last executing test programs: 4.480811898s ago: executing program 2 (id=6380): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7f}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x4e, 0xa, 0xa, 0x0, 0x0, 0x71, 0x10, 0x33}}, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 4.478147768s ago: executing program 4 (id=6382): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1103"], 0xffdd) 4.437194029s ago: executing program 2 (id=6384): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x1, 0x20}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 4.412238089s ago: executing program 2 (id=6387): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000c00000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000bc7a007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) 4.37885965s ago: executing program 2 (id=6390): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='/proc///\x00\x82q\xee\x00!\xbd\xc2\x98#YP\xee\x9c2G\xf0\x81x\x97'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 4.34360844s ago: executing program 2 (id=6391): perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) 4.334738091s ago: executing program 4 (id=6393): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x13, 0x10, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="130000001000000002"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x7, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@map_fd={0x18, 0x0, 0x1, 0x0, r1}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xea, &(0x7f0000000340)=""/234, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 4.293209441s ago: executing program 4 (id=6396): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x9, 0x4, 0x0, 0x1, 0xb, '\x00', 0x0, 0xffffffffffffffff, 0xffffffff, 0x3, 0x4, 0x6, @void, @value, @void, @value}, 0x48) ioctl$SIOCSIFHWADDR(r0, 0x89f0, &(0x7f0000000900)={'ip6tnl0\x00', @random="0600002000"}) 4.279426481s ago: executing program 2 (id=6397): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x100, 0xfd, 0x9, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0xcff5, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000500), &(0x7f0000000280), 0x4, r0}, 0x38) 4.262093652s ago: executing program 4 (id=6400): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, 0x0) 2.404701961s ago: executing program 4 (id=6410): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000400)={0x2, &(0x7f0000000440)=[{0x28, 0x0, 0x8, 0xfffff038}, {0x6, 0x2, 0x2, 0xfffffffa}]}) 531.024461ms ago: executing program 4 (id=6417): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0xf5ff}, 0x0) 409.814533ms ago: executing program 1 (id=6422): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000004c0)={&(0x7f0000000180), 0x6e, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x0) 388.241433ms ago: executing program 3 (id=6424): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup=r0, 0xffffffffffffffff, 0x14, 0x0, 0x4000, @void, @value}, 0x10) 349.795704ms ago: executing program 0 (id=6425): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) write$cgroup_devices(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b2308217f014f", @ANYBLOB='ob'], 0xffdd) 342.664084ms ago: executing program 3 (id=6426): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r0, &(0x7f0000000280), &(0x7f0000000000), 0x2}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000180), &(0x7f0000000340)=""/215}, 0x20) 328.972024ms ago: executing program 1 (id=6427): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3d) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r0, 0x2000002, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 303.938505ms ago: executing program 3 (id=6428): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x20, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000007000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020737200000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 259.986055ms ago: executing program 0 (id=6429): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0xa4}, {0x6}]}) 189.098446ms ago: executing program 3 (id=6430): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller0\x00', 0x2}) write$cgroup_devices(r0, &(0x7f0000002d80)=ANY=[], 0xffdd) 178.937477ms ago: executing program 1 (id=6431): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x12, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000005000000000000000200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000850000006d000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) 150.836947ms ago: executing program 0 (id=6432): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x10}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8932, &(0x7f0000000080)) 131.061727ms ago: executing program 1 (id=6433): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x14, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000999700008500000082000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x10, 0x10, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 117.422237ms ago: executing program 0 (id=6434): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 102.846558ms ago: executing program 3 (id=6435): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000700000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0xfffffef3, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x5562, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 85.530788ms ago: executing program 0 (id=6436): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) 45.945569ms ago: executing program 1 (id=6437): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='tlb_flush\x00', r0}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 23.607269ms ago: executing program 3 (id=6438): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x6, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000faffffff0000000000004000850000002c0000001800000004000000000000000700000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x27, 0x8, 0x0, &(0x7f0000000280)="ed7e17526b2d6f70", 0x0, 0x1403, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 9.382119ms ago: executing program 1 (id=6439): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x4, &(0x7f00000001c0)=[{0x45, 0x0, 0x2, 0xfffffffc}, {0x3}, {0x0, 0x0, 0xd}, {0x6}]}) 0s ago: executing program 0 (id=6440): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.135' (ED25519) to the list of known hosts. [ 28.981645][ T28] audit: type=1400 audit(1744675452.893:66): avc: denied { mounton } for pid=286 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 28.984685][ T286] cgroup: Unknown subsys name 'net' [ 29.013373][ T28] audit: type=1400 audit(1744675452.893:67): avc: denied { mount } for pid=286 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.060621][ T28] audit: type=1400 audit(1744675452.943:68): avc: denied { unmount } for pid=286 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.060836][ T286] cgroup: Unknown subsys name 'devices' [ 29.206732][ T286] cgroup: Unknown subsys name 'hugetlb' [ 29.215557][ T286] cgroup: Unknown subsys name 'rlimit' [ 29.329178][ T28] audit: type=1400 audit(1744675453.243:69): avc: denied { setattr } for pid=286 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 29.384694][ T28] audit: type=1400 audit(1744675453.243:70): avc: denied { mounton } for pid=286 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 29.396490][ T291] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 29.418431][ T28] audit: type=1400 audit(1744675453.243:71): avc: denied { mount } for pid=286 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 29.468096][ T28] audit: type=1400 audit(1744675453.383:72): avc: denied { relabelto } for pid=291 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 29.500574][ T28] audit: type=1400 audit(1744675453.383:73): avc: denied { write } for pid=291 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 29.515997][ T286] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.544510][ T28] audit: type=1400 audit(1744675453.433:74): avc: denied { read } for pid=286 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 29.616371][ T28] audit: type=1400 audit(1744675453.433:75): avc: denied { open } for pid=286 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 30.538817][ T299] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.552734][ T299] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.564690][ T299] device bridge_slave_0 entered promiscuous mode [ 30.578330][ T299] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.588465][ T299] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.599750][ T299] device bridge_slave_1 entered promiscuous mode [ 30.641297][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.653770][ T298] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.665474][ T298] device bridge_slave_0 entered promiscuous mode [ 30.702076][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.716272][ T298] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.730044][ T298] device bridge_slave_1 entered promiscuous mode [ 30.790696][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.800480][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.810604][ T300] device bridge_slave_0 entered promiscuous mode [ 30.830693][ T301] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.839352][ T301] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.847867][ T301] device bridge_slave_0 entered promiscuous mode [ 30.857958][ T301] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.867710][ T301] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.886341][ T301] device bridge_slave_1 entered promiscuous mode [ 30.894152][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.905317][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.918125][ T300] device bridge_slave_1 entered promiscuous mode [ 31.074386][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.082046][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.090886][ T302] device bridge_slave_0 entered promiscuous mode [ 31.104306][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.113613][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.121443][ T302] device bridge_slave_1 entered promiscuous mode [ 31.252563][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.261468][ T298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.271907][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.279822][ T298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.303244][ T299] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.312900][ T299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.322201][ T299] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.332064][ T299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.377481][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.385041][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.394148][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.403902][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.433146][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.440669][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.448323][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.455957][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.478501][ T301] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.488300][ T301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.497263][ T301] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.504789][ T301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.528524][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.537796][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.551370][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.560534][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.571623][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.583219][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.593384][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.603949][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.613529][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.624729][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.658327][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 31.668638][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.678154][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 31.687618][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.701580][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.713690][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.722821][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 31.737765][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.774795][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 31.785048][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.795577][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.804638][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.815237][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 31.826953][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.837031][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.845643][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.854441][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 31.864612][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.878316][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.888052][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.897420][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 31.909780][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.920026][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.933105][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.945297][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.960074][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.996432][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 32.008145][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.020235][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.030965][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.043552][ T298] device veth0_vlan entered promiscuous mode [ 32.064661][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 32.074502][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 32.082765][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 32.092618][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 32.101295][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 32.112266][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 32.121480][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.130433][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.140134][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 32.150237][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 32.160407][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.167434][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.176030][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 32.187555][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.196284][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.207328][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.216313][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 32.224822][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 32.233035][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 32.242962][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 32.260252][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.270464][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 32.280540][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 32.290671][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 32.299436][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 32.308588][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.316227][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.340538][ T298] device veth1_macvtap entered promiscuous mode [ 32.351685][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 32.364877][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.375092][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.383647][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.393835][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 32.404564][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 32.415560][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 32.424453][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 32.447674][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 32.457725][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.468905][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.478693][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.499924][ T300] device veth0_vlan entered promiscuous mode [ 32.508327][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 32.518468][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.528659][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.536048][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.544675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.553787][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.563230][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.572435][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.590316][ T299] device veth0_vlan entered promiscuous mode [ 32.600335][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 32.609220][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 32.618045][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 32.628339][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 32.637456][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 32.647734][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.656327][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.663961][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.679022][ T299] device veth1_macvtap entered promiscuous mode [ 32.694236][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 32.703856][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.715193][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.723493][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.732408][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.742247][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 32.752444][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 32.761271][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 32.770188][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 32.778626][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.787601][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.796866][ T301] device veth0_vlan entered promiscuous mode [ 32.816712][ T298] request_module fs-gadgetfs succeeded, but still no fs? [ 32.825473][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.836000][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.845014][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.853795][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.864928][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.875874][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.890584][ T300] device veth1_macvtap entered promiscuous mode [ 32.912248][ T301] device veth1_macvtap entered promiscuous mode [ 32.936051][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.948869][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.957938][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.966734][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.993126][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 33.007628][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.050470][ T302] device veth0_vlan entered promiscuous mode [ 33.060008][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 33.076417][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.091142][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 33.100821][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.116139][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 33.131064][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.145034][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 33.154589][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.172786][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 33.182241][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.196926][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.210986][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 33.264268][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 33.276391][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.297114][ T302] device veth1_macvtap entered promiscuous mode [ 33.359421][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 33.394747][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 33.430522][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.476545][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 33.519439][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 35.277073][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 35.277091][ T28] audit: type=1400 audit(1744675459.193:109): avc: denied { create } for pid=646 comm="syz.0.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 35.372382][ T28] audit: type=1400 audit(1744675459.253:110): avc: denied { create } for pid=655 comm="syz.0.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 35.494565][ T28] audit: type=1400 audit(1744675459.413:111): avc: denied { create } for pid=679 comm="syz.3.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 35.605673][ T28] audit: type=1400 audit(1744675459.523:112): avc: denied { tracepoint } for pid=693 comm="syz.0.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 36.517199][ T28] audit: type=1400 audit(1744675460.433:113): avc: denied { create } for pid=822 comm="syz.4.