last executing test programs: 4.896368705s ago: executing program 2: 4.877171217s ago: executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce220000000000000000000000000000ffff7fc5f603ff65ec5deb000071673fbcee4ec1539c446ba7"], 0xfdef) 4.820377716s ago: executing program 2: 4.80007483s ago: executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b702000002000000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x3, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x15, 0x0, 0x0, 0x6}}, [@printk={@p, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x45}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000300000000850000002d00000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300080000000085000000060000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='block_plug\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f2, &(0x7f0000000080)) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000340)=0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x2c}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 2.927393092s ago: executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r0, 0x18000000000002a0, 0xa, 0x0, &(0x7f0000001240)="b9ff03076804268c989e", 0x0, 0xb000000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.845466275s ago: executing program 1: 2.825830158s ago: executing program 1: 2.763683488s ago: executing program 1: 2.724250534s ago: executing program 1: 2.704099457s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000f7000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000bdb200b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0xffffff2d, 0x0, 0x41000, 0x56, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x4, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x9fffffff}, [@generic={0x2c}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x80) r2 = bpf$ITER_CREATE(0xb, 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r3}, 0x10) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x9, &(0x7f0000000080)=@framed={{0x18, 0x8}, [@map_fd={0x18, 0x0, 0x1, 0x0, r6}, @generic={0x2c}, @map_val={0x18, 0x0, 0x2, 0x0, r6}, @exit]}, &(0x7f0000000000)='GPL\x00', 0x6, 0xde, &(0x7f0000000340)=""/222}, 0x90) write$cgroup_int(r5, &(0x7f00000001c0), 0xfffffdef) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r7}, 0x10) r9 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r8}, 0x8) write$cgroup_int(r9, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0xb2}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b70200001400ea00b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='module_request\x00', r12}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x2, '\x00', 0x0, r10, 0x4, 0x3, 0x4}, 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000711219000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.502748929s ago: executing program 4: 2.487648371s ago: executing program 4: 2.474125413s ago: executing program 4: 2.459351415s ago: executing program 4: 2.445337198s ago: executing program 4: 2.43143159s ago: executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xe) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2182}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'ip6tnl0\x00', 0x400}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETTXFILTER(r0, 0x401054d5, &(0x7f00000000c0)=ANY=[@ANYBLOB="4500002007005af42175228f82"]) r1 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x5}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000500)={'pimreg0\x00', 0x2}) ioctl$TUNGETVNETHDRSZ(r3, 0x400454cc, 0xffffffffffffffff) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000000780)=0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x20e, 0x5ee, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 2.051212519s ago: executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000feffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f0000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x4, 0x8, 0x8, 0x81}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r4, &(0x7f0000000180)=ANY=[], 0x280) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xe, 0x4, 0x9, 0x1}, 0x48) 1.950009895s ago: executing program 3: 1.895918073s ago: executing program 3: 1.875358337s ago: executing program 3: 1.8572656s ago: executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r0, 0x18000000000002a0, 0xa, 0x0, &(0x7f0000001240)="b9ff03076804268c989e", 0x0, 0xb000000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 59.65139ms ago: executing program 0: 55.777331ms ago: executing program 0: 51.740162ms ago: executing program 0: 47.645682ms ago: executing program 0: 43.856353ms ago: executing program 0: 40.097494ms ago: executing program 3: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 31.331145ms ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) write$cgroup_int(r3, &(0x7f0000000200), 0x42400) 24.808446ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_discard_blocks\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_service_bytes_recursive\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0185879, &(0x7f0000000040)) 0s ago: executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x13, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000b00)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x72}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) kernel console output (not intermixed with test programs): [ 3.371007][ T86] acpid (86) used greatest stack depth: 23408 bytes left [ 3.680789][ T101] udevd[101]: starting version 3.2.11 [ 3.728139][ T102] udevd[102]: starting eudev-3.2.11 [ 3.729255][ T101] udevd (101) used greatest stack depth: 22288 bytes left [ 13.076055][ T28] kauditd_printk_skb: 50 callbacks suppressed [ 13.076069][ T28] audit: type=1400 audit(1718532345.579:61): avc: denied { transition } for pid=226 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.080610][ T28] audit: type=1400 audit(1718532345.579:62): avc: denied { noatsecure } for pid=226 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.084034][ T28] audit: type=1400 audit(1718532345.579:63): avc: denied { write } for pid=226 comm="sh" path="pipe:[12722]" dev="pipefs" ino=12722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 13.088424][ T28] audit: type=1400 audit(1718532345.579:64): avc: denied { rlimitinh } for pid=226 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.091326][ T28] audit: type=1400 audit(1718532345.579:65): avc: denied { siginh } for pid=226 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.41' (ED25519) to the list of known hosts. 