0 [ 86.276638][ T5735] do_syscall_64+0x4c/0xa0 [ 86.281079][ T5735] ? clear_bhb_loop+0x50/0xa0 [ 86.285940][ T5735] ? clear_bhb_loop+0x50/0xa0 [ 86.290672][ T5735] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 86.296576][ T5735] RIP: 0033:0x7f35be826be9 [ 86.301018][ T5735] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 86.321011][ T5735] RSP: 002b:00007f35bd28f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 86.329494][ T5735] RAX: ffffffffffffffda RBX: 00007f35bea4dfa0 RCX: 00007f35be826be9 [ 86.337490][ T5735] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 86.345588][ T5735] RBP: 00007f35be8a9e19 R08: 0000000000000000 R09: 0000000000000000 [ 86.353676][ T5735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 86.361687][ T5735] R13: 00007f35bea4e038 R14: 00007f35bea4dfa0 R15: 00007ffe3e3774c8 [ 86.369775][ T5735] [ 86.372800][ T5735] ---[ end trace e3e0f342d848861c ]--- [ 91.143631][ T30] audit: type=1400 audit(1755565657.423:145): avc: denied { create } for pid=6007 comm="syz.3.2785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 91.467206][ T6082] gretap0: refused to change device tx_queue_len [ 93.385914][ T6205] @0Ù: renamed from bond_slave_1 [ 99.912444][ T6674] ±ÿ: renamed from bond_slave_0 [ 100.747804][ T6718] device wg2 entered promiscuous mode [ 100.753336][ T6718] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 100.760821][ T6750] A6±ÿ: renamed from team_slave_1 [ 103.268763][ T6845] ±ÿ: renamed from bond_slave_0 [ 104.567466][ T6885] bridge0: port 3(gretap0) entered blocking state [ 104.617541][ T6885] bridge0: port 3(gretap0) entered disabled state [ 104.658830][ T6885] device gretap0 entered promiscuous mode [ 108.785785][ T7098] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 114.860070][ T7464] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 115.467594][ T7562] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 124.299811][ T8104] syz.4.3808 (8104) used obsolete PPPIOCDETACH ioctl [ 160.490676][ T9497] syz.4.4476[9497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.490750][ T9497] syz.4.4476[9497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.081969][ T9543] sock: sock_set_timeout: `syz.4.4497' (pid 9543) tries to set negative timeout [ 161.354752][ T9587] syz.0.4519[9587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.354829][ T9587] syz.0.4519[9587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.991076][ T9778] sock: sock_set_timeout: `syz.4.4611' (pid 9778) tries to set negative timeout [ 163.460577][ T9805] sock: sock_set_timeout: `syz.3.4626' (pid 9805) tries to set negative timeout [ 163.752113][ T9835] sock: sock_set_timeout: `syz.2.4638' (pid 9835) tries to set negative timeout [ 164.892984][ T9923] syz.0.4679[9923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.893063][ T9923] syz.0.4679[9923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.949401][ T9891] syz.2.4672 (9891) used greatest stack depth: 21360 bytes left [ 165.391651][ T30] audit: type=1400 audit(1755565731.673:146): avc: denied { associate } for pid=9959 comm="syz.3.4697" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 165.585073][ T9964] syz.3.4700[9964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.585730][ T9964] syz.3.4700[9964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.321741][T10001] syz.1.4715[10001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.357689][T10001] syz.1.4715[10001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.849791][ T30] audit: type=1400 audit(1755565738.133:147): avc: denied { create } for pid=10331 comm="syz.0.4879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 171.976684][T10348] syz.3.4884 uses obsolete (PF_INET,SOCK_PACKET) [ 186.849059][T11077] syz.2.5230[11077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.849130][T11077] syz.2.5230[11077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.710979][T11166] syz.3.5272[11166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.730530][T11166] syz.3.5272[11166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.145796][T11214] bridge0: port 3(veth1) entered blocking state [ 188.163749][T11214] bridge0: port 3(veth1) entered disabled state [ 188.180787][T11214] device veth1 entered promiscuous mode [ 188.193075][T11214] bridge0: port 3(veth1) entered blocking state [ 188.199419][T11214] bridge0: port 3(veth1) entered forwarding state [ 190.299681][T11248] syz.3.5311[11248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.299759][T11248] syz.3.5311[11248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.178775][T11447] syz.2.5406[11447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.208490][T11447] syz.2.5406[11447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.305986][T11455] nr0: tun_chr_ioctl cmd 1074025677 [ 192.412853][T11455] nr0: linktype set to 270 [ 195.253806][T11477] syz.1.5419[11477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.253875][T11477] syz.1.5419[11477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.747416][T11629] ip6_vti0: mtu greater than device maximum [ 200.264830][T11675] device lo entered promiscuous mode [ 202.548976][T11719] tun0: tun_chr_ioctl cmd 2148553947 [ 202.709373][T11745] tap0: tun_chr_ioctl cmd 1074025681 [ 202.932049][T11773] tap0: tun_chr_ioctl cmd 35108 [ 203.600007][T11848] Â: renamed from pim6reg1 [ 203.721466][T11865] tun0: tun_chr_ioctl cmd 1074025677 [ 203.726980][T11865] tun0: linktype set to 0 [ 203.852100][T11880] syzkaller0: tun_chr_ioctl cmd 1074025676 [ 203.865596][T11880] syzkaller0: owner set to 1 [ 203.984441][T11904] device veth0_vlan left promiscuous mode [ 204.000651][T11904] device veth0_vlan entered promiscuous mode [ 204.008497][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.018936][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.031211][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 