last executing test programs: 2.552165937s ago: executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r1}, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0xffe6) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) perf_event_open(&(0x7f0000000480)={0x1, 0xfffffffffffffea9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x2}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="008ea319468699922e503b6648f791d4dcbacd8f887ca583fc9ebd1b58aa15f24352c5c506"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x9, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={0x0, r6}, 0x10) r7 = perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x92, 0x3f, 0x5, 0xff, 0x0, 0x8000, 0x40000, 0x5, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1340578f, 0x4, @perf_config_ext={0x100000000, 0x2000000000}, 0x8240, 0xe9, 0x2, 0x5, 0xfff, 0x5, 0xfe7, 0x0, 0xe584, 0x0, 0xcb4}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 2.189365283s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000200000000000000000818110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r3}, 0x10) close(0xffffffffffffffff) sendmsg$unix(r2, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) 2.087949009s ago: executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00', r1}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 2.07817813s ago: executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb96f37538e486dd637288f7"], 0xe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x11, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x26, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008411200008000000186900000a0000000000000000100000186200000c00000000000000000000001863000008000000000000000200000085100000f8ffffff18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000001838020005000000000000000000000018230000", @ANYRES32, @ANYBLOB="0000000006000000186a0000090000000000000007000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce810203290800000000000000000000ffff9ff57b00000000000000000000000000ac1414aa"], 0xfdef) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='sched_kthread_work_queue_work\x00', r8}, 0x10) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r2, &(0x7f00000004c0)="d161e3c997cc571e0c445fc767f3d6f4d11e0fe26e7c443824b8a8b00e39d4980b6786765319f07664ff9aac59498ba406d77d4f68b5248601a6069989758e35e88c8fe61f90e4d07c9900f9b6e81cfad0d87cff179c14e79cf829d9b95dd5c7b3ddcaece2b5553d6505a333e0887cdb66b587cf92ed2ac22b537d2151fd746a954e8336d54313ae2f"}, 0xfffffffffffffd12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00'}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000001e18110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000800b70300008ccc00008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='scsi_dispatch_cmd_start\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r10, &(0x7f0000000100), 0x1001) 2.071458621s ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000980)=ANY=[@ANYRESOCT=0x0], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000236c57ec900000000000000010000040400000000dbf2c87254a3d2e70000000000000000000006040000000028da230ed43adc730aa965066f13a2f45fe216f30cd4305907f584430b7933c2ffff89111e1afdf4df0ef49fb50333"], 0x0, 0x3e, 0x0, 0x5}, 0x20) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'macvlan0\x00'}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='cgroup.stat\x00', 0x26e1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x12, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007a000000180000000000000000000000000000009500000000000000846bdab3ee67f88bffb73826c5f82839a2756bd52b2f8f914b1ba42e6b0e7ed0388f8c5818adb3c980afb3f8a6efbb9ddbf3aab033ba3bd652d837bb47636b061a9b03d254b0bd9626b583ecca"], &(0x7f0000000200)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x90) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)) close(r3) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x5451, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x1}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='/./\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r2, 0x58, &(0x7f0000000340)}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000040)='syz1\x00', 0x1ff) 2.01641245s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x3, 0x5}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r3}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='sys_enter\x00', r4}, 0x10) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='page_pool_state_hold\x00'}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_ext_remove_space_done\x00', r7}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x2}}) sendmsg$inet(r5, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c75256509e3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r6, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) bpf$PROG_LOAD(0x5, &(0x7f0000001e00)={0x7, 0x23, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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", @ANYBLOB="0000000000000000b70500000800000085000000a50000000903ab0406000000950000000000000085100000f8ffffff850000001800000018440000fdffffff0000000000000000b7080000000000007b8af8ff00000000b7080000588f00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa4000000000000", @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f00000003c0)='GPL\x00', 0xc3c, 0xc7, &(0x7f0000000840)=""/199, 0x41100, 0x22, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0x6, 0x3f, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x8, 0x0, &(0x7f0000001d40)=[{0x2, 0x4}, {0x0, 0x5, 0x6}, {0x4, 0x5, 0xd, 0x7}, {0x0, 0x0, 0xc, 0x2}, {0x4, 0x0, 0xd}, {0x5, 0x3, 0x9, 0x2}, {0x1, 0x2, 0x0, 0xb}, {0x3, 0x4, 0x6, 0x9}], 0x10, 0x7}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb01001800"/27], &(0x7f0000000a40)=""/235, 0x1b, 0xeb, 0x1, 0x2}, 0x20) 1.093509961s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x13}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x1c}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc020660b, &(0x7f0000000040)) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70200001400894fb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 1.051273678s ago: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000005c0)='qdisc_destroy\x00', r0}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r5}, &(0x7f0000000800), &(0x7f0000000840)=r6}, 0x20) close(r4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1282, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) write$cgroup_pid(r4, &(0x7f0000000380), 0x12) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r7}, 0x10) r9 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r8}, 0x8) write$cgroup_subtree(r9, 0x0, 0x8a80) write$cgroup_subtree(r9, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00perf_even^ '], 0xc) 1.021067823s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000980)=ANY=[@ANYRESOCT=0x0], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000236c57ec900000000000000010000040400000000dbf2c87254a3d2e70000000000000000000006040000000028da230ed43adc730aa965066f13a2f45fe216f30cd4305907f584430b7933c2ffff89111e1afdf4df0ef49fb50333"], 0x0, 0x3e, 0x0, 0x5}, 0x20) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'macvlan0\x00'}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='cgroup.stat\x00', 0x26e1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x12, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007a000000180000000000000000000000000000009500000000000000846bdab3ee67f88bffb73826c5f82839a2756bd52b2f8f914b1ba42e6b0e7ed0388f8c5818adb3c980afb3f8a6efbb9ddbf3aab033ba3bd652d837bb47636b061a9b03d254b0bd9626b583ecca"], &(0x7f0000000200)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x90) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)) close(r3) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x5451, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x1}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='/./\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r2, 0x58, &(0x7f0000000340)}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000040)='syz1\x00', 0x1ff) 1.005151455s ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb96f37538e486dd637288f7"], 0xe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x11, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x26, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008411200008000000186900000a0000000000000000100000186200000c00000000000000000000001863000008000000000000000200000085100000f8ffffff18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000001838020005000000000000000000000018230000", @ANYRES32, @ANYBLOB="0000000006000000186a0000090000000000000007000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce810203290800000000000000000000ffff9ff57b00000000000000000000000000ac1414aa"], 