last executing test programs: 2.926623943s ago: executing program 1 (id=7979): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r0}, 0x4) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x11, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x1000000}, [@call={0x85, 0x0, 0x0, 0x9b}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000080)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="b34715ecd04550d3abc89b6f7bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.885052805s ago: executing program 1 (id=7982): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x17, 0x8, 0x40, 0x42, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001600)={r0, &(0x7f0000000580), &(0x7f0000001580)=""/92}, 0x20) 2.75363461s ago: executing program 1 (id=7992): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r0, r1, 0x2, 0x2}, 0x10) 2.711541023s ago: executing program 1 (id=7996): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x10, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b80)={r2, 0x2000012, 0xe, 0x0, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xb}, 0x50) 2.608171347s ago: executing program 1 (id=8001): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="d0", 0x1}], 0x1}, 0x20000801) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) close(0x3) 2.040963722s ago: executing program 3 (id=8024): perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x19, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000850000000500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400001e240f258500000082000000bf91000000000000b7020000000000008500000084000000b700000000000000950000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r1}, 0x10) 1.984494744s ago: executing program 3 (id=8028): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0xba98575a95aeb70d) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) 1.815289391s ago: executing program 3 (id=8034): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYRESDEC], 0x6a) 1.716877965s ago: executing program 3 (id=8037): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x0, 0x0}, 0x8) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r0, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={r1, 0x20, &(0x7f0000000480)={&(0x7f0000000000)=""/128, 0xfffffffffffffef8, 0x0, 0x0}}, 0x10) 1.550444243s ago: executing program 3 (id=8044): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='N-N:'], 0x6a) 1.507336345s ago: executing program 3 (id=8045): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x100, 0xfd, 0x9, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0xcff5, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000500), &(0x7f0000000280), 0x4, r0}, 0x38) 596.582355ms ago: executing program 0 (id=8059): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000001ac0)={r1, 0x0, 0x0}, 0x10) 557.014876ms ago: executing program 0 (id=8061): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x8000) recvmsg$unix(r0, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x4a, &(0x7f0000000040)=r2, 0x4) 556.681617ms ago: executing program 2 (id=8062): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000240)=r1}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000580)="b9ff03076804268c989e14f088a8", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 472.09434ms ago: executing program 2 (id=8064): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000240)={r0, &(0x7f0000000100), &(0x7f0000002240)=""/99}, 0x20) 471.93165ms ago: executing program 4 (id=8065): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x620, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 463.18948ms ago: executing program 0 (id=8066): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(0x3) socketpair(0x1, 0x801, 0x0, &(0x7f0000000100)) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) 453.836431ms ago: executing program 4 (id=8067): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xeb, '\x00', 0x0, @tracing=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r0}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 356.160155ms ago: executing program 0 (id=8068): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000004, 0x0, @perf_config_ext={0xffffffffffffffff, 0x80}, 0x8011, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/1901], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000001000)) 355.963715ms ago: executing program 2 (id=8069): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x15, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) 282.469588ms ago: executing program 0 (id=8070): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000340)=ANY=[@ANYBLOB="12000000020000000800000002"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYRES32=r0, @ANYBLOB='\a'], 0x10) close(r1) 266.031159ms ago: executing program 2 (id=8071): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000540), &(0x7f0000000580)=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r0, &(0x7f0000000780)}, 0x20) 232.88809ms ago: executing program 4 (id=8072): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x14, 0x8, &(0x7f0000000180)=@framed={{0x18, 0x8}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2b, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 176.196063ms ago: executing program 2 (id=8073): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x7, 0x4, 0x100, 0x4, 0x20}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x10, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000050000850000001b000000b700000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000c09807850000000600000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x18) 176.055693ms ago: executing program 0 (id=8074): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x100004, 0x220104, 0xe2a4, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000000)='kfree\x00', r1}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1, r0}, 0x38) 175.930493ms ago: executing program 4 (id=8075): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x12, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x14773}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x94) 158.302833ms ago: executing program 2 (id=8076): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x44, &(0x7f00000000c0), 0x4) 142.739674ms ago: executing program 4 (id=8077): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="06000000040000000400000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8ae8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000140)='sys_exit\x00', r1}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={0x0, r0}, 0x18) 13.06706ms ago: executing program 4 (id=8078): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 0s ago: executing program 1 (id=8001): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="d0", 0x1}], 0x1}, 0x20000801) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) close(0x3) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.70' (ED25519) to the list of known hosts. [ 21.779337][ T28] audit: type=1400 audit(1763707360.109:64): avc: denied { mounton } for pid=274 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.780391][ T274] cgroup: Unknown subsys name 'net' [ 21.802308][ T28] audit: type=1400 audit(1763707360.109:65): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.830025][ T28] audit: type=1400 audit(1763707360.139:66): avc: denied { unmount } for pid=274 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.830159][ T274] cgroup: Unknown subsys name 'devices' [ 21.943925][ T274] cgroup: Unknown subsys name 'hugetlb' [ 21.949683][ T274] cgroup: Unknown subsys name 'rlimit' [ 22.051797][ T28] audit: type=1400 audit(1763707360.389:67): avc: denied { setattr } for pid=274 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.075166][ T28] audit: type=1400 audit(1763707360.389:68): avc: denied { mounton } for pid=274 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.100735][ T28] audit: type=1400 audit(1763707360.389:69): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.109685][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 22.133720][ T28] audit: type=1400 audit(1763707360.469:70): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.159456][ T28] audit: type=1400 audit(1763707360.469:71): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.197140][ T28] audit: type=1400 audit(1763707360.529:72): avc: denied { read } for pid=274 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.223052][ T28] audit: type=1400 audit(1763707360.529:73): avc: denied { open } for pid=274 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.223351][ T274] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.990310][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.997421][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.005021][ T283] device bridge_slave_0 entered promiscuous mode [ 23.011984][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.019029][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.026546][ T283] device bridge_slave_1 entered promiscuous mode [ 23.034878][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.041970][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.049464][ T286] device bridge_slave_0 entered promiscuous mode [ 23.059982][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.067081][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.074635][ T286] device bridge_slave_1 entered promiscuous mode [ 23.105624][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.112730][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.120182][ T284] device bridge_slave_0 entered promiscuous mode [ 23.138597][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.145828][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.153469][ T284] device bridge_slave_1 entered promiscuous mode [ 23.209273][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.216364][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.224087][ T285] device bridge_slave_0 entered promiscuous mode [ 23.232623][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.239756][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.247895][ T287] device bridge_slave_0 entered promiscuous mode [ 23.260259][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.267359][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.274847][ T285] device bridge_slave_1 entered promiscuous mode [ 23.291982][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.299230][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.306775][ T287] device bridge_slave_1 entered promiscuous mode [ 23.471081][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.478423][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.485885][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.493024][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.517752][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.524850][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.532313][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.539339][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.552895][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.559956][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.567251][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.574297][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.604762][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.612057][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.619429][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.626762][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.634299][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.642047][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.650236][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.663842][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.672097][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.679119][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