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 38.270409][ T28] audit: type=1400 audit(1744675462.183:114): avc: denied { create } for pid=1026 comm="syz.1.342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 38.365012][ T28] audit: type=1400 audit(1744675462.253:115): avc: denied { create } for pid=1034 comm="syz.3.346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 38.432746][ T28] audit: type=1400 audit(1744675462.303:116): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 38.510841][ T28] audit: type=1400 audit(1744675462.363:117): avc: denied { cpu } for pid=1048 comm="syz.0.354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 39.972580][ T28] audit: type=1400 audit(1744675463.883:118): avc: denied { create } for pid=1263 comm="syz.3.461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 41.030780][ T28] audit: type=1400 audit(1744675464.943:119): avc: denied { create } for pid=1448 comm="syz.0.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 41.762765][ T843] syz.3.253 (843) used greatest stack depth: 22032 bytes left [ 42.244249][ T976] syz.2.318 (976) used greatest stack depth: 21712 bytes left [ 46.993533][ T28] audit: type=1400 audit(1744675470.903:120): avc: denied { create } for pid=2103 comm="syz.1.871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 47.406204][ T28] audit: type=1400 audit(1744675471.323:121): avc: denied { create } for pid=2135 comm="syz.0.886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 49.126508][ T28] audit: type=1400 audit(1744675473.043:122): avc: denied { create } for pid=2334 comm="syz.4.981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 49.213068][ T28] audit: type=1400 audit(1744675473.043:123): avc: denied { create } for pid=2337 comm="syz.1.983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 51.242822][ T28] audit: type=1400 audit(1744675475.153:124): avc: denied { create } for pid=2716 comm="syz.3.1171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 52.240824][ T28] audit: type=1400 audit(1744675476.153:125): avc: denied { create } for pid=2881 comm="syz.4.1255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 54.348970][ T28] audit: type=1400 audit(1744675478.263:126): avc: denied { create } for pid=3102 comm="syz.3.1361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 54.435519][ T28] audit: type=1400 audit(1744675478.293:127): avc: denied { create } for pid=3106 comm="syz.1.1363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 54.546904][ T28] audit: type=1400 audit(1744675478.383:128): avc: denied { create } for pid=3113 comm="syz.3.1367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 55.182875][ T28] audit: type=1400 audit(1744675479.093:129): avc: denied { create } for pid=3214 comm="syz.1.1415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 55.282347][ T28] audit: type=1400 audit(1744675479.193:130): avc: denied { create } for pid=3230 comm="syz.2.1427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 55.360764][ T28] audit: type=1400 audit(1744675479.253:131): avc: denied { create } for pid=3231 comm="syz.0.1426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 55.515006][ T28] audit: type=1400 audit(1744675479.433:132): avc: denied { create } for pid=3263 comm="syz.3.1439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 56.219568][ T28] audit: type=1400 audit(1744675480.133:133): avc: denied { create } for pid=3373 comm="syz.4.1493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 57.525679][ T28] audit: type=1400 audit(1744675481.443:134): avc: denied { create } for pid=3549 comm="syz.1.1577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 57.943638][ T28] audit: type=1400 audit(1744675481.853:135): avc: denied { create } for pid=3603 comm="syz.3.1604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 61.109378][ T28] audit: type=1400 audit(1744675485.023:136): avc: denied { create } for pid=4058 comm="syz.4.1829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 63.719016][ T28] audit: type=1400 audit(1744675487.633:137): avc: denied { create } for pid=4467 comm="syz.4.2033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 64.300989][ T28] audit: type=1400 audit(1744675488.213:138): avc: denied { append } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 64.364310][ T28] audit: type=1400 audit(1744675488.213:139): avc: denied { open } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 64.449242][ T28] audit: type=1400 audit(1744675488.213:140): avc: denied { getattr } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 66.859790][ T28] audit: type=1400 audit(1744675490.773:141): avc: denied { create } for pid=4893 comm="syz.2.2242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 67.799225][ T28] audit: type=1400 audit(1744675491.713:142): avc: denied { write } for pid=5029 comm="syz.4.2308" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 69.411307][ T28] audit: type=1400 audit(1744675493.323:143): avc: denied { create } for pid=5263 comm="syz.3.2424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 69.510138][ T28] audit: type=1400 audit(1744675493.373:144): avc: denied { create } for pid=5272 comm="syz.1.2428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 69.595577][ T28] audit: type=1400 audit(1744675493.423:145): avc: denied { create } for pid=5278 comm="syz.3.2431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 70.150966][ T28] audit: type=1400 audit(1744675494.063:146): avc: denied { create } for pid=5356 comm="syz.3.2470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 71.709429][ T5525] syz.4.2553 uses obsolete (PF_INET,SOCK_PACKET) [ 75.061803][ T28] audit: type=1400 audit(1744675498.973:147): avc: denied { write } for pid=5914 comm="syz.1.2746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 75.154235][ T28] audit: type=1400 audit(1744675499.073:148): avc: denied { write } for pid=5924 comm="syz.1.2751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 