0xfdef) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='sched_kthread_work_queue_work\x00', r8}, 0x10) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r2, &(0x7f00000004c0)="d161e3c997cc571e0c445fc767f3d6f4d11e0fe26e7c443824b8a8b00e39d4980b6786765319f07664ff9aac59498ba406d77d4f68b5248601a6069989758e35e88c8fe61f90e4d07c9900f9b6e81cfad0d87cff179c14e79cf829d9b95dd5c7b3ddcaece2b5553d6505a333e0887cdb66b587cf92ed2ac22b537d2151fd746a954e8336d54313ae2f"}, 0xfffffffffffffd12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00'}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='scsi_dispatch_cmd_start\x00'}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000100), 0x1001) 969.118931ms ago: executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f00000001c0)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095040000000000007b2d6e3d03ea5745ab704841e5c8066ea07886863152ba1b56727b4e8e4d41b37d688d59d9a477d2eed980f5dd77be3a378b8374c566b40a10b5bb6f7a27ffa1ca3a9e89819bb51715e11df6f980726fda44e44c791f7ea0de05157e52281f69ad2c83f5a8f6e1dfe6c806bd490773"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffea0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x20040, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b000000000006000000180100002020702000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_request_blocks\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000001c0)='ext4_request_blocks\x00', r3}, 0x10) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x200408c5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x2000000000000111, &(0x7f0000000200)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 946.599954ms ago: executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb96f37538e486dd637288f7"], 0xe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x11, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x26, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008411200008000000186900000a0000000000000000100000186200000c00000000000000000000001863000008000000000000000200000085100000f8ffffff18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000001838020005000000000000000000000018230000", @ANYRES32, @ANYBLOB="0000000006000000186a0000090000000000000007000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce810203290800000000000000000000ffff9ff57b00000000000000000000000000ac1414aa"], 0xfdef) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='sched_kthread_work_queue_work\x00', r8}, 0x10) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r2, &(0x7f00000004c0)="d161e3c997cc571e0c445fc767f3d6f4d11e0fe26e7c443824b8a8b00e39d4980b6786765319f07664ff9aac59498ba406d77d4f68b5248601a6069989758e35e88c8fe61f90e4d07c9900f9b6e81cfad0d87cff179c14e79cf829d9b95dd5c7b3ddcaece2b5553d6505a333e0887cdb66b587cf92ed2ac22b537d2151fd746a954e8336d54313ae2f"}, 0xfffffffffffffd12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00'}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='scsi_dispatch_cmd_start\x00'}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000100), 0x1001) 807.940926ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) 799.817246ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000180), 0x12) write$cgroup_pid(r2, &(0x7f0000000340), 0xfdef) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x10, 0xf, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xee2}, {}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='GPL\x00', 0xb3, 0x5f, &(0x7f00000003c0)=""/95, 0x40f00, 0x0, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0xd, 0xffff, 0x10001}, 0x10, 0x0, 0xffffffffffffffff, 0x2, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x2, 0x5, 0x1}, {0x4, 0x5, 0x2, 0x4}], 0x10, 0x7}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 728.122888ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x3, 0x5}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r3}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='sys_enter\x00', r4}, 0x10) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='page_pool_state_hold\x00'}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_ext_remove_space_done\x00', r7}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x2}}) sendmsg$inet(r5, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c75256509e3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="87fb74cf4d67adbbd062637f514c1f5eb18d7b442e6457a356c6cb1f71a43dfae773c8489cce5145f92615d4bdb13ef54d6ae90ec7733180fcf5adf3e13fdb05b57b748bd14eda042a97fdd84498304a504a0a159b972e8200c2d0f536a3465ec498ed12b924bd134057df36129d3ebe3dd3ce9f0671e5278143e4afa3d43f444681de1b5f9725fca34fa357fe2154981666fb9dc202fc17a0199eb1c25bdd1005e590e84783ee9894c888998dc25a83c14aeee31d114acfa0bcd235d571cd765f4b9259ba43e6fc30291d8a642146c4771898030b736aeee6b247abb0784b154e104e7dcda401f9b1736fea30a41a4153fe6a9a525bd0a3487571f914f05b590e242341ade289d8f5b842c6be4a93c2755dfd47174def782a2f8f61c068b5a012f02c0801601e860def788121e8808c01fed4c920a3698d0d684920918c95b17f76bbcb4f265c931d8f79560ff8114b70f4dd6791e2ed70cfeb89905791b88be26efe1c5c66b7b50b3d2be0dbc066dfc31618f9507f6f340b85a2f76a6dcac9d6ccc289ace5e5fecd25afe22ffa451f5e365ab33cc985f2e9d7f7fb1be4794740a94215d7db14b0ffcec19e5e3c5ae0d8578ef3b65d2a7a77a11e390a6c3a6b391061c886b961e3c2f42d62047bfe1356a44b840d3d956105f4c0fa95db08c4933f00de77cdc057c28b41fecfc8398c442be1ad065954f6c9dfeb2fd7207e8548a00a1d50bdf522d2abfdafd71723616a34830fbfa8fc81e0c2639cc12f363a4919b7a00ac8189dad3e7e54122a2ef430f623658d5e281c9a19442995bb9b0e3f7d13e3016b6f9523be196bf23bbcc5ec802f43ef8b651d688d9d5a44f35c9847e4c32bce3e9ebed2326adadc76f06a195db32c80b3090d7cd65c9d8518ba4e528c5eb5c7a1c5695b21595fa8a8621734bfda8afddd65e1f37a1990220a00fa9bd2c22b0117ceb08ae6af3c944c2eca924abfddad065d1472d0c3f742a49b1e78c669471873706ad157d831d7482b773f07b0673a6ce1e227a7a4d13744bf459434c0ab1c323a38b1a84cbf1ce9741f2b8fdcc2e073e56171603d035aacd83e71d5132831f4f1e8bf517979f132a33fd03783272e9b8c96dfa4e1d320a58d82acfc8d3d53a5a52daafe4dc8be08f4ad53e11cc21374b6ff4ff5ea2ecc5d3f7c057f74f0098e57d990090475cdaffdef0da917653ed10fb70b94b72e5b4d95cbea0fc1dd2579635ad6ab545ba4d7b6d2f5442bdb78beb6c8ed62942a439117025b4566b48d9f3a17fdf4577e8606a4bc4c26557e58312fd2d1a541ebec3e5ae28eef8b2ab0597083716dd12889335570ee7839530eee879d9b137606cd4dd7103991671b4464bb68529eb19fb7a8845e3491bfbac688a87cf0744f429ea112014402915c4c1f6bae08d689d3cb7d641d7befe8fc74a2242310a9a367a39531b4c86da5b39df524e52f33ff9c40b48cb196ffc9ca855b6e698ade8a83e52b9ddc5031ff09e1907e4f8b0d07e64e1fb8e427f8819a7be907aa216bf8e2a4c7cc87ed53bf9490d4cc788b91f3b9f705e984a7e62c7a495e8421b97c39dc954b35468f17c6682334f4e16308448f457faeffff6d1f818522fa441d3a48168bdb12ffebace436a3915b63076cb6a655718647f87eaaf313b5bbd430421eed3a2215e439600a56eac8c65291eb103326a8034662bd337ab51577d9110ec7151be5cc9c54b2a30891acac5ad006ed537dbeb8f16eecbde7cf4e71373faf3c36b772f6d7ea9346875c8cf1049d49d4f8eb01b946c11e8c8e3ab2015f282167acddcc77fff03e1be9134252af0abfe538b4d25fc4ff874b52b9fb0996b5f32b4141dbd30578ff46e13ef6c63fc1620f62cb11a3dce401993976c272a5f62fde3f2a0e654d19e7a39dcdb622b9526d2a15cc18e6f817c916a00775353dd9c8954e66d0445b59bb0f5e6e3b46447232f52a0e398b057d123ef503afcbd48544db6434d2025bfc8dab72262a4fa5426a03061e7f8966e0086ff8ab5a91ab59f19b830394ee8bc76d6fb4816b8f4cde35b7eb9d3811228d51c54828f97fd1e648196c81bc73ed56249a59f318704e84656a6cedd2b8c1e1808d1cc648749abc643131e494c01336d4a14b8609656f2c972dc23c5c2e43fe40119fb88b5ec2aade35c03646e347354c493de8ab3672ccf94af0df333c6678299129d79be0eec281c5b3858ce3995566a390b674635b356692e3e9c53a089638ba0d69e772b7b410a5ae03de12e7de755ee559e1707b7b8003aabc8e2ce03c01e3183ff2d93262f6d5ceaafecdae66bc7cb3952c5a6571d864d502f281db5a228695badca5d022fdb6da56ab15dc377d1c1f8581ff56e28c2b2a84edb629547d28275c2ed571103b4ca7cdeb0776ba9f9dffcd78d21c3d4caa9289ed199672f4e7b912068c49c817114c37d37ea03954bae87d1ddae3da2ad85feb2fbb735b75a51f7bee5c8d88cc7bf64700d1a46ec6b631ae22ac7b06730a86a26bdcb992e1c7b50142de96b14a8468e4514068a30896fc677fddefaebb125c693a8d460469c7fe535f844781940f66d6abd091191c3122d584f5b0f5b0d443713d7d5186124d73de28aca30b719d4a55e09d259bddbf16995aeb1000880890afbd24d4066b0398985a40999de22ce176348e1c1f57eaf75b92a1e4f1482e89a00ac2cc36b20e36af9ec310599c19a5b1d6f8fadba104c58c801c6633315f82ebfa88faddd0b693e2f827f586c1cc5538e93bcf10f81af6dd7ee727df3b5018c0b4e31e40d040a47503b6ace4d29a1162ce487351825255f5584aff7cbd421f85c3d9fbb3784abd9848f16028b68f0d32ed8bb80106e8cc4acb939ff88bd39976d166b2addebf628b3fcd056da2f60e1b90f7a32702954921908ebccb683622a1f574ceba6951bef5e751c338c8279318dc28e36b9fc2bb17c3ad08aceb00fc388e6db112a738f86a4a1eb11526e1b9d73250b326285ed47c4398d93a3933d9a784249b65ad7d78a1f81d96ef36493ed693045a2150a8eb43cecc0c93e7d20b15b39a0646b081c2923b816365b7fbb41683a41732d942c5aa12faf876ec7f036becde8f3295af6dacff38d076d8e06260fee167703bb610745374a2758a6b88e465ca77d1f3105ae8b6b04a1eb509fb178d6249dbbc84d5d1d069278449a89d03e4a9a395d8170c329a296cfc329798cb9b9f1078d098cf3f989fd4ec53e013fbe917df35292d44fb1f3da4da4432a1847d4721514ade8cda5e5c0b51183580fc35266a970ebba74faeda56d4dcb56df51f96ad237452cedbd0cb2bee112713c3d450835811bf3da9745136d428e148fd0932dc77c8d8e61a16c625241fad8425b4ece394eedd5f165bd94923bfa1172be8edc8a4fcaae5f77ee8cc510192b27964da09c3e84efb4bc7154da1a24da8b7e544b42278d2574687ec76143afa6cf193d52a2a7f4c20ee57b6056a1337d5e408117a6cf1ab49c8980f39597f69902085d3e8d374d44e6ab4ed1185a26be2bc7281e9cfbbeb6bed899aa1924d3faa06d95999fbeaf2337494e0c2c39eef5a73fcde84459a9ea48d4e015d9e5bb5839354967ce02f637bc8678d2595b9a918fc36b927d7501f0ac2e3471ce02b5df355689c87f191ef5390900a41deec29984e45a878ece964b0009aad561316fc3b30ce1b49266d32eb17cd30f3e17e1f59014e8c518940dd0a093d1349c1a7c2581963bbe0ba372b6426e81c33c71b2ec8141c5713e52a37fff0a417a5b259e1420d9fb6a731f5baa0cc494221947895aa8fa14745a986a366bff9d0c239a19f85372497565b5b703da16439019df5f3d29f4247fb528854c9648630f03e9dedde5a08a47728ea6a4d42e62eff6fa3bd402325e0f4387b60171c37c180f958ad80955779c899517e7ea76eed00598e01552eaaf08b723daf9d466e8c57af43a15a46528b1119f5074aa3c51f77357ebe158275bc06b89640d7ce3c0a03af01418d7dc6ae8a1be8ab08c1722d66d1e9277480b8b178447667c024f9b78f8a878a2d7cf8e83e5104f6964b2907a989abafc7d7d0df941abf3d7283b6a11d46c2911a42182ec27ab785d92946e1ee8ef44846d561850d2a98c305c382f36d4cfc9b2bfd3b86ef21a0d187adcafbec8268c7d662a34dda1c83c4967097743133bc8c587edf249f5668c34ddb112fa4eb1bea9c8f6a000f1f34428b54688a5e214a7919868b25dbe930e86a243ecf54afe0b518c647d04873d2cf62cb2ab27f00015537a4fd2ea3dc8777abdf3284622347016566da0b9c406ca8c40694e4013a53fbf2e803d51b0bbe5e9df5fc74f66be618856357ccf803c53ed0e3b3fe79f69f0ede9b565d8f7a8ce5aa8cbb4e8fa61be3fd00ffb07e45065498925c14c0b311942d4ed951ad6237aadb5405bc7b2d79e1fd295b7c2ed8efa883e44c86a5053e2f421c6d4dc0c47d3a05d911db37d6efdb8e50fb3f06139ac147bc7162c21aece79eaf72e9779f19eb5395cec3d15a7594ea70a6b373d98651d2215b210f037ea3f8a57ded74474f6fdb64a08b56af52168da70b30aee03472cd8bee5af04cad7303004a4aba464b99", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r6, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) bpf$PROG_LOAD(0x5, &(0x7f0000001e00)={0x7, 0x23, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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", @ANYBLOB="0000000000000000b70500000800000085000000a50000000903ab0406000000950000000000000085100000f8ffffff850000001800000018440000fdffffff0000000000000000b7080000000000007b8af8ff00000000b7080000588f00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa4000000000000", @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f00000003c0)='GPL\x00', 0xc3c, 0xc7, &(0x7f0000000840)=""/199, 0x41100, 0x22, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0x6, 0x3f, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x8, 0x0, &(0x7f0000001d40)=[{0x2, 0x4}, {0x0, 0x5, 0x6}, {0x4, 0x5, 0xd, 0x7}, {0x0, 0x0, 0xc, 0x2}, {0x4, 0x0, 0xd}, {0x5, 0x3, 0x9, 0x2}, {0x1, 0x2, 0x0, 0xb}, {0x3, 0x4, 0x6, 0x9}], 0x10, 0x7}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb01001800"/27], &(0x7f0000000a40)=""/235, 0x1b, 0xeb, 0x1, 0x2}, 0x20) 716.80072ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d00000085000000050000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r2}, 0x10) 702.633771ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000180), 0x12) write$cgroup_pid(r2, &(0x7f0000000340), 0xfdef) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x10, 0xf, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xee2}, {}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='GPL\x00', 0xb3, 0x5f, &(0x7f00000003c0)=""/95, 0x40f00, 0x0, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0xd, 0xffff, 0x10001}, 0x10, 0x0, 0xffffffffffffffff, 0x2, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x2, 0x5, 0x1}, {0x4, 0x5, 0x2, 0x4}], 0x10, 0x7}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 664.555677ms ago: executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000006000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000040)=[0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xdb, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000001c0), &(0x7f00000002c0), 0x8, 0x7f, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x16, 0x0, 0x8400, 0x1}, 0x91) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r2, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r2, 0x0, 0x20000000}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', r1, 0xffffffffffffffff, 0x3, 0x2, 0x3}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00082c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa3b"], 0xfdef) 613.237406ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000980)=ANY=[@ANYRESOCT=0x0], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000236c57ec900000000000000010000040400000000dbf2c87254a3d2e70000000000000000000006040000000028da230ed43adc730aa965066f13a2f45fe216f30cd4305907f584430b7933c2ffff89111e1afdf4df0ef49fb50333"], 0x0, 0x3e, 0x0, 0x5}, 0x20) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'macvlan0\x00'}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='cgroup.stat\x00', 0x26e1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x12, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007a000000180000000000000000000000000000009500000000000000846bdab3ee67f88bffb73826c5f82839a2756bd52b2f8f914b1ba42e6b0e7ed0388f8c5818adb3c980afb3f8a6efbb9ddbf3aab033ba3bd652d837bb47636b061a9b03d254b0bd9626b583eccafdb0"], &(0x7f0000000200)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x90) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)) close(r3) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x5451, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x1}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='/./\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r2, 0x58, &(0x7f0000000340)}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000040)='syz1\x00', 0x1ff) 590.192469ms ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb96f37538e486dd637288f7"], 0xe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x11, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x26, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008411200008000000186900000a0000000000000000100000186200000c00000000000000000000001863000008000000000000000200000085100000f8ffffff18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000001838020005000000000000000000000018230000", @ANYRES32, @ANYBLOB="0000000006000000186a0000090000000000000007000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce810203290800000000000000000000ffff9ff57b00000000000000000000000000ac1414aa"], 0xfdef) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='sched_kthread_work_queue_work\x00', r8}, 0x10) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00'}, 0x10) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000001e18110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000014000800b70300008ccc00008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='scsi_dispatch_cmd_start\x00', r10}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r11, &(0x7f0000000100), 0x1001) 569.123122ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x13}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x1c}, 0x18) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc020660b, &(0x7f0000000040)) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70200001400894fb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x2d) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r6}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 547.829665ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='sys_enter\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x2}}) sendmsg$inet(r2, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c75256509e3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) 517.6709ms ago: executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb96f37538e486dd637288f7"], 0xe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x11, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x26, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008411200008000000186900000a0000000000000000100000186200000c00000000000000000000001863000008000000000000000200000085100000f8ffffff18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000001838020005000000000000000000000018230000", @ANYRES32, @ANYBLOB="0000000006000000186a0000090000000000000007000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce810203290800000000000000000000ffff9ff57b00000000000000000000000000ac1414aa"], 