.699086][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.726232][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.734845][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.741984][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.749520][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.757260][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.783503][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.791812][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.798830][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.806439][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.814489][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.822902][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.830113][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.837547][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.845591][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.853822][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.860837][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.894602][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.903408][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.912577][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.920749][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.928142][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.936599][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.944649][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.952919][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.960335][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.967757][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.975954][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.984405][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.992622][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.004591][ T287] device veth0_vlan entered promiscuous mode [ 24.013016][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.021042][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.029355][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.037132][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.044793][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.052448][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.060937][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.069306][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.087824][ T283] device veth0_vlan entered promiscuous mode [ 24.102843][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.111870][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.120391][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.128628][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.137010][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.145546][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.153862][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.162404][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.170526][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.177776][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.185339][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.193799][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.202040][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.209078][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.216511][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.224151][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.231987][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.255034][ T287] device veth1_macvtap entered promiscuous mode [ 24.262941][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.272026][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.280369][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.288715][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.297250][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.305431][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.313696][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.321977][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.330172][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.338592][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.347016][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.361322][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.369732][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.378177][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.386231][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.396864][ T284] device veth0_vlan entered promiscuous mode [ 24.404060][ T283] device veth1_macvtap entered promiscuous mode [ 24.412151][ T286] device veth0_vlan entered promiscuous mode [ 24.418576][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.426358][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.434275][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.441892][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.449939][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.458304][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.466102][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.480881][ T285] device veth0_vlan entered promiscuous mode [ 24.488956][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.497670][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.506111][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.514868][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.523674][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.532023][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.540259][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.548177][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.556373][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.563892][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.580566][ T284] device veth1_macvtap entered promiscuous mode [ 