75.242695][ T5947] device veth1_macvtap left promiscuous mode [ 75.274670][ T5951] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 75.555309][ T5984] device macsec0 entered promiscuous mode [ 76.159159][ T6023] Illegal XDP return value 4294967274 on prog (id 611) dev N/A, expect packet loss! [ 76.294349][ T6032] device veth1_macvtap left promiscuous mode [ 76.748741][ C0] hrtimer: interrupt took 886606 ns [ 77.832687][ T6162] device veth1_macvtap left promiscuous mode [ 79.118702][ T28] audit: type=1400 audit(1744675503.033:149): avc: denied { setopt } for pid=6198 comm="syz.1.2883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 80.686216][ T6398] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.613139][ T6589] device lo entered promiscuous mode [ 82.670820][ T28] audit: type=1400 audit(1744675506.583:150): avc: denied { read } for pid=6596 comm="syz.3.3089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 82.746637][ T28] audit: type=1400 audit(1744675506.663:151): avc: denied { ioctl } for pid=6601 comm="syz.3.3082" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x743d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 84.123983][ C0] sched: RT throttling activated [ 84.825733][ T6705] device syz_tun entered promiscuous mode [ 85.453677][ T28] audit: type=1400 audit(1744675509.363:152): avc: denied { ioctl } for pid=6764 comm="syz.3.3161" path="socket:[36157]" dev="sockfs" ino=36157 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 86.245380][ T28] audit: type=1400 audit(1744675510.163:153): avc: denied { ioctl } for pid=6835 comm="syz.1.3192" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 90.134583][ T7107] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.142477][ T7107] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.498695][ T7246] syz.4.3388[7246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.498791][ T7246] syz.4.3388[7246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.004146][ T7488] @ÿ: renamed from bond_slave_0 [ 102.693806][ T7799] @ÿ: renamed from bond_slave_0 [ 103.648120][ T7854] @ÿ: renamed from bond_slave_0 [ 104.786315][ T7893] @ÿ: renamed from bond_slave_0 [ 104.896079][ T28] audit: type=1400 audit(1744675528.813:154): avc: denied { getattr } for pid=7909 comm="syz.1.3702" path="net:[4026532291]" dev="nsfs" ino=4026532291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 107.100909][ T8023] device vlan1 entered promiscuous mode [ 109.843375][ T8133] ------------[ cut here ]------------ [ 109.849346][ T8133] Please remove unsupported %[ 109.855795][ T8133] WARNING: CPU: 1 PID: 8133 at lib/vsprintf.c:2661 format_decode+0x12d2/0x1f10 [ 109.865049][ T8133] Modules linked in: [ 109.870062][ T8133] CPU: 1 PID: 8133 Comm: syz.3.3808 Not tainted 6.1.129-syzkaller-00006-gefda22f3484c #0 [ 109.881760][ T8133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 109.894795][ T8133] RIP: 0010:format_decode+0x12d2/0x1f10 [ 109.901997][ T8133] Code: 78 02 01 48 b8 00 00 00 00 00 fc ff df 41 0f b6 04 07 84 c0 0f 85 30 0c 00 00 41 0f be 36 48 c7 c7 40 ad 2a 86 e8 be fa 2c fc <0f> 0b e9 01 fa ff ff 48 8b 4c 24 18 80 e1 07 38 c1 0f 8c e3 ed ff [ 109.926875][ T8133] RSP: 0018:ffffc900009b75c0 EFLAGS: 00010246 [ 109.933506][ T8133] RAX: 9e7f6ddfc963d500 RBX: 00000000ffffffdb RCX: 0000000000080000 [ 109.943228][ T8133] RDX: ffffc90002e60000 RSI: 00000000000004d2 RDI: 00000000000004d3 [ 109.955105][ T8133] RBP: ffffc900009b76b0 R08: ffffffff8144bcae R09: fffff52000136e11 [ 109.963259][ T8133] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff0a00ffffff00 [ 109.973999][ T8133] R13: ffff0000ffffff00 R14: ffffc900009b78ec R15: 1ffff92000136f1d [ 109.983766][ T8133] FS: 00007f360e4476c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 109.994412][ T8133] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 110.001061][ T8133] CR2: 0000001b2ea1eff8 CR3: 000000013147e000 CR4: 00000000003506a0 [ 110.011460][ T8133] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 110.021023][ T8133] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 110.031251][ T8133] Call Trace: [ 110.035746][ T8133] [ 110.038658][ T8133] ? show_regs+0x58/0x60 [ 110.042909][ T8133] ? __warn+0x160/0x3d0 [ 110.047772][ T8133] ? format_decode+0x12d2/0x1f10 [ 110.054751][ T8133] ? report_bug+0x4d5/0x7d0 [ 110.059844][ T8133] ? format_decode+0x12d2/0x1f10 [ 110.065070][ T8133] ? handle_bug+0x41/0x70 [ 110.070004][ T8133] ? exc_invalid_op+0x1b/0x50 [ 110.074758][ T8133] ? asm_exc_invalid_op+0x1b/0x20 [ 110.080472][ T8133] ? __warn_printk+0x28e/0x350 [ 110.086509][ T8133] ? format_decode+0x12d2/0x1f10 [ 110.092172][ T8133] ? vsnprintf+0x1c70/0x1c70 [ 110.096961][ T8133] ? bstr_printf+0x1bb/0x1160 [ 110.101597][ T8133] ? memcpy+0x56/0x70 [ 110.105945][ T8133] bstr_printf+0x130/0x1160 [ 110.112613][ T8133] ? vbin_printf+0x1be0/0x1be0 [ 110.118522][ T8133] ? bpf_trace_printk+0x122/0x330 [ 110.125476][ T8133] ? memcpy+0x56/0x70 [ 110.129833][ T8133] bpf_trace_printk+0x1b5/0x330 [ 110.135536][ T8133] ? kmem_cache_alloc+0x175/0x320 [ 110.140863][ T8133] ? ktime_get+0xf1/0x160 [ 110.145697][ T8133] ? bpf_probe_write_user+0xf0/0xf0 [ 110.152159][ T8133] ? do_syscall_64+0x3b/0xb0 [ 110.159282][ T8133] ? ktime_get+0xf1/0x160 [ 110.164424][ T8133] bpf_prog_12183cdb1cd51dab+0x2e/0x32 [ 110.173258][ T8133] bpf_test_run+0x4ab/0xa40 [ 110.178028][ T8133] ? convert___skb_to_skb+0x670/0x670 [ 110.185895][ T8133] ? eth_type_trans+0x342/0x710 [ 110.192193][ T8133] ? eth_get_headlen+0x240/0x240 [ 110.198294][ T8133] ? convert___skb_to_skb+0x44/0x670 [ 110.205918][ T8133] ? build_skb+0xde/0x220 [ 110.212219][ T8133] bpf_prog_test_run_skb+0xaf1/0x13a0 [ 110.220318][ T8133] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 110.227143][ T8133] ? __kasan_check_write+0x14/0x20 [ 110.233628][ T8133] ? fput+0x15b/0x1b0 [ 110.238465][ T8133] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 110.246018][ T8133] bpf_prog_test_run+0x3b0/0x630 [ 110.252982][ T8133] ? bpf_prog_query+0x260/0x260 [ 110.259209][ T8133] ? selinux_bpf+0xd2/0x100 [ 110.265622][ T8133] ? security_bpf+0x82/0xb0 [ 110.274262][ T8133] __sys_bpf+0x59f/0x7f0 [ 110.279142][ T8133] ? bpf_link_show_fdinfo+0x300/0x300 [ 110.285310][ T8133] ? fpregs_restore_userregs+0x130/0x290 [ 110.292632][ T8133] __x64_sys_bpf+0x7c/0x90 [ 110.297783][ T8133] x64_sys_call+0x87f/0x9a0 [ 110.303945][ T8133] do_syscall_64+0x3b/0xb0 [ 110.311546][ T8133] ? clear_bhb_loop+0x55/0xb0 [ 110.316948][ T8133] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 110.325890][ T8133] RIP: 0033:0x7f360d58d169 [ 110.331156][ T8133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.354176][ T8133] RSP: 002b:00007f360e447038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 110.365554][ T8133] RAX: ffffffffffffffda RBX: 00007f360d7a5fa0 RCX: 00007f360d58d169 [ 110.378426][ T8133] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 110.387882][ T8133] RBP: 00007f360d60e990 R08: 0000000000000000 R09: 0000000000000000 [ 110.397196][ T8133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 110.406927][ T8133] R13: 0000000000000000 R14: 00007f360d7a5fa0 R15: 00007ffccaa82df8 [ 110.419148][ T8133] [ 110.422720][ T8133] ---[ end trace 0000000000000000 ]--- [ 113.949160][ T8257] device xfrm0 entered promiscuous mode [ 114.085736][ T8272] device vlan0 entered promiscuous mode [ 114.704378][ T8367] device team_slave_0 entered promiscuous mode [ 114.734486][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 114.771813][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 118.979485][ T8716] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.994257][ T8716] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.943058][ T9057] device vlan0 entered promiscuous mode [ 124.134258][ T9080] device team_slave_0 entered promiscuous mode [ 124.165741][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 124.194415][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 124.695460][ T28] audit: type=1400 audit(1744675548.613:155): avc: denied { create } for pid=9129 comm="syz.0.4290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 127.354975][ T9364] gretap0: refused to change device tx_queue_len [ 128.166299][ T9414] lo: mtu less than device minimum [ 132.548233][ T28] audit: type=1400 audit(1744675556.463:156): avc: denied { setattr } for pid=9692 comm="syz.1.4569" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 133.649225][ T9738] device veth1_to_bond entered promiscuous mode [ 134.065021][ T28] audit: type=1400 audit(1744675557.983:157): avc: denied { setattr } for pid=9777 comm="syz.3.4610" path="/dev/net/tun" dev="devtmpfs" ino=152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 141.314874][T10299] syz.0.4865 (10299) used greatest stack depth: 21416 bytes left [ 143.442469][T10536] sock: sock_set_timeout: `syz.3.4977' (pid 10536) tries to set negative timeout [ 146.454061][T10774] device syz_tun left promiscuous mode [ 153.621515][T11077] syz.3.5231[11077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.621599][T11077] syz.3.5231[11077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.001870][T11105] ref_ctr_offset mismatch. inode: 0x137c offset: 0x0 ref_ctr_offset(old): 0x7602 ref_ctr_offset(new): 0x0 [ 155.565739][ T28] audit: type=1400 audit(1744675579.473:158): avc: denied { write } for pid=11166 comm="syz.3.5271" name="net" dev="proc" ino=50335 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 155.690832][ T28] audit: type=1400 audit(1744675579.473:159): avc: denied { add_name } for pid=11166 comm="syz.3.5271" name="blkio.throttle.io_service_bytes_recursive" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 155.977876][ T28] audit: type=1400 audit(1744675579.473:160): avc: denied { create } for pid=11166 comm="syz.3.5271" name="blkio.throttle.io_service_bytes_recursive" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 156.267530][ T28] audit: type=1400 audit(1744675579.473:161): avc: denied { associate } for pid=11166 comm="syz.3.5271" name="blkio.throttle.io_service_bytes_recursive" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 163.563774][ T28] audit: type=1400 audit(1744675587.473:162): avc: denied { create } for pid=11419 comm="syz.2.5387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 164.431873][ T28] audit: type=1400 audit(1744675588.333:163): avc: denied { remove_name } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 165.757649][ T28] audit: type=1400 audit(1744675588.333:164): avc: denied { rename } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 165.784999][ T28] audit: type=1400 audit(1744675588.333:165): avc: denied { create } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 180.522932][ T28] audit: type=1400 audit(1744675604.433:166): avc: denied { create } for pid=12598 comm="syz.2.5953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 183.493840][T12868] Â: renamed from bond_slave_1 [ 190.362815][T13209] syz.1.6240[13209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.362926][T13209] syz.1.6240[13209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.098059][T13275] device