204.746340][ T30] audit: type=1400 audit(1755565771.023:148): avc: denied { relabelfrom } for pid=11964 comm="syz.4.5661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 204.771235][T11965] Â: renamed from pim6reg1 [ 204.840742][ T30] audit: type=1400 audit(1755565771.023:149): avc: denied { relabelto } for pid=11964 comm="syz.4.5661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 205.314073][T11996] Â: renamed from pim6reg1 [ 205.590752][T12015] device lo entered promiscuous mode [ 206.494471][T12095] tun0: tun_chr_ioctl cmd 1074812117 [ 206.940417][T12136] tun0: tun_chr_ioctl cmd 1074025677 [ 206.946139][T12136] tun0: linktype set to 768 [ 207.048025][T12158] syz.1.5751[12158] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.048104][T12158] syz.1.5751[12158] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.478261][T12251] tap0: tun_chr_ioctl cmd 1074025692 [ 208.813894][T12294] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 208.841341][T12294] syzkaller1: linktype set to 780 [ 209.634981][T12381] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 209.661492][T12381] syzkaller0: persist disabled [ 211.787839][ T30] audit: type=1400 audit(1755565778.063:150): avc: denied { attach_queue } for pid=12640 comm="syz.3.5965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 213.149198][T12709] syz.0.5998[12709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.149270][T12709] syz.0.5998[12709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.887865][ T30] audit: type=1400 audit(1755565781.163:151): avc: denied { setattr } for pid=12823 comm="syz.1.6050" path="/dev/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 215.197460][T12838] syz.4.6056[12838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.197554][T12838] syz.4.6056[12838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.611266][T13058] tap0: tun_chr_ioctl cmd 2147767506 [ 217.785785][T13082] nr0: tun_chr_ioctl cmd 1074025677 [ 217.798070][T13082] nr0: linktype set to 825 [ 221.809441][T13195] device macsec0 entered promiscuous mode [ 221.831968][T13196] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 221.848161][T13196] syzkaller0: linktype set to 778 [ 221.966214][T13211] tap0: tun_chr_ioctl cmd 2147767506 [ 222.001141][T13214] nr0: tun_chr_ioctl cmd 1074025677 [ 222.006418][T13214] nr0: linktype set to 825 [ 226.344321][T13338] tun0: tun_chr_ioctl cmd 1074025681 [ 226.398213][T13337] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 226.408019][T13337] syzkaller0: linktype set to 778 [ 226.419621][T13342] tap1: tun_chr_ioctl cmd 35092 [ 226.504973][T13352] tap0: tun_chr_ioctl cmd 1074025692 [ 227.055755][T13425] tap1: tun_chr_ioctl cmd 1074025688 [ 227.534170][T13445] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 227.580374][T13445] syzkaller0: linktype set to 778 [ 227.883536][T13469] tap1: tun_chr_ioctl cmd 2147767517 [ 230.262035][T13517] tap1: tun_chr_ioctl cmd 1074025677 [ 230.267408][T13517] tap1: linktype set to 769 [ 230.704750][ T30] audit: type=1400 audit(1755565796.983:152): avc: denied { setattr } for pid=13573 comm="syz.0.6398" path="pipe:[14353]" dev="pipefs" ino=14353 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 231.438253][T13657] ref_ctr_offset mismatch. inode: 0x183c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 233.218466][T13785] tap0: tun_chr_ioctl cmd 2147767521 [ 233.724306][T13831] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 233.761185][T13831] pim6reg0: linktype set to 6 [ 238.580196][T13954] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 238.586006][T13954] pim6reg0: linktype set to 6 [ 240.188336][T14048] tap0: tun_chr_ioctl cmd 2147767520 [ 241.428419][T14105] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 241.434135][T14105] dvmrp1: linktype set to 805 [ 244.575643][T14240] tap0: tun_chr_ioctl cmd 2147767520 [ 244.629506][T14250] tap0: tun_chr_ioctl cmd 1074812118 [ 244.815895][T14282] tap0: tun_chr_ioctl cmd 2147767520 [ 247.611875][T14469] pim6reg0: tun_chr_ioctl cmd 1074025672 [ 247.619982][T14469] pim6reg0: ignored: set checksum enabled [ 247.739928][T14482] tap0: tun_chr_ioctl cmd 2148553947 [ 247.955009][T14506] pim6reg0: tun_chr_ioctl cmd 1074025672 [ 247.993686][T14506] pim6reg0: ignored: set checksum enabled [ 248.358506][T14522] tap0: tun_chr_ioctl cmd 1074025680 [ 249.216346][T14597] tap0: tun_chr_ioctl cmd 1074025698 [ 249.774683][T14639] tap1: tun_chr_ioctl cmd 2148553947 [ 253.507592][ T30] audit: type=1400 audit(1755565819.783:153): avc: denied { create } for pid=14737 comm="syz.2.6923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 255.708929][T14871] device pim6reg1 entered promiscuous mode [ 256.688765][T14919] dvmrp1: tun_chr_ioctl cmd 1074025673 [ 257.632570][ T30] audit: type=1400 audit(1755565823.913:154): avc: denied { write } for pid=14960 comm="syz.3.7023" name="cgroup.subtree_control" dev="cgroup2" ino=343 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 257.758285][ T30] audit: type=1400 audit(1755565823.913:155): avc: denied { open } for pid=14960 comm="syz.3.7023" path="" dev="cgroup2" ino=343 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 257.830902][ T30] audit: type=1400 audit(1755565823.933:156): avc: denied { ioctl } for pid=14960 comm="syz.3.7023" path="" dev="cgroup2" ino=343 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 258.284232][T14984] syz.2.7034[14984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.284308][T14984] syz.2.7034[14984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.728049][T15335] ip6erspan0: tun_chr_ioctl cmd 2147767507 [ 269.822556][T15346] tun0: tun_chr_ioctl cmd 1074025677 [ 269.844103][T15346] tun0: linktype set to 776 [ 270.104313][T15381] device sit0 entered promiscuous mode [ 