24.596727][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.605086][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.605331][ T287] request_module fs-gadgetfs succeeded, but still no fs? [ 24.614151][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.628511][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.636813][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.644938][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.653548][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.662164][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.670310][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.682905][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.691137][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.700143][ T286] device veth1_macvtap entered promiscuous mode [ 24.717864][ T285] device veth1_macvtap entered promiscuous mode [ 24.746673][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.755548][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.764431][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.773492][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.782505][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.790979][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.820473][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.840598][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.864843][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.878629][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.894290][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.903399][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.912322][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.927506][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.922462][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 26.922478][ T28] audit: type=1400 audit(1763707365.259:106): avc: denied { create } for pid=772 comm="syz.3.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 27.539171][ T28] audit: type=1400 audit(1763707365.869:107): avc: denied { create } for pid=883 comm="syz.3.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.776321][ T28] audit: type=1400 audit(1763707366.109:108): avc: denied { create } for pid=917 comm="syz.0.289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 28.591050][ T28] audit: type=1400 audit(1763707366.919:109): avc: denied { cpu } for pid=1004 comm="syz.2.333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 29.652115][ T562] syz.1.110 (562) used greatest stack depth: 22560 bytes left [ 30.496220][ T28] audit: type=1400 audit(1763707368.829:110): avc: denied { create } for pid=1321 comm="syz.2.489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 31.487698][ T28] audit: type=1400 audit(1763707369.819:111): avc: denied { create } for pid=1456 comm="syz.3.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 32.092960][ T28] audit: type=1400 audit(1763707370.429:112): avc: denied { create } for pid=1522 comm="syz.1.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 34.979347][ T28] audit: type=1400 audit(1763707373.309:113): avc: denied { create } for pid=1882 comm="syz.1.756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 35.587125][ T28] audit: type=1400 audit(1763707373.919:114): avc: denied { create } for pid=1986 comm="syz.1.807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 35.683886][ T28] audit: type=1400 audit(1763707374.019:115): avc: denied { create } for pid=2002 comm="syz.2.816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 35.774733][ T28] audit: type=1400 audit(1763707374.109:116): avc: denied { create } for pid=2023 comm="syz.3.825" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 36.167980][ T28] audit: type=1400 audit(1763707374.499:117): avc: denied { create } for pid=2083 comm="syz.2.855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 36.568815][ T28] audit: type=1400 audit(1763707374.899:118): avc: denied { create } for pid=2143 comm="syz.2.887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 37.311972][ T28] audit: type=1400 audit(1763707375.649:119): avc: denied { create } for pid=2258 comm="syz.0.943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 38.147585][ T28] audit: type=1400 audit(1763707376.479:120): avc: denied { write } for pid=2406 comm="syz.4.1015" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 38.181751][ T28] audit: type=1400 audit(1763707376.479:121): avc: denied { open } for pid=2406 comm="syz.4.1015" path="/dev/ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 38.263394][ T28] audit: type=1400 audit(1763707376.599:122): avc: denied { create } for pid=2428 comm="syz.4.1028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 38.818538][ T28] audit: type=1400 audit(1763707377.149:123): avc: denied { tracepoint } for pid=2561 comm="syz.0.1093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 38.871699][ T28] audit: type=1400 audit(1763707377.179:124): avc: denied { create } for pid=2559 comm="syz.4.1094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 39.086430][ T28] audit: type=1400 audit(1763707377.419:125): avc: denied { create } for pid=2624 comm="syz.2.1125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 39.298897][ T28] audit: type=1400 audit(1763707377.629:126): avc: denied { create } for pid=2674 comm="syz.2.1146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 39.345070][ T28] audit: type=1400 audit(1763707377.659:127): avc: denied { create } for pid=2677 comm="syz.3.1151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 41.412101][ T28] audit: type=1400 audit(1763707379.749:128): avc: denied { create } for pid=2914 comm="syz.2.1270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 45.094222][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 45.094238][ T28] audit: type=1400 audit(1763707383.429:130): avc: denied { create } for pid=3580 comm="syz.0.1602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 45.402402][ T28] audit: type=1400 