dummy0 entered promiscuous mode [ 199.653699][T13634] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 199.666060][T13634] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 199.674300][T13634] CPU: 1 PID: 13634 Comm: syz.3.6438 Tainted: G W 6.1.129-syzkaller-00006-gefda22f3484c #0 [ 199.685491][T13634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 199.695709][T13634] RIP: 0010:dev_map_enqueue+0x31/0x340 [ 199.701000][T13634] Code: 56 41 55 41 54 53 48 83 ec 18 48 89 55 c0 49 89 f7 48 89 fb 49 bc 00 00 00 00 00 fc ff df e8 a6 f3 dd ff 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 a0 a0 25 00 4c 8b 33 48 83 c3 20 [ 199.720446][T13634] RSP: 0018:ffffc90000c775f8 EFLAGS: 00010246 [ 199.726341][T13634] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000080000 [ 199.734155][T13634] RDX: ffffc90002e60000 RSI: 0000000000000382 RDI: 0000000000000383 [ 199.742399][T13634] RBP: ffffc90000c77638 R08: ffffffff84159782 R09: ffffffff841596a2 [ 199.750214][T13634] R10: 0000000000000004 R11: ffff88813c4ce540 R12: dffffc0000000000 [ 199.758021][T13634] R13: 1ffff1103ede6e15 R14: 1ffff1103ede6e15 R15: ffff888112681070 [ 199.765831][T13634] FS: 00007f360e4476c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 199.774612][T13634] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 199.781028][T13634] CR2: 00007ffc31003c48 CR3: 00000001468b0000 CR4: 00000000003506a0 [ 199.788832][T13634] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 199.796639][T13634] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 199.804451][T13634] Call Trace: [ 199.807578][T13634] [ 199.810382][T13634] ? __die_body+0x62/0xb0 [ 199.814521][T13634] ? die_addr+0x9f/0xd0 [ 199.818519][T13634] ? exc_general_protection+0x317/0x4c0 [ 199.823902][T13634] ? asm_exc_general_protection+0x27/0x30 [ 199.829461][T13634] ? xdp_do_redirect_frame+0x1b2/0x800 [ 199.834743][T13634] ? xdp_do_redirect_frame+0x292/0x800 [ 199.840037][T13634] ? dev_map_enqueue+0x31/0x340 [ 199.844724][T13634] ? dev_map_enqueue+0x2a/0x340 [ 199.849413][T13634] xdp_do_redirect_frame+0x2b5/0x800 [ 199.854624][T13634] bpf_test_run_xdp_live+0xc30/0x1f70 [ 199.859833][T13634] ? bpf_test_run_xdp_live+0x7ae/0x1f70 [ 199.865737][T13634] ? xdp_convert_md_to_buff+0x360/0x360 [ 199.871812][T13634] ? bpf_dispatcher_change_prog+0xd86/0xf10 [ 199.878147][T13634] ? 0xffffffffa00038c0 [ 199.882230][T13634] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 199.888407][T13634] ? __kasan_check_write+0x14/0x20 [ 199.893343][T13634] ? _copy_from_user+0x90/0xc0 [ 199.898728][T13634] bpf_prog_test_run_xdp+0x7d1/0x1130 [ 199.904692][T13634] ? dev_put+0x80/0x80 [ 199.908607][T13634] ? __kasan_check_write+0x14/0x20 [ 199.914080][T13634] ? fput+0x15b/0x1b0 [ 199.917913][T13634] ? dev_put+0x80/0x80 [ 199.921803][T13634] bpf_prog_test_run+0x3b0/0x630 [ 199.926582][T13634] ? bpf_prog_query+0x260/0x260 [ 199.931266][T13634] ? selinux_bpf+0xd2/0x100 [ 199.935618][T13634] ? security_bpf+0x82/0xb0 [ 199.939942][T13634] __sys_bpf+0x59f/0x7f0 [ 199.944023][T13634] ? bpf_link_show_fdinfo+0x300/0x300 [ 199.949342][T13634] ? fpregs_restore_userregs+0x130/0x290 [ 199.954900][T13634] __x64_sys_bpf+0x7c/0x90 [ 199.959253][T13634] x64_sys_call+0x87f/0x9a0 [ 199.963631][T13634] do_syscall_64+0x3b/0xb0 [ 199.968009][T13634] ? clear_bhb_loop+0x55/0xb0 [ 199.972525][T13634] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 199.978333][T13634] RIP: 0033:0x7f360d58d169 [ 199.982579][T13634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 200.003066][T13634] RSP: 002b:00007f360e447038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 200.011315][T13634] RAX: ffffffffffffffda RBX: 00007f360d7a5fa0 RCX: 00007f360d58d169 [ 200.019177][T13634] RDX: 0000000000000050 RSI: 00002000000000c0 RDI: 000000000000000a [ 200.026930][T13634] RBP: 00007f360d60e990 R08: 0000000000000000 R09: 0000000000000000 [ 200.034742][T13634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 200.043073][T13634] R13: 0000000000000000 R14: 00007f360d7a5fa0 R15: 00007ffccaa82df8 [ 200.050983][T13634] [ 200.053846][T13634] Modules linked in: [ 200.057668][T13634] ---[ end trace 0000000000000000 ]--- [ 200.062869][T13634] RIP: 0010:dev_map_enqueue+0x31/0x340 [ 200.068193][T13634] Code: 56 41 55 41 54 53 48 83 ec 18 48 89 55 c0 49 89 f7 48 89 fb 49 bc 00 00 00 00 00 fc ff df e8 a6 f3 dd ff 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 a0 a0 25 00 4c 8b 33 48 83 c3 20 [ 200.087636][T13634] RSP: 0018:ffffc90000c775f8 EFLAGS: 00010246 [ 200.093591][T13634] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000080000 [ 200.101601][T13634] RDX: ffffc90002e60000 RSI: 0000000000000382 RDI: 0000000000000383 [ 200.109627][T13634] RBP: ffffc90000c77638 R08: ffffffff84159782 R09: ffffffff841596a2 [ 200.117429][T13634] R10: 0000000000000004 R11: ffff88813c4ce540 R12: dffffc0000000000 [ 200.125247][T13634] R13: 1ffff1103ede6e15 R14: 1ffff1103ede6e15 R15: ffff888112681070 [ 200.133162][T13634] FS: 00007f360e4476c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 200.142019][T13634] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 200.149125][T13634] CR2: 00007ffc31003c48 CR3: 00000001468b0000 CR4: 00000000003506a0 [ 200.157151][T13634] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 200.165489][T13634] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 200.174474][T13634] Kernel panic - not syncing: Fatal exception in interrupt [ 200.182372][T13634] Kernel Offset: disabled [ 200.186512][T13634] Rebooting in 86400 seconds..