270.438447][T15436] syz.1.7243[15436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.438523][T15436] syz.1.7243[15436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.495519][ T30] audit: type=1400 audit(1755565836.773:157): avc: denied { read } for pid=15445 comm="syz.3.7251" name="cgroup.subtree_control" dev="cgroup2" ino=343 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 270.906509][T15509] device sit0 entered promiscuous mode [ 270.955171][T15513] tap1: tun_chr_ioctl cmd 1074025677 [ 270.960827][T15513] tap1: linktype set to 823 [ 271.305575][T15555] device sit0 entered promiscuous mode [ 273.727958][T15716] tun0: tun_chr_ioctl cmd 1074812118 [ 273.777271][T15725] tap0: tun_chr_ioctl cmd 1074025677 [ 273.794694][T15725] tap0: linktype set to 823 [ 273.845571][T15724] tap0: tun_chr_ioctl cmd 1074025677 [ 273.862320][T15724] tap0: linktype set to 774 [ 281.464473][T16171] bridge0: port 4(veth0) entered blocking state [ 281.487988][T16171] bridge0: port 4(veth0) entered disabled state [ 281.494748][T16171] device veth0 entered promiscuous mode [ 281.573737][T16174] device veth0 left promiscuous mode [ 281.613236][T16174] bridge0: port 4(veth0) entered disabled state [ 281.763899][T16185] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.366539][T16322] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 307.880659][T17544] syz.4.8195[17544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.880735][T17544] syz.4.8195[17544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.654929][T17573] syz.2.8208[17573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.700847][T17573] syz.2.8208[17573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.991005][T17603] tap0: tun_chr_ioctl cmd 2147767520 [ 309.103951][T17611] tap0: tun_chr_ioctl cmd 1074025677 [ 309.141181][T17611] tap0: linktype set to 1 [ 312.205012][T17772] tap0: tun_chr_ioctl cmd 1074025676 [ 312.269500][T17778] tap0: tun_chr_ioctl cmd 1074025675 [ 312.353446][T17778] tap0: persist disabled [ 314.361756][T17859] tap1: tun_chr_ioctl cmd 1074025676 [ 314.400844][T17859] tap1: tun_chr_ioctl cmd 1074025675 [ 314.406187][T17859] tap1: persist disabled [ 314.864484][T17892] tap0: tun_chr_ioctl cmd 1074025676 [ 314.895157][T17892] tap0: tun_chr_ioctl cmd 1074025675 [ 314.904823][T17892] tap0: persist disabled [ 315.137994][T17902] device pim6reg1 entered promiscuous mode [ 322.293550][T18132] device macsec0 left promiscuous mode [ 323.921103][T18279] tap0: tun_chr_ioctl cmd 1074025675 [ 323.926537][T18279] tap0: persist enabled [ 323.936000][T18279] tap0: tun_chr_ioctl cmd 1074025675 [ 323.941655][T18279] tap0: persist disabled [ 327.388365][T18593] syz.4.8681[18593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.388438][T18593] syz.4.8681[18593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.969333][ T30] audit: type=1400 audit(1755565895.253:158): avc: denied { create } for pid=18733 comm="syz.4.8746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 329.405570][T18753] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.413651][T18753] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.438978][T18753] device bridge_slave_0 entered promiscuous mode [ 329.481662][T18753] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.508053][T18753] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.529464][T18753] device bridge_slave_1 entered promiscuous mode [ 329.759472][T18780] sock: sock_timestamping_bind_phc: sock not bind to device [ 329.833827][ T30] audit: type=1400 audit(1755565896.113:159): avc: denied { create } for pid=18753 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 329.883138][ T30] audit: type=1400 audit(1755565896.113:160): avc: denied { write } for pid=18753 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 329.921520][T18753] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.924403][ T30] audit: type=1400 audit(1755565896.113:161): avc: denied { read } for pid=18753 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 329.928708][T18753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.956484][T18753] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.963734][T18753] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.095794][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 330.105138][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.139044][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.172853][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 330.189110][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.196282][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.223375][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 330.263513][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.270641][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.298028][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 330.323194][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 330.337946][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 330.370687][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 330.389643][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 330.421208][T18753] device veth0_vlan entered promiscuous mode [ 330.437965][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 330.456345][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 330.481847][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 330.496724][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 330.544063][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 330.564261][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 330.578555][T18753] device veth1_macvtap entered promiscuous mode [ 330.622439][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 330.641734][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 330.660981][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 330.697008][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 330.708519][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 