0xfdef) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='sched_kthread_work_queue_work\x00', r8}, 0x10) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r2, &(0x7f00000004c0)="d161e3c997cc571e0c445fc767f3d6f4d11e0fe26e7c443824b8a8b00e39d4980b6786765319f07664ff9aac59498ba406d77d4f68b5248601a6069989758e35e88c8fe61f90e4d07c9900f9b6e81cfad0d87cff179c14e79cf829d9b95dd5c7b3ddcaece2b5553d6505a333e0887cdb66b587cf92ed2ac22b537d2151fd746a954e8336d54313ae2f"}, 0xfffffffffffffd12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00'}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000001e18110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000800b70300008ccc00008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='scsi_dispatch_cmd_start\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r10, &(0x7f0000000100), 0x1001) 463.081278ms ago: executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000005c0)='qdisc_destroy\x00', r0}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r5}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) close(r4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1282, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) write$cgroup_pid(r4, &(0x7f0000000380), 0x12) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) write$cgroup_subtree(r8, 0x0, 0x8a80) write$cgroup_subtree(r8, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00perf_even^ '], 0xc) 380.405941ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000180), 0x12) write$cgroup_pid(r2, &(0x7f0000000340), 0xfdef) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x10, 0xf, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xee2}, {}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='GPL\x00', 0xb3, 0x5f, &(0x7f00000003c0)=""/95, 0x40f00, 0x0, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0xd, 0xffff, 0x10001}, 0x10, 0x0, 0xffffffffffffffff, 0x2, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x2, 0x5, 0x1}, {0x4, 0x5, 0x2, 0x4}], 0x10, 0x7}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 310.250312ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x3, 0x5}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x0, r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='sys_enter\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x2}}) sendmsg$inet(r2, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c75256509e3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) 301.940653ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) 286.196236ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000380)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40001) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00'}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x1a000) 114.884422ms ago: executing program 2: bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) socketpair(0x18, 0x0, 0x2, &(0x7f0000004080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='jbd2_handle_stats\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{0x1}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000009c0)='cpuset.effective_mems\x00', 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x4, 0x4}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{r5}, &(0x7f0000000700), &(0x7f0000000740)=r6}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r7}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r4, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000008c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x23, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) 0s ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d00000085000000050000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r2}, 0x10) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.223' (ED25519) to the list of known hosts. 2024/06/12 06:47:14 fuzzer started 2024/06/12 06:47:15 dialing manager at 10.128.0.163:30010 [ 19.238034][ T30] audit: type=1400 audit(1718174835.055:66): avc: denied { node_bind } for pid=280 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 19.241553][ T30] audit: type=1400 audit(1718174835.065:67): avc: denied { name_bind } for pid=280 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 19.265109][ T30] audit: type=1400 audit(1718174835.085:68): avc: denied { setattr } for pid=290 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.291871][ T30] audit: type=1400 audit(1718174835.095:69): avc: denied { mounton } for pid=292 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.295685][ T289] cgroup: Unknown subsys name 'net' [ 19.316510][ T30] audit: type=1400 audit(1718174835.095:70): avc: denied { mount } for pid=292 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 19.345350][ T295] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 19.345400][ T30] audit: type=1400 audit(1718174835.095:71): avc: denied { integrity } for pid=293 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 19.354980][ T289] cgroup: Unknown subsys name 'devices' [ 19.375949][ T30] audit: type=1400 audit(1718174835.115:72): avc: denied { mounton } for pid=289 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.403732][ T30] audit: type=1400 audit(1718174835.115:73): avc: denied { mount } for pid=289 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.425760][ T30] audit: type=1400 audit(1718174835.155:74): avc: denied { unmount } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.445290][ T30] audit: type=1400 audit(1718174835.215:75): avc: denied { relabelto } for pid=295 comm="mkswap" name="swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.514408][ T294] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.559750][ T289] cgroup: Unknown subsys name 'hugetlb' [ 19.565189][ T289] cgroup: Unknown subsys name 'rlimit' 2024/06/12 06:47:15 starting 5 executor processes [ 20.335479][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.342380][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.349657][ T306] device bridge_slave_0 entered promiscuous mode [ 20.356288][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.363210][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.370589][ T306] device bridge_slave_1 entered promiscuous mode [ 20.399450][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.406291][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.413539][ T310] device bridge_slave_0 entered promiscuous mode [ 20.422904][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.429887][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.436918][ T310] device bridge_slave_1 entered promiscuous mode [ 20.452055][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.458950][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.466104][ T308] device bridge_slave_0 entered promiscuous mode [ 20.473795][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.480703][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.487824][ T308] device bridge_slave_1 entered promiscuous mode [ 20.543492][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.550356][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.557547][ T307] device bridge_slave_0 entered promiscuous mode [ 20.576489][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.583345][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.590589][ T307] device bridge_slave_1 entered promiscuous mode [ 20.656821][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.663707][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.670923][ T309] device bridge_slave_0 entered promiscuous mode [ 20.688945][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.695790][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.703009][ T309] device bridge_slave_1 entered promiscuous mode [ 20.755473][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.762501][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.769607][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.776374][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.785965][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.792822][ T306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.799944][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.806698][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.838963][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.845809][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.852932][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.859705][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.887181][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.894131][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.901229][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.908011][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.930002][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.937114][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.944337][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.951800][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.958902][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.965876][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.973056][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.980485][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.987496][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.030535][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.038676][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.046571][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.053336][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.060491][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.067642][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.074955][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.082941][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.089775][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.096909][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.104860][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.111698][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.118872][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.126800][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.133668][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.140826][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.170730][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.178776][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.186452][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.194774][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.202718][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.210613][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.217344][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.224526][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.232427][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.239171][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.246273][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.254182][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.261009][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.268329][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.276256][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.283148][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.290262][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.297935][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.307575][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.318558][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.326673][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.341320][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.349126][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.356299][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.364582][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.372578][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.379424][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.386569][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.394191][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.401912][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.410027][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.417936][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.424775][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.432083][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.439468][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.446729][ T310] device veth0_vlan entered promiscuous mode [ 21.462135][ T306] device veth0_vlan entered promiscuous mode [ 21.469845][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.477737][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.485519][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.493371][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.501785][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.509910][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.517910][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.525670][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.533427][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.540758][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.556135][ T309] device veth0_vlan entered promiscuous mode [ 21.568400][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.576196][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.584041][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.592137][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.600644][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.608653][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.616487][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.624248][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.631945][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.639941][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.649225][ T310] device veth1_macvtap entered promiscuous mode [ 21.665017][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.672547][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.679912][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.687047][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.695270][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.703087][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.711308][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.721895][ T306] device veth1_macvtap entered promiscuous mode [ 21.732760][ T308] device veth0_vlan entered promiscuous mode [ 21.739473][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.746971][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.755369][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.763549][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.771414][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.779388][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.787425][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.795568][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.803248][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.813271][ T309] device veth1_macvtap entered promiscuous mode [ 21.822416][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.829640][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.836801][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.844557][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.852385][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.860358][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.868820][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.876105][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.884073][ T307] device veth0_vlan entered promiscuous mode [ 21.902202][ T308] device veth1_macvtap entered promiscuous mode [ 21.909192][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.917169][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.925658][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.933860][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.942007][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.949867][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.957667][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.965021][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.973022][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.981362][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.989428][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.012288][ T307] device veth1_macvtap entered promiscuous mode [ 22.019844][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.028391][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.036535][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.045180][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.053362][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.061419][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.073604][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.107464][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.119127][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.132334][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.140522][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.230003][ T349] device sit0 entered promiscuous mode [ 22.278006][ C0] hrtimer: interrupt took 23826 ns [ 22.453637][ T354] device syzkaller0 entered promiscuous mode [ 22.871946][ T370] device syzkaller0 entered promiscuous mode [ 23.105705][ T374] device sit0 entered promiscuous mode [ 23.585072][ T384] device sit0 left promiscuous mode [ 23.656878][ T390] device sit0 entered promiscuous mode [ 23.792167][ T384] device sit0 entered promiscuous mode [ 24.005783][ T399] device syzkaller0 entered promiscuous mode [ 24.083182][ T408] device sit0 left promiscuous mode [ 24.111160][ T406] device syzkaller0 entered promiscuous mode [ 24.117723][ T408] device sit0 entered promiscuous mode [ 24.542090][ T422] device sit0 entered promiscuous mode [ 24.911303][ T30] kauditd_printk_skb: 33 callbacks suppressed [ 24.911317][ T30] audit: type=1400 audit(1718174840.735:109): avc: denied { read } for pid=425 comm="syz-executor.0" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.112690][ T30] audit: type=1400 audit(1718174840.765:110): avc: denied { open } for pid=425 comm="syz-executor.0" path="/dev/ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.243560][ T30] audit: type=1400 audit(1718174840.765:111): avc: denied { ioctl } for pid=425 comm="syz-executor.0" path="/dev/ppp" dev="devtmpfs" ino=134 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.282816][ T435] device sit0 entered promiscuous mode [ 25.402691][ T439] device syzkaller0 entered promiscuous mode [ 25.756310][ T458] device syzkaller0 entered promiscuous mode [ 26.031857][ T475] device sit0 left promiscuous mode [ 26.051263][ T475] device sit0 entered promiscuous mode [ 26.123563][ T30] audit: type=1400 audit(1718174841.945:112): avc: denied { ioctl } for pid=481 comm="syz-executor.4" path="socket:[14543]" dev="sockfs" ino=14543 ioctlcmd=0x8942 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.302353][ T487] device syzkaller0 entered promiscuous mode [ 27.956520][ T520] syz-executor.0[520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.956593][ T520] syz-executor.0[520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.061713][ T520] syz-executor.0[520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.157213][ T520] syz-executor.0[520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.581855][ T538] device sit0 left promiscuous mode [ 28.863294][ T545] device sit0 entered promiscuous mode [ 29.433947][ T560] bridge0: port 3(syz_tun) entered blocking state [ 29.464627][ T560] bridge0: port 3(syz_tun) entered disabled state [ 29.472908][ T560] device syz_tun entered promiscuous mode [ 29.518483][ T560] bridge0: port 3(syz_tun) entered blocking state [ 29.524825][ T560] bridge0: port 3(syz_tun) entered forwarding state [ 29.669540][ T579] device sit0 left promiscuous mode [ 29.775674][ T586] device sit0 entered promiscuous mode [ 30.999057][ T608] bridge0: port 3(syz_tun) entered blocking state [ 31.016306][ T608] bridge0: port 3(syz_tun) entered disabled state [ 31.036664][ T608] device syz_tun entered promiscuous mode [ 31.071164][ T608] bridge0: port 3(syz_tun) entered blocking state [ 31.077433][ T608] bridge0: port 3(syz_tun) entered forwarding state [ 31.137852][ T612] device sit0 left promiscuous mode [ 31.168020][ T616] device sit0 entered promiscuous mode [ 31.289050][ T30] audit: type=1400 audit(1718174847.115:113): avc: denied { create } for pid=629 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 31.550504][ T650] device sit0 left promiscuous mode [ 31.652814][ T652] device sit0 entered promiscuous mode [ 32.833897][ T675] device syzkaller0 entered promiscuous mode [ 32.877316][ T30] audit: type=1400 audit(1718174848.695:114): avc: denied { cpu } for pid=680 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 33.026721][ T683] device sit0 left promiscuous mode [ 33.218629][ T684] device sit0 entered promiscuous mode [ 34.305515][ T716] device syzkaller0 entered promiscuous mode [ 34.471733][ T729] device sit0 left promiscuous mode [ 34.545651][ T729] device sit0 entered promiscuous mode [ 34.937565][ T744] device syzkaller0 entered promiscuous mode [ 35.390954][ T773] device sit0 left promiscuous mode [ 35.407845][ T773] device sit0 entered promiscuous mode [ 35.500391][ T777] device sit0 left promiscuous mode [ 35.569259][ T777] device sit0 entered promiscuous mode [ 35.726021][ T790] device syzkaller0 entered promiscuous mode [ 35.820447][ T799] device sit0 left promiscuous mode [ 35.852675][ T799] device sit0 entered promiscuous mode [ 35.950390][ T815] device sit0 left promiscuous mode [ 35.966856][ T30] audit: type=1400 audit(1718174851.785:115): avc: denied { write } for pid=812 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 35.999482][ T815] device sit0 entered promiscuous mode [ 36.297865][ T829] device syzkaller0 entered promiscuous mode [ 36.368286][ T306] bridge0: port 3(syz_tun) entered disabled state [ 36.399942][ T306] device syz_tun left promiscuous mode [ 36.422688][ T306] bridge0: port 3(syz_tun) entered disabled state [ 36.499942][ T306] syz-executor.3 (306) used greatest stack depth: 19792 bytes left [ 36.659126][ T840] device sit0 left promiscuous mode [ 36.707732][ T840] device sit0 entered promiscuous mode [ 36.739484][ T834] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.752986][ T834] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.780780][ T834] device bridge_slave_0 entered promiscuous mode [ 36.811735][ T834] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.819408][ T834] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.827080][ T834] device bridge_slave_1 entered promiscuous mode [ 36.917324][ T860] device syzkaller0 entered promiscuous mode [ 37.024126][ T834] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.031018][ T834] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.038107][ T834] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.044886][ T834] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.058241][ T870] device sit0 left promiscuous mode [ 37.123270][ T878] device sit0 entered promiscuous mode [ 37.179974][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.187533][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.195799][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.238848][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 37.246771][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.285006][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 37.293132][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.301141][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.310220][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.330579][ T834] device veth0_vlan entered promiscuous mode [ 37.357386][ T895] device syzkaller0 entered promiscuous mode [ 37.364037][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.375826][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.403528][ T834] device veth1_macvtap entered promiscuous mode [ 37.410271][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.417753][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.425373][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.435287][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.443586][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.460140][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.468684][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.477040][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.485516][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.506686][ T345] device bridge_slave_1 left promiscuous mode [ 37.522078][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.564809][ T345] device bridge_slave_0 left promiscuous mode [ 37.580374][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.581362][ T900] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 37.599194][ T345] device veth1_macvtap left promiscuous mode [ 37.605420][ T345] device veth0_vlan left promiscuous mode [ 37.789147][ T907] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 37.883989][ T915] device sit0 left promiscuous mode [ 38.040438][ T941] device sit0 left promiscuous mode [ 38.108562][ T952] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 38.795890][ T1001] device sit0 left promiscuous mode [ 38.838673][ T1003] device syzkaller0 entered promiscuous mode [ 40.740921][ T308] bridge0: port 3(syz_tun) entered disabled state [ 40.755403][ T308] device syz_tun left promiscuous mode [ 40.760807][ T308] bridge0: port 3(syz_tun) entered