audit(1763707383.739:131): avc: denied { create } for pid=3617 comm="syz.2.1621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 46.511157][ T28] audit: type=1400 audit(1763707384.839:132): avc: denied { create } for pid=3742 comm="syz.3.1683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 47.946313][ T28] audit: type=1400 audit(1763707386.279:133): avc: denied { read } for pid=3982 comm="syz.1.1803" dev="nsfs" ino=4026532294 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.007309][ T28] audit: type=1400 audit(1763707386.299:134): avc: denied { open } for pid=3982 comm="syz.1.1803" path="net:[4026532294]" dev="nsfs" ino=4026532294 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.762902][ T28] audit: type=1400 audit(1763707387.099:135): avc: denied { create } for pid=4104 comm="syz.3.1865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 48.831164][ T28] audit: type=1400 audit(1763707387.139:136): avc: denied { create } for pid=4106 comm="syz.3.1866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 48.936286][ T28] audit: type=1400 audit(1763707387.269:137): avc: denied { create } for pid=4126 comm="syz.4.1876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 52.432949][ T28] audit: type=1400 audit(1763707390.769:138): avc: denied { create } for pid=4682 comm="syz.1.2150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 54.100448][ T28] audit: type=1400 audit(1763707392.429:139): avc: denied { create } for pid=4892 comm="syz.0.2262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 54.278730][ T28] audit: type=1400 audit(1763707392.609:140): avc: denied { create } for pid=4928 comm="syz.4.2268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 54.341948][ T28] audit: type=1400 audit(1763707392.679:141): avc: denied { create } for pid=4940 comm="syz.1.2276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 57.474395][ T28] audit: type=1400 audit(1763707395.809:142): avc: denied { create } for pid=5658 comm="syz.3.2632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 59.236619][ T28] audit: type=1400 audit(1763707397.569:143): avc: denied { create } for pid=6068 comm="syz.3.2836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 59.813006][ T28] audit: type=1400 audit(1763707398.149:144): avc: denied { create } for pid=6198 comm="syz.1.2902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 59.923777][ T28] audit: type=1400 audit(1763707398.259:145): avc: denied { create } for pid=6222 comm="syz.4.2912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 60.416534][ T28] audit: type=1400 audit(1763707398.749:146): avc: denied { create } for pid=6336 comm="syz.0.2969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 60.570336][ T28] audit: type=1400 audit(1763707398.899:147): avc: denied { read } for pid=6369 comm="syz.4.2987" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 61.340855][ T6531] syz.2.3068[6531] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.340934][ T6531] syz.2.3068[6531] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.871391][ T6639] syz.3.3119 uses obsolete (PF_INET,SOCK_PACKET) [ 63.188215][ T6929] Illegal XDP return value 4294967274 on prog (id 747) dev N/A, expect packet loss! [ 63.503095][ T28] audit: type=1400 audit(1763707401.839:148): avc: denied { write } for pid=6999 comm="syz.0.3296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 63.650906][ T28] audit: type=1400 audit(1763707401.979:149): avc: denied { write } for pid=7026 comm="syz.4.3312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 65.771202][ C1] sched: RT throttling activated [ 65.818426][ C1] hrtimer: interrupt took 25717 ns [ 66.463229][ T7188] @0Ù: renamed from bond_slave_1 [ 66.584906][ T28] audit: type=1400 audit(1763707404.919:150): avc: denied { setopt } for pid=7205 comm="syz.0.3400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 66.891288][ T7264] @0Ù: renamed from bond_slave_1 [ 69.836079][ T7303] bridge0: port 3(gretap0) entered blocking state [ 69.870708][ T7303] bridge0: port 3(gretap0) entered disabled state [ 69.895838][ T7303] device gretap0 entered promiscuous mode [ 69.909528][ T28] audit: type=1400 audit(1763707408.239:151): avc: denied { ioctl } for pid=7310 comm="syz.0.3450" path="cgroup:[4026532412]" dev="nsfs" ino=4026532412 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 69.913333][ T7303] bridge0: port 3(gretap0) entered blocking state [ 69.941289][ T7303] bridge0: port 3(gretap0) entered forwarding state [ 69.977050][ T7304] @0Ù: renamed from bond_slave_1 [ 69.989169][ T7309] device dummy0 entered promiscuous mode [ 77.342002][ T28] audit: type=1400 audit(1763707415.679:152): avc: denied { ioctl } for pid=7703 comm="syz.0.3643" path="socket:[39031]" dev="sockfs" ino=39031 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 78.039437][ T28] audit: type=1400 audit(1763707416.369:153): avc: denied { setattr } for pid=7719 comm="syz.3.3649" path="socket:[37806]" dev="sockfs" ino=37806 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 86.055476][ T7962] device vlan1 entered promiscuous mode [ 91.841338][ T8008] syz.2.3788 (8008) used greatest stack depth: 22048 bytes left [ 96.930684][ T8192] syz_tun: refused to change device tx_queue_len [ 102.945461][ T8347] û: renamed from bond_slave_0 [ 103.607994][ T28] audit: type=1400 audit(1763707441.939:154): avc: denied { ioctl } for pid=8395 comm="syz.3.3979" path="/dev/ppp" dev="devtmpfs" ino=158 ioctlcmd=0x743d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 103.970932][ T28] audit: type=1400 audit(1763707442.299:155): avc: denied { read } for pid=8452 comm="syz.4.4009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 103.987894][ T8458] !6±ÿ: renamed from team_slave_1 [ 104.033471][ T8462] device xfrm0 entered promiscuous mode [ 104.249909][ T8511] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 104.261216][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 104.418273][ T28] audit: type=1400 