330.752348][ T30] audit: type=1400 audit(1755565897.033:162): avc: denied { unmount } for pid=18753 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 330.810982][ T10] device bridge_slave_1 left promiscuous mode [ 330.818078][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.827756][ T10] device bridge_slave_0 left promiscuous mode [ 330.847616][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.858627][ T10] device veth1_macvtap left promiscuous mode [ 330.864686][ T10] device veth0_vlan left promiscuous mode [ 331.398453][ T30] audit: type=1400 audit(1755565897.683:163): avc: denied { read } for pid=18890 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 331.512363][ T30] audit: type=1400 audit(1755565897.683:164): avc: denied { open } for pid=18890 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 331.593469][T18890] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.640827][T18890] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.659974][T18890] device bridge_slave_0 entered promiscuous mode [ 331.667444][T18890] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.674588][T18890] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.682155][T18890] device bridge_slave_1 entered promiscuous mode [ 332.151148][T18890] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.158242][T18890] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.165545][T18890] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.172618][T18890] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.267158][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.284729][ T5755] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.300946][ T5755] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.343926][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 332.354591][ T5755] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.361685][ T5755] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.375863][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.384356][ T5755] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.391417][ T5755] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.428114][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 332.442893][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.462146][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 332.472419][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 332.525860][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 332.534772][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 332.560947][T18890] device veth0_vlan entered promiscuous mode [ 332.572940][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 332.584820][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 332.613236][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 332.628476][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 332.639259][T18890] device veth1_macvtap entered promiscuous mode [ 332.658611][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 332.676284][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 332.684615][ T5755] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 332.707070][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 332.725689][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 332.757753][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 332.767502][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 332.784409][ T10] device bridge_slave_1 left promiscuous mode [ 332.796943][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.817319][ T10] device bridge_slave_0 left promiscuous mode [ 332.827460][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.860036][ T10] device veth1_macvtap left promiscuous mode [ 332.869379][ T10] device veth0_vlan left promiscuous mode [ 333.331564][T19024] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.350646][T19024] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.358461][T19024] device bridge_slave_0 entered promiscuous mode [ 333.382910][T19024] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.390060][T19024] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.398917][T19024] device bridge_slave_1 entered promiscuous mode [ 333.747152][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 333.755249][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 333.799085][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 333.811924][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 333.821711][ T4800] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.828808][ T4800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.843281][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 333.851870][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 333.865608][ T4800] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.872712][ T4800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.881379][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 333.889990][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 333.919582][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 333.928244][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 333.939351][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 333.954149][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.968289][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 333.983685][T19024] device veth0_vlan entered promiscuous mode [ 334.002877][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 334.013949][T19024] device veth1_macvtap entered promiscuous mode [ 334.031365][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 334.068349][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 334.299487][ T10] device bridge_slave_1 left promiscuous mode [ 334.305671][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.322529][ T10] device bridge_slave_0 left promiscuous mode [ 