disabled state [ 40.849633][ T1098] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.862255][ T1098] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.874201][ T1098] device bridge_slave_0 entered promiscuous mode [ 40.883489][ T30] audit: type=1400 audit(1718174856.705:116): avc: denied { create } for pid=1110 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 40.906621][ T1098] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.915962][ T1098] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.923325][ T1098] device bridge_slave_1 entered promiscuous mode [ 40.932942][ T1104] device wg2 entered promiscuous mode [ 41.107155][ T1121] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 41.218349][ T100] udevd[100]: worker [341] terminated by signal 32 (Unknown signal 32) [ 41.380249][ T100] udevd[100]: worker [341] failed while handling '/devices/virtual/block/loop1' [ 41.527164][ T1098] device veth0_vlan entered promiscuous mode [ 41.538976][ T1098] device veth1_macvtap entered promiscuous mode [ 41.582261][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.600639][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.625522][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.649329][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.669471][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.679647][ T30] audit: type=1400 audit(1718174857.505:117): avc: denied { ioctl } for pid=1145 comm="syz-executor.4" path="mnt:[4026532451]" dev="nsfs" ino=4026532451 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 41.727615][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.734958][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 41.805635][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.820210][ T331] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.827125][ T331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.845132][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 41.854632][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.862658][ T331] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.869612][ T331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.876732][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 41.884634][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.892419][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 41.900313][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.908167][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 41.916267][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.924406][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 41.932749][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.940825][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 41.948929][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.957194][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 42.091377][ T8] device bridge_slave_1 left promiscuous mode [ 42.097443][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.116894][ T8] device bridge_slave_0 left promiscuous mode [ 42.248529][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.278668][ T8] device veth1_macvtap left promiscuous mode [ 42.299222][ T8] device veth0_vlan left promiscuous mode [ 42.747127][ T1181] device syzkaller0 entered promiscuous mode [ 43.904230][ T30] audit: type=1400 audit(1718174859.725:118): avc: denied { create } for pid=1240 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 45.263843][ T1297] device pim6reg1 entered promiscuous mode [ 46.257976][ T1329] device veth0_vlan left promiscuous mode [ 46.264343][ T1329] device veth0_vlan entered promiscuous mode [ 47.591556][ T1354] device syzkaller0 entered promiscuous mode [ 48.819113][ T1412] device syzkaller0 entered promiscuous mode [ 49.747083][ T30] audit: type=1400 audit(1718174865.565:119): avc: denied { create } for pid=1462 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 50.046406][ T1469] device vxcan1 entered promiscuous mode [ 50.123975][ T30] audit: type=1400 audit(1718174865.945:120): avc: denied { create } for pid=1474 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 50.204010][ T1475] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.218760][ T1481] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.347202][ T1481] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.354512][ T1481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.807833][ T1512] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 51.328339][ T1524] syz-executor.2[1524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.328406][ T1524] syz-executor.2[1524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.423206][ T1524] syz-executor.2[1524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.465090][ T1524] syz-executor.2[1524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.709485][ T1540] syz-executor.3[1540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.736938][ T1540] syz-executor.3[1540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.761179][ T1540] syz-executor.3[1540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.773034][ T1540] syz-executor.3[1540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.926027][ T1565] device pim6reg1 entered promiscuous mode [ 53.204854][ T1630] ªªªªªª: renamed from vlan0 [ 53.540442][ T1658] syz-executor.2 (1658) used obsolete PPPIOCDETACH ioctl [ 53.740504][ T1668] device pim6reg1 entered promiscuous mode [ 54.425283][ T1693] device pim6reg1 entered promiscuous mode [ 55.009735][ T1739] device wg2 entered promiscuous mode [ 55.752828][ T1774] device pim6reg1 entered promiscuous mode [ 56.617263][ T1815] syz-executor.0[1815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.617321][ T1815] syz-executor.0[1815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.407676][ T30] audit: type=1400 audit(1718174873.225:121): avc: denied { create } for pid=1840 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 59.187153][ T1914] device veth0_vlan left promiscuous mode [ 59.218559][ T1914] device veth0_vlan entered promiscuous mode [ 59.289662][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.297739][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 59.399383][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.742817][ T1924] device syzkaller0 entered promiscuous mode [ 60.197498][ T1942] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 61.154102][ T1972] device veth0_vlan left promiscuous mode [ 61.166140][ T1972] device veth0_vlan entered promiscuous mode [ 61.196364][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 61.215043][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 61.253769][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 61.680600][ T1986] ªªªªªª: renamed from vlan0 [ 61.733823][ T1991] device syzkaller0 entered promiscuous mode [ 62.861134][ T2021] ªªªªªª: renamed from vlan0 [ 63.476142][ T2047] device syzkaller0 entered promiscuous mode [ 65.044425][ T2070] device syzkaller0 entered promiscuous mode [ 65.173834][ T2095] device syzkaller0 entered promiscuous mode [ 65.199188][ T312] syzkaller0: tun_net_xmit 70 [ 66.079132][ T2141] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 67.311607][ T2169] device veth0_vlan left promiscuous mode [ 67.324644][ T2169] device veth0_vlan entered promiscuous mode [ 67.430630][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.451442][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 67.477246][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.619889][ T2193] device wg2 left promiscuous mode [ 68.243196][ T2213] device syzkaller0 entered promiscuous mode [ 69.035343][ T2248] €Â: renamed from pim6reg1 [ 72.849713][ T2374] device syzkaller0 entered promiscuous mode [ 73.058179][ T2379] syz-executor.4[2379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.058243][ T2379] syz-executor.4[2379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.074384][ T2379] syz-executor.4[2379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.086375][ T2379] syz-executor.4[2379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.695514][ T2398] geneve1: tun_chr_ioctl cmd 1074025672 [ 73.758030][ T2398] geneve1: ignored: set checksum enabled [ 73.872113][ T2403] device syzkaller0 entered promiscuous mode [ 75.371861][ T2453] device syzkaller0 entered promiscuous mode [ 75.655300][ T2462] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.662358][ T2462] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.384223][ T2489] device syzkaller0 entered promiscuous mode [ 80.072206][ T30] audit: type=1400 audit(1718174895.895:122): avc: denied { write } for pid=2600 