audit(1763707442.749:156): avc: denied { relabelfrom } for pid=8529 comm="syz.1.4046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 104.443844][ T28] audit: type=1400 audit(1763707442.749:157): avc: denied { relabelto } for pid=8529 comm="syz.1.4046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 104.745642][ T8593] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.752989][ T8593] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.762238][ T28] audit: type=1400 audit(1763707453.559:158): avc: denied { getattr } for pid=9203 comm="syz.1.4379" path="net:[4026532294]" dev="nsfs" ino=4026532294 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 121.470781][ T9502] device gre0 entered promiscuous mode [ 131.056986][ T28] audit: type=1400 audit(1763707469.389:159): avc: denied { setattr } for pid=10003 comm="syz.2.4773" path="/dev/net/tun" dev="devtmpfs" ino=155 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 131.102013][T10010] device bridge_slave_1 left promiscuous mode [ 131.128165][T10010] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.170235][T10010] device bridge_slave_0 left promiscuous mode [ 131.205874][T10010] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.404740][ T28] audit: type=1400 audit(1763707469.739:160): avc: denied { setattr } for pid=10049 comm="syz.0.4794" path="/dev/ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 131.935268][T10118] device gre0 entered promiscuous mode [ 132.842292][T10202] device veth1_macvtap left promiscuous mode [ 133.752580][T10367] device lo entered promiscuous mode [ 136.896412][T10500] device syz_tun entered promiscuous mode [ 137.656366][T10615] syz.1.5073[10615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.656447][T10615] syz.1.5073[10615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.879284][T10638] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.494561][T10744] åÑ: renamed from bond_slave_0 [ 138.890365][T10804] ÿ: renamed from bond_slave_0 [ 144.782098][T11232] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.872342][T11244] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.516028][T11281] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.103733][T11420] syz.2.5458 (11420) used obsolete PPPIOCDETACH ioctl [ 153.493687][T11644] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 156.563156][T11772] syz.1.5627 (11772) used greatest stack depth: 21984 bytes left [ 157.887611][T11840] syz.3.5660 (11840) used greatest stack depth: 21792 bytes left [ 171.720648][T12606] sock: sock_set_timeout: `syz.2.6024' (pid 12606) tries to set negative timeout [ 176.119203][T12842] bridge0: port 3(veth1_macvtap) entered blocking state [ 176.136014][T12842] bridge0: port 3(veth1_macvtap) entered disabled state [ 178.702820][ T28] audit: type=1400 audit(1763707517.039:161): avc: denied { create } for pid=12960 comm="syz.0.6193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 180.867826][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.865764][T13288] sock: sock_set_timeout: `syz.1.6348' (pid 13288) tries to set negative timeout [ 200.203952][ T28] audit: type=1400 audit(1763707538.539:162): avc: denied { create } for pid=13700 comm="syz.4.6550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 201.788203][T13735] syz.2.6563[13735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.788283][T13735] syz.2.6563[13735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.486097][ T28] audit: type=1400 audit(1763707547.819:163): avc: denied { associate } for pid=14156 comm="syz.2.6770" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 212.438663][ T28] audit: type=1400 audit(1763707550.769:164): avc: denied { create } for pid=14514 comm="syz.4.6943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 215.912974][T14818] device macsec0 entered promiscuous mode [ 221.947031][T15105] syz.0.7224[15105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.947117][T15105] syz.0.7224[15105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.267106][T15239] syz.3.7288[15239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.282359][T15239] syz.3.7288[15239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.540786][T15364] pim6reg1: tun_chr_ioctl cmd 1074025673 [ 231.760350][ T28] audit: type=1400 audit(1763707570.089:165): avc: denied { attach_queue } for pid=15398 comm="syz.4.7358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 233.204400][T15602] dvmrp0: tun_chr_ioctl cmd 2147767506 [ 234.684283][T15632] pim6reg1: tun_chr_ioctl cmd 1074025676 [ 234.690497][T15632] pim6reg1: owner set to 0 [ 234.738481][T15652] pimreg: tun_chr_ioctl cmd 1074025677 [ 234.747317][T15652] pimreg: linktype set to 768 [ 234.840852][T15677] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 235.009570][T15694] tap0: tun_chr_ioctl cmd 1074025692 [ 235.399086][T15739] tun0: tun_chr_ioctl cmd 1074025680 [ 235.573398][T15766] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 235.591263][T15766] syzkaller1: linktype set to 769 [ 236.532173][T15899] dvmrp0: tun_chr_ioctl cmd 2147767506 [ 237.856362][T15962] tun0: tun_chr_ioctl cmd 1074025680 [ 240.278893][T16106] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 240.310532][T16106] syzkaller0: linktype set to 256 [ 242.740653][T16280] caif0: tun_chr_ioctl cmd 2147767521 [ 243.904493][T16363] dvmrp1: tun_chr_ioctl cmd 1074812118 [ 245.781950][T16484] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 245.787953][T16484] dvmrp1: linktype set to 778 [ 245.874286][T16499] ip6_vti0: mtu greater than device maximum [ 246.369033][ T28] audit: type=1400 audit(1763707584.699:166): avc: denied { write } for pid=16547 comm="syz.1.7889" name="cgroup.subtree_control" dev="cgroup2" ino=336 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 246.431167][ T28] audit: type=1400 audit(1763707584.739:167): avc: denied { open } for pid=16547 comm="syz.1.7889" path="" dev="cgroup2" ino=336 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 