334.328801][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.337060][ T10] device veth1_macvtap left promiscuous mode [ 334.343465][ T10] device veth0_vlan left promiscuous mode [ 334.783852][T19129] cgroup: fork rejected by pids controller in /syz2 [ 334.968279][T19131] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.975649][T19131] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.983581][T19131] device bridge_slave_0 entered promiscuous mode [ 334.990882][T19131] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.998237][T19131] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.005714][T19131] device bridge_slave_1 entered promiscuous mode [ 335.202385][T19131] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.209491][T19131] bridge0: port 2(bridge_slave_1) entered forwarding state [ 335.216786][T19131] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.223852][T19131] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.268119][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 335.298971][ T4800] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.313744][ T4800] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.329397][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 335.338615][ T4800] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.345676][ T4800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.399981][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 335.408553][ T4800] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.415619][ T4800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 335.484211][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 335.497174][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 335.515538][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 335.526652][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 335.563129][T19148] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.570924][T19148] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.578763][T19148] device bridge_slave_0 entered promiscuous mode [ 335.585815][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 335.595453][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 335.621726][T19148] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.629441][T19148] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.636970][T19148] device bridge_slave_1 entered promiscuous mode [ 335.644912][T19131] device veth0_vlan entered promiscuous mode [ 335.651933][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 335.660378][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 335.669044][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 335.676592][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 335.723333][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 335.732450][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 335.742770][T19131] device veth1_macvtap entered promiscuous mode [ 335.768086][ T10] device bridge_slave_1 left promiscuous mode [ 335.774245][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.782430][ T10] device bridge_slave_0 left promiscuous mode [ 335.788678][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.796461][ T10] device veth1_macvtap left promiscuous mode [ 335.802692][ T10] device veth0_vlan left promiscuous mode [ 335.928643][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 335.936449][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 335.946648][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 335.978813][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 335.988153][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 336.334338][T19148] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.341436][T19148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.348752][T19148] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.355825][T19148] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.455005][ T4800] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.462554][ T4800] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.469997][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 336.477438][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.494879][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 336.503638][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 336.511941][ T4800] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.519025][ T4800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.641749][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 336.650274][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 336.658652][ T4800] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.665687][ T4800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.750292][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 336.758702][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 336.839063][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 336.847251][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 337.139151][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 337.147676][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 337.216569][T19168] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.223757][T19168] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.233127][T19168] device bridge_slave_0 entered promiscuous mode [ 337.240136][T19168] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.247256][T19168] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.254771][T19168] device bridge_slave_1 entered promiscuous mode [ 337.435506][T19148] device veth0_vlan entered promiscuous mode [ 337.441821][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 337.449794][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 337.473123][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 337.480844][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 337.488561][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 