2024/06/16 10:05:53 fuzzer started 2024/06/16 10:05:53 dialing manager at 10.128.0.163:30014 [ 20.839644][ T28] audit: type=1400 audit(1718532353.349:66): avc: denied { node_bind } for pid=285 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 20.860291][ T28] audit: type=1400 audit(1718532353.349:67): avc: denied { name_bind } for pid=285 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 20.890651][ T28] audit: type=1400 audit(1718532353.399:68): avc: denied { setattr } for pid=293 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=166 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.894051][ T294] cgroup: Unknown subsys name 'net' [ 20.927907][ T294] cgroup: Unknown subsys name 'devices' [ 20.929798][ T28] audit: type=1400 audit(1718532353.399:69): avc: denied { mounton } for pid=294 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.955985][ T28] audit: type=1400 audit(1718532353.399:70): avc: denied { mount } for pid=294 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.974047][ T302] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.977927][ T28] audit: type=1400 audit(1718532353.429:71): avc: denied { unmount } for pid=294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.994345][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.005878][ T28] audit: type=1400 audit(1718532353.439:72): avc: denied { mounton } for pid=301 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.038827][ T28] audit: type=1400 audit(1718532353.439:73): avc: denied { mount } for pid=301 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.061733][ T28] audit: type=1400 audit(1718532353.489:74): avc: denied { relabelto } for pid=302 comm="mkswap" name="swap-file" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.086976][ T28] audit: type=1400 audit(1718532353.489:75): avc: denied { write } for pid=302 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.179345][ T294] cgroup: Unknown subsys name 'hugetlb' [ 21.184787][ T294] cgroup: Unknown subsys name 'rlimit' 2024/06/16 10:05:53 starting 5 executor processes [ 21.812289][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.819233][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.826263][ T309] device bridge_slave_0 entered promiscuous mode [ 21.839644][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.846560][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.853817][ T309] device bridge_slave_1 entered promiscuous mode [ 21.886271][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.893143][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.900416][ T311] device bridge_slave_0 entered promiscuous mode [ 21.906744][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.913650][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.920801][ T310] device bridge_slave_0 entered promiscuous mode [ 21.934695][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.941554][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.948788][ T311] device bridge_slave_1 entered promiscuous mode [ 21.955060][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.961933][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.969084][ T310] device bridge_slave_1 entered promiscuous mode [ 22.006992][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.013977][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.021161][ T313] device bridge_slave_0 entered promiscuous mode [ 22.037354][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.044252][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.051532][ T313] device bridge_slave_1 entered promiscuous mode [ 22.061586][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.068462][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.075515][ T312] device bridge_slave_0 entered promiscuous mode [ 22.082192][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.089044][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.096265][ T312] device bridge_slave_1 entered promiscuous mode [ 22.269189][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.276031][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.283160][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.289932][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.298442][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.305283][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.312403][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.319187][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.346127][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.352994][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.360107][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.366863][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.374847][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.381704][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.388797][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.395577][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.416238][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.423150][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.430277][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.437020][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.475947][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.483450][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.490545][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.497473][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.504629][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.511600][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.518673][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.525623][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.533056][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.540011][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.547772][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.555001][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.565128][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.576559][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.584617][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.591461][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.608788][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.616686][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.624680][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.631525][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.638823][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.672169][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.680902][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.689649][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.699077][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.705912][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.713114][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.721162][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.727999][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.735136][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.742852][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.750571][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.757767][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.765657][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.772424][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.779545][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.787353][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.794119][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.801258][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.808947][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.816833][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.823599][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.832280][ T310] device veth0_vlan entered promiscuous mode [ 22.861195][ T310] device veth1_macvtap entered promiscuous mode [ 22.873076][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.881018][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.889282][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.897179][ T315] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.903937][ T315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.911135][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.919665][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.927331][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.935454][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.943364][ T315] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.950199][ T315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.957312][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.965412][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.973116][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.980965][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.988671][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.996398][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.004090][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.012148][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.020281][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.028204][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.036065][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.043546][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.051622][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.059643][ T315] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.066459][ T315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.073693][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.081818][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.089988][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.097280][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.112892][ T309] device veth0_vlan entered promiscuous mode [ 23.125306][ T311] device veth0_vlan entered promiscuous mode [ 23.132016][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.140170][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.148530][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.156144][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.164527][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.172571][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.180623][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.188400][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.196487][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.203842][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.211122][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.218448][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.228266][ T312] device veth0_vlan entered promiscuous mode [ 23.242846][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.250894][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.259345][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.266985][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.274922][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.282452][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.294900][ T312] device veth1_macvtap entered promiscuous mode [ 23.303398][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.311648][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.319676][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.327908][ T311] device veth1_macvtap entered promiscuous mode [ 23.339618][ T309] device veth1_macvtap entered promiscuous mode [ 23.348942][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.356407][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.364475][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.372458][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.410130][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.424585][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.432563][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.440683][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.448582][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.456631][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.464828][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.472936][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.481127][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.489286][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.497327][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.505395][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.513477][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.521566][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.529660][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.537590][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.548844][ T338] device sit0 entered promiscuous mode [ 23.567031][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.577175][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.594449][ T343] Illegal XDP return value 4294967274 on prog (id 3) dev N/A, expect packet loss! [ 23.602867][ T313] device veth0_vlan entered promiscuous mode [ 23.614137][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.626419][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.636620][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.644145][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.657431][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.672794][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.687460][ T313] device veth1_macvtap entered promiscuous mode [ 23.731712][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.756304][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.764626][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.773483][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.957661][ C1] hrtimer: interrupt took 16906 ns [ 23.970660][ T370] device pim6reg1 entered promiscuous mode [ 24.104539][ T421] syz-executor.2[421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.104601][ T421] syz-executor.2[421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.226770][ T427] device pim6reg1 entered promiscuous mode [ 24.467713][ T469] syz-executor.4[469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.467772][ T469] syz-executor.4[469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.499279][ T474] device pim6reg1 entered promiscuous mode [ 25.020834][ T517] syz-executor.3[517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.020961][ T517] syz-executor.3[517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.079198][ T519] device pim6reg1 entered promiscuous mode [ 25.282138][ T545] syz-executor.1[545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.282206][ T545] syz-executor.1[545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.388629][ T548] device pim6reg1 entered promiscuous mode [ 25.848524][ T584] syz-executor.0[584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.848594][ T584] syz-executor.0[584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.209467][ T311] syz-executor.4 (311) used greatest stack depth: 21520 bytes left [ 26.699539][ T623] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.706526][ T623] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.714141][ T623] device bridge_slave_0 entered promiscuous mode [ 26.744647][ T623] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.763436][ T623] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.786342][ T623] device bridge_slave_1 entered promiscuous mode [ 26.846848][ T641] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.853862][ T641] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.863046][ T641] device bridge_slave_0 entered promiscuous mode [ 26.895374][ T641] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.906933][ T641] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.914615][ T641] device bridge_slave_1 entered promiscuous mode [ 27.417022][ T341] device bridge_slave_1 left promiscuous mode [ 27.425920][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.555658][ T341] device bridge_slave_0 left promiscuous mode [ 27.561639][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.573316][ T341] device veth1_macvtap left promiscuous mode [ 27.581784][ T341] device veth0_vlan left promiscuous mode [ 27.908149][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.915428][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.983408][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 27.997962][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.009155][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.016039][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.023752][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.043442][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.052392][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.059358][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.142041][ T641] device veth0_vlan entered promiscuous mode [ 28.154138][ T641] device veth1_macvtap entered promiscuous mode [ 28.182505][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.198519][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.207001][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.215701][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.223664][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.230959][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.238243][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.245824][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.253916][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.261566][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.273023][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.281357][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.289788][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.296628][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.303928][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.312038][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.320152][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.326968][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.334160][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.341865][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.349751][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.357533][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.365405][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.373175][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.381002][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.409493][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.418152][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.439581][ T623] device veth0_vlan entered promiscuous mode [ 28.449053][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.456896][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.468933][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.476242][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.626728][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.644907][ T28] kauditd_printk_skb: 29 callbacks suppressed [ 28.644922][ T28] audit: type=1400 audit(1718532361.149:105): avc: denied { read } for pid=759 comm="syz-executor.0" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.659865][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.689969][ T28] audit: type=1400 audit(1718532361.199:106): avc: denied { open } for pid=759 comm="syz-executor.0" path="/dev/ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.713824][ T28] audit: type=1400 audit(1718532361.199:107): avc: denied { ioctl } for pid=759 comm="syz-executor.0" path="/dev/ppp" dev="devtmpfs" ino=138 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.718180][ T623] device veth1_macvtap entered promiscuous mode [ 28.756712][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.765949][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.774913][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.784716][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.792746][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.057655][ C0] sched: RT throttling activated [ 31.181164][ T819] bpf_get_probe_write_proto: 2 callbacks suppressed [ 31.181180][ T819] syz-executor.4[819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.198394][ T819] syz-executor.4[819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.309181][ T28] audit: type=1400 audit(1718532363.819:108): avc: denied { write } for pid=836 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.674837][ T868] syz-executor.3[868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.674906][ T868] syz-executor.3[868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.964659][ T341] device bridge_slave_1 left promiscuous mode [ 32.033862][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.053997][ T341] device bridge_slave_0 left promiscuous mode [ 32.060107][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.069237][ T341] device veth1_macvtap left promiscuous mode [ 32.075141][ T341] device veth0_vlan left promiscuous mode [ 32.152525][ T912] syz-executor.0[912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.152606][ T912] syz-executor.0[912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.421816][ T948] syz-executor.0[948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.444003][ T948] syz-executor.0[948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.801127][ T991] syz-executor.1[991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.812721][ T991] syz-executor.1[991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.453137][ T28] audit: type=1400 audit(1718532366.959:109): avc: denied { cpu } for pid=1179 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 35.268414][ T1293] device syzkaller0 entered promiscuous mode [ 35.397476][ T1316] device syzkaller0 entered promiscuous mode [ 35.612352][ T1347] device syzkaller0 entered promiscuous mode [ 36.052395][ T1402] device syzkaller0 entered promiscuous mode [ 36.299042][ T1453] device syzkaller0 entered promiscuous mode [ 36.727371][ T1522] bond_slave_1: mtu less than device minimum [ 36.775062][ T1521] device syzkaller0 entered promiscuous mode [ 37.117975][ T1551] bond_slave_1: mtu less than device minimum [ 37.408129][ T28] audit: type=1400 audit(1718532369.919:110): avc: denied { relabelfrom } for pid=1566 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 37.436469][ T1509] syz-executor.2 (1509) used greatest stack depth: 21016 bytes left [ 37.445008][ T28] audit: type=1400 audit(1718532369.919:111): avc: denied { relabelto } for pid=1566 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 37.532071][ T1581] bond_slave_1: mtu less than device minimum [ 37.682004][ T1594] device syzkaller0 entered promiscuous mode [ 38.178302][ T1620] bond_slave_1: mtu less than device minimum [ 38.349335][ T1642] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 39.022205][ T1721] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 39.868615][ T28] audit: type=1400 audit(1718532372.379:112): avc: denied { setopt } for pid=1757 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 39.896017][ T1781] tap0: tun_chr_ioctl cmd 2147767520 [ 39.909832][ T1786] syz-executor.2[1786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.909903][ T1786] syz-executor.2[1786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.136840][ T1811] syz-executor.0[1811] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.158549][ T1811] syz-executor.0[1811] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.233010][ T1824] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 40.356082][ T1843] syz-executor.4[1843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.356155][ T1843] syz-executor.4[1843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.849520][ T1878] syz-executor.0[1878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.887210][ T1882] device macsec0 entered promiscuous mode [ 40.919994][ T1878] syz-executor.0[1878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.191840][ T1919] tap0: tun_chr_ioctl cmd 2147767520 [ 42.050660][ T1938] syz-executor.2[1938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.050727][ T1938] syz-executor.2[1938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.480411][ T2101] tap0: tun_chr_ioctl cmd 2147767520 [ 45.408746][ T2154] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 45.943174][ T2182] tap0: tun_chr_ioctl cmd 2147767520 [ 47.437214][ T28] audit: type=1400 audit(1718532379.939:113): avc: denied { create } for pid=2238 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 47.609085][ T2247] tap0: tun_chr_ioctl cmd 2147767520 [ 47.767775][ T2250] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 51.371917][ T2367] bpf_get_probe_write_proto: 6 callbacks suppressed [ 51.371936][ T2367] syz-executor.3[2367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.378648][ T2367] syz-executor.3[2367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.391708][ T2367] syz-executor.3[2367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.403862][ T2367] syz-executor.3[2367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.436910][ T2375] syz-executor.3[2375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.449061][ T2375] syz-executor.3[2375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.570840][ T2397] device syzkaller0 entered promiscuous mode [ 52.625436][ T2413] syz-executor.0[2413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.625553][ T2413] syz-executor.0[2413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.638342][ T2413] syz-executor.0[2413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.665076][ T2413] syz-executor.0[2413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.837227][ T28] audit: type=1400 audit(1718532385.339:114): avc: denied { create } for pid=2435 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 53.360238][ T2470] device syzkaller0 entered promiscuous mode [ 56.034348][ T28] audit: type=1400 audit(1718532388.539:115): avc: denied { ioctl } for pid=2578 comm="syz-executor.2" path="socket:[21927]" dev="sockfs" ino=21927 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 56.593931][ T2607] tap0: tun_chr_ioctl cmd 2147767520 [ 56.665198][ T2616] bpf_get_probe_write_proto: 2 callbacks suppressed [ 56.665245][ T2616] syz-executor.2[2616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.673710][ T2616] syz-executor.2[2616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.261530][ T2624] device syzkaller0 entered promiscuous mode [ 58.127259][ T2677] device pim6reg1 entered promiscuous mode [ 58.390068][ T2682] syz-executor.4[2682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.390139][ T2682] syz-executor.4[2682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.863797][ T2688] device syzkaller0 entered promiscuous mode [ 60.133289][ T2788] syz-executor.3[2788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.133359][ T2788] syz-executor.3[2788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.737360][ T2811] device syzkaller0 entered promiscuous mode [ 60.891483][ T2813] device pim6reg1 entered promiscuous mode [ 61.696737][ T2884] tap0: tun_chr_ioctl cmd 2147767520 [ 62.931864][ T2954] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.938894][ T2954] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.032478][ T2954] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.039354][ T2954] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.046469][ T2954] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.053247][ T2954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.120060][ T2954] device bridge0 entered promiscuous mode [ 63.246273][ T28] audit: type=1400 audit(1718532395.749:116): avc: denied { write } for pid=2953 comm="syz-executor.4" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 63.852435][ T2994] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.859455][ T2994] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.935500][ T2998] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.942389][ T2998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.949491][ T2998] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.956338][ T2998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.982187][ T2998] device bridge0 entered promiscuous mode [ 65.369564][ T3074] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.376471][ T3074] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.404741][ T3074] device bridge0 left promiscuous mode [ 65.421143][ T3074] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.428043][ T3074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.435145][ T3074] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.441916][ T3074] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.450286][ T3074] device bridge0 entered promiscuous mode [ 65.795096][ T28] audit: type=1400 audit(1718532398.299:117): avc: denied { create } for pid=3101 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 66.427744][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.454757][ T3195] syz-executor.1[3195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.454859][ T3195] syz-executor.1[3195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.542108][ T3231] device syzkaller0 entered promiscuous mode [ 68.650963][ T3234] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 69.176354][ T28] audit: type=1400 audit(1718532401.679:118): avc: denied { create } for pid=3289 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 69.224801][ T3274] device syzkaller0 entered promiscuous mode [ 70.024195][ T3335] syz-executor.0[3335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.032708][ T3335] syz-executor.0[3335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.095048][ T3527] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 72.289584][ T3543] device pim6reg1 entered promiscuous mode [ 72.513028][ T3549] device syzkaller0 entered promiscuous mode [ 72.734236][ T28] audit: type=1400 audit(1718532405.239:119): avc: denied { create } for pid=3576 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 73.692250][ T3657] device pim6reg1 entered promiscuous mode [ 73.946390][ T3670] device syzkaller0 entered promiscuous mode [ 74.018673][ T309] syz-executor.1 (309) used greatest stack depth: 20904 bytes left [ 74.148301][ T3686] device pim6reg1 entered promiscuous mode [ 74.165994][ T3674] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.173204][ T3674] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.180695][ T3674] device bridge_slave_0 entered promiscuous mode [ 74.206177][ T3674] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.226400][ T3694] syz-executor.3 (3694) used greatest stack depth: 20696 bytes left [ 74.237541][ T3674] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.252523][ T3674] device bridge_slave_1 entered promiscuous mode [ 74.351314][ T3698] device syzkaller0 entered promiscuous mode [ 74.641678][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.650467][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.673581][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.681858][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.689923][ T696] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.696778][ T696] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.704080][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.712328][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.720941][ T696] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.727805][ T696] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.760573][ T3674] device veth0_vlan entered promiscuous mode [ 74.768957][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 74.776803][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 74.785755][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 74.802482][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 74.814532][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 74.823550][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 74.831451][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 74.846460][ T3674] device veth1_macvtap entered promiscuous mode [ 74.866735][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 74.885924][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 74.895528][ T8] device bridge_slave_1 left promiscuous mode [ 74.901546][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.910262][ T8] device bridge_slave_0 left promiscuous mode [ 74.916544][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.971947][ T8] device veth1_macvtap left promiscuous mode [ 74.998664][ T8] device veth0_vlan left promiscuous mode [ 75.290741][ T3727] syz-executor.4[3727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.290810][ T3727] syz-executor.4[3727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.406171][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 75.756179][ T3734] device syzkaller0 entered promiscuous mode [ 80.285163][ T3939] syz-executor.3[3939] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.285225][ T3939] syz-executor.3[3939] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.795564][ T3942] device syzkaller0 entered promiscuous mode [ 84.355897][ T3986] device syzkaller0 entered promiscuous mode [ 88.084724][ T4043] device syzkaller0 entered promiscuous mode [ 89.403960][ T4117] device syzkaller0 entered promiscuous mode [ 91.158466][ T4159] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 91.169987][ T4159] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 91.178231][ T4159] CPU: 1 PID: 4159 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00009-g25216be1ac5e #0 [ 91.188211][ T4159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 91.198107][ T4159] RIP: 0010:dev_map_enqueue+0x31/0x340 2024/06/16 10:07:03 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 91.203401][ T4159] Code: 56 41 55 41 54 53 48 83 ec 18 48 89 55 c0 49 89 f7 48 89 fb 49 bc 00 00 00 00 00 fc ff df e8 c6 1f de ff 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 10 1d 25 00 4c 8b 33 48 83 c3 20 [ 91.222849][ T4159] RSP: 0018:ffffc90002b4f648 EFLAGS: 00010246 [ 91.228749][ T4159] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000040000 [ 91.236559][ T4159] RDX: ffffc900037ec000 RSI: 0000000000000114 RDI: 0000000000000115 [ 91.244373][ T4159] RBP: ffffc90002b4f688 R08: 0000000000000005 R09: ffffffff8411ded5 [ 91.252184][ T4159] R10: 0000000000000004 R11: ffff888134693cc0 R12: dffffc0000000000 [ 91.259992][ T4159] R13: 0000000000000000 R14: ffff8881f71364a0 R15: ffff8881199ca070 [ 91.267805][ T4159] FS: 00007ff396dc36c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 91.276570][ T4159] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 91.283080][ T4159] CR2: 0000000000000000 CR3: 000000012179b000 CR4: 00000000003506a0 [ 91.290897][ T4159] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 91.298700][ T4159] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 91.306516][ T4159] Call Tra