246.663668][T16595] ip6_vti0: mtu greater than device maximum [ 250.040213][T16651] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 250.048765][T16651] syzkaller0: linktype set to 804 [ 250.398384][T16711] syzkaller1: tun_chr_ioctl cmd 1074812118 [ 251.121936][ T28] audit: type=1400 audit(1763707589.459:168): avc: denied { mounton } for pid=16811 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 251.454062][T16811] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.468908][T16811] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.494472][T16811] device bridge_slave_0 entered promiscuous mode [ 251.502034][T16811] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.509768][T16811] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.518100][T16811] device bridge_slave_1 entered promiscuous mode [ 251.551384][T16847] bridge0: port 3(veth1_macvtap) entered blocking state [ 251.560435][T16847] bridge0: port 3(veth1_macvtap) entered disabled state [ 251.580495][T16844] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 251.735154][ T28] audit: type=1400 audit(1763707590.069:169): avc: denied { write } for pid=16811 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 251.800540][ T28] audit: type=1400 audit(1763707590.069:170): avc: denied { read } for pid=16811 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 251.830786][ T8] device bridge_slave_1 left promiscuous mode [ 251.837295][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.874259][ T8] device bridge_slave_0 left promiscuous mode [ 251.880542][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.942767][ T8] device veth1_macvtap left promiscuous mode [ 251.949334][ T8] device veth0_vlan left promiscuous mode [ 252.409230][T16811] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.416346][T16811] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.424060][T16811] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.431107][T16811] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.454532][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.482472][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.654501][T12240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.668836][T12240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.741525][T12240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.792553][T12240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.841502][T12240] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.848884][T12240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.865957][T12240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.891479][T12240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.942110][T12240] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.949395][T12240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.971444][T12240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 252.980176][T12240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.990406][T12240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 253.011519][T12240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.029998][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 253.049302][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 253.107732][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 253.116630][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.126904][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.135190][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.143280][T16811] device veth0_vlan entered promiscuous mode [ 253.163256][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 253.173048][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 253.183705][T16811] device veth1_macvtap entered promiscuous mode [ 253.214481][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 253.223668][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 253.238940][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.277252][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 253.301829][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 253.337511][ T28] audit: type=1400 audit(1763707591.669:171): avc: denied { unmount } for pid=16811 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 Connection to 10.128.0.70 closed by remote host. [ 253.959167][ T286] syz-executor (286) used greatest stack depth: 20864 bytes left [ 254.581931][ T8] device bridge_slave_1 left promiscuous mode [ 254.589148][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.597463][ T8] device bridge_slave_0 left promiscuous mode [ 254.603782][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.611919][ T8] device bridge_slave_1 left promiscuous mode [ 254.618381][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.626456][ T8] device bridge_slave_0 left promiscuous mode [ 254.632689][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.641727][ T8] device veth1_macvtap left promiscuous mode [ 254.648648][ T8] device veth0_vlan left promiscuous mode [ 254.655418][ T8] device veth1_macvtap left promiscuous mode [ 254.661743][ T8] device veth0_vlan left promiscuous mode [ 255.552967][ T8] bridge0: port 3(gretap0) entered disabled state [ 255.561704][ T8] device gretap0 left promiscuous mode [ 255.567264][ T8] bridge0: port 3(gretap0) entered disabled state [ 255.692700][ T8] device bridge_slave_1 left promiscuous mode [ 255.699014][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.707266][ T8] device bridge_slave_0 left promiscuous mode [ 255.713549][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.721535][ T8] device bridge_slave_1 left promiscuous mode [ 255.727756][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.736001][ T8] device bridge_slave_0 left promiscuous mode [ 255.742339][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.750990][ T8] device veth0_vlan left promiscuous mode [ 255.758242][ T8] device veth1_macvtap left promiscuous mode [ 255.764495][ T8] device veth0_vlan left promiscuous mode