337.496705][ T4800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 337.512060][T19148] device veth1_macvtap entered promiscuous mode [ 337.530868][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 337.539592][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 337.563036][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 337.571688][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 337.915311][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 337.955761][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 337.980510][ T10] device bridge_slave_1 left promiscuous mode [ 337.988283][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.018859][ T10] device bridge_slave_0 left promiscuous mode [ 338.028141][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.052957][ T10] device bridge_slave_1 left promiscuous mode [ 338.062697][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.070539][ T10] device bridge_slave_0 left promiscuous mode [ 338.076730][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.106645][ T10] device veth1_macvtap left promiscuous mode [ 338.113936][ T10] device veth0_vlan left promiscuous mode [ 338.128593][ T10] device veth1_macvtap left promiscuous mode [ 338.135590][ T10] device veth0_vlan left promiscuous mode [ 338.342723][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 338.352081][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.360990][ T338] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.368150][ T338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.375861][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 338.385037][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.393914][ T338] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.400985][ T338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.408900][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 338.479973][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 338.490954][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 338.516143][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 338.555042][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 338.575197][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 338.605633][T19168] device veth0_vlan entered promiscuous mode [ 338.618949][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 338.639868][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 338.681484][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 338.699376][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 338.750354][T19168] device veth1_macvtap entered promiscuous mode [ 338.839261][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 338.858308][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 338.866893][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 338.894553][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 338.912623][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 340.047988][T19278] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.058137][T19278] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.067548][T19278] device bridge_slave_0 entered promiscuous mode [ 340.085856][T19278] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.096763][T19278] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.106858][T19278] device bridge_slave_1 entered promiscuous mode SYZFAIL: repeatedly failed to execute the program proc=7 req=9005 state=1 status=7 (errno 9: Bad file descriptor) [ 340.623526][ T30] audit: type=1400 audit(1755565906.903:165): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14346]" dev="pipefs" ino=14346 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 340.649564][ T10] device bridge_slave_1 left promiscuous mode [ 340.655758][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.686472][ T10] device bridge_slave_0 left promiscuous mode [ 340.698501][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.719637][ T10] device veth1_macvtap left promiscuous mode [ 340.725697][ T10] device veth0_vlan left promiscuous mode [ 341.903576][ T10] device gretap0 left promiscuous mode [ 341.909138][ T10] bridge0: port 3(gretap0) entered disabled state [ 342.138792][ T10] device bridge_slave_1 left promiscuous mode [ 342.144913][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.152419][ T10] device bridge_slave_0 left promiscuous mode [ 342.158634][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.166292][ T10] device bridge_slave_1 left promiscuous mode [ 342.172446][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.179994][ T10] device bridge_slave_0 left promiscuous mode [ 342.186100][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.193931][ T10] device bridge_slave_1 left promiscuous mode [ 342.200716][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.208201][ T10] device bridge_slave_0 left promiscuous mode [ 342.214307][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.222017][ T10] device veth1 left promiscuous mode [ 342.227347][ T10] bridge0: port 3(veth1) entered disabled state [ 342.233956][ T10] device bridge_slave_1 left promiscuous mode [ 342.240205][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.247480][ T10] device bridge_slave_0 left promiscuous mode [ 342.253774][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.261619][ T10] device bridge_slave_1 left promiscuous mode [ 342.267721][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.275106][ T10] device bridge_slave_0 left promiscuous mode [ 342.281285][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.289419][ T10] device veth0_vlan left promiscuous mode [ 342.295248][ T10] device veth1_macvtap left promiscuous mode [ 342.301318][ T10] device veth0_vlan left promiscuous mode [ 342.307312][ T10] device veth0_vlan left promiscuous mode [ 342.313290][ T10] device veth0_vlan left promiscuous mode