comm="syz-executor.0" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 80.951312][ T2636] device syzkaller0 entered promiscuous mode [ 81.239313][ T2657] device pim6reg1 entered promiscuous mode [ 85.301971][ T2769] ªªªªªª: renamed from vlan0 [ 86.228769][ T2816] device syzkaller0 entered promiscuous mode [ 86.788981][ T2827] device syzkaller0 entered promiscuous mode [ 87.994325][ T2865] device syzkaller0 entered promiscuous mode [ 90.007967][ C0] sched: RT throttling activated [ 93.661760][ T2968] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.668960][ T2968] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.685379][ T2968] device bridge_slave_0 entered promiscuous mode [ 93.721722][ T2968] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.772428][ T2968] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.849058][ T2968] device bridge_slave_1 entered promiscuous mode [ 93.873939][ T2987] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 93.979823][ T45] device bridge_slave_1 left promiscuous mode [ 93.985777][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.005682][ T45] device bridge_slave_0 left promiscuous mode [ 94.012411][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.021742][ T45] device veth1_macvtap left promiscuous mode [ 94.029210][ T45] device veth0_vlan left promiscuous mode [ 94.681121][ T861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.689266][ T861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.709045][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 94.717939][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.726574][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.733458][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.746489][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 94.754803][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.762945][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.769810][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.777153][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 94.785332][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.793397][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 94.808299][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 94.816596][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 94.827924][ T2968] device veth0_vlan entered promiscuous mode [ 94.859465][ T30] audit: type=1400 audit(1718174910.685:123): avc: denied { create } for pid=3032 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 94.891417][ T2968] device veth1_macvtap entered promiscuous mode [ 94.914426][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.942847][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.991928][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 94.999586][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 95.007650][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 95.016035][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 95.024373][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 95.032680][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 95.153732][ T3052] : renamed from veth0_vlan [ 96.126699][ T3126] device syzkaller0 entered promiscuous mode [ 96.752246][ T3161] device pim6reg1 entered promiscuous mode [ 97.061051][ T3178] device syzkaller0 entered promiscuous mode [ 98.169846][ T30] audit: type=1400 audit(1718174913.985:124): avc: denied { create } for pid=3230 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 98.444504][ T3250] device syzkaller0 entered promiscuous mode [ 99.445242][ T3279] device syzkaller0 entered promiscuous mode [ 104.881912][ T3419] device syzkaller0 entered promiscuous mode [ 104.931801][ T3421] device syzkaller0 entered promiscuous mode [ 104.951021][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 105.017782][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 105.734874][ T3440] device syzkaller0 entered promiscuous mode [ 111.085788][ T3618] device syzkaller0 entered promiscuous mode [ 111.888338][ T3634] device veth0_vlan left promiscuous mode [ 111.902882][ T3634] device veth0_vlan entered promiscuous mode [ 111.988198][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.996351][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 112.036990][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.694872][ T3665] device veth0_vlan left promiscuous mode [ 112.809126][ T3665] device veth0_vlan entered promiscuous mode [ 112.817164][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.855874][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 112.942469][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.089452][ T3724] device pim6reg1 entered promiscuous mode [ 117.233519][ T3804] device pim6reg1 entered promiscuous mode [ 121.849474][ T3948] syz-executor.3[3948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.849543][ T3948] syz-executor.3[3948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.320567][ T4227] tap0: tun_chr_ioctl cmd 1074025677 [ 130.368357][ T4227] tap0: linktype set to 825 [ 131.580767][ T4265] tap0: tun_chr_ioctl cmd 1074025677 [ 131.585933][ T4265] tap0: linktype set to 825 [ 134.189982][ T4355] syz-executor.4[4355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.190052][ T4355] syz-executor.4[4355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.903473][ T30] audit: type=1400 audit(1718174951.725:125): avc: denied { create } for pid=4419 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 136.666487][ T30] audit: type=1400 audit(1718174952.485:126): avc: denied { read } for pid=82 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 173.686845][ T5578] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.729977][ T5578] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.738943][ T5578] device bridge_slave_0 entered promiscuous mode [ 173.762854][ T5578] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.818981][ T5578] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.826374][ T5578] device bridge_slave_1 entered promiscuous mode [ 174.247064][ T5578] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.253948][ T5578] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.261150][ T5578] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.267900][ T5578] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.354671][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.362187][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.370111][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.377454][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.435782][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.457044][ T3027] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.463935][ T3027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.548305][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.602491][ T3027] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.609381][ T3027] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.712776][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.746167][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.779944][ T3026] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 174.788466][ T3026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 174.803315][ T5578] device veth0_vlan entered promiscuous mode [ 174.810646][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 174.822463][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.888001][ T5578] device veth1_macvtap entered promiscuous mode [ 174.924279][ T45] device bridge_slave_1 left promiscuous mode [ 174.942858][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.984965][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.052948][ T45] device veth1_macvtap left promiscuous mode [ 175.084427][ T45] device veth0_vlan left promiscuous mode [ 175.362317][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 175.388508][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 175.438426][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 175.487135][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 175.547745][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 175.620662][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 175.639424][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 175.709136][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 175.717243][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 175.829538][ T30] audit: type=1400 audit(1718174991.655:127): avc: denied { mounton } for pid=5578 comm="syz-executor.3" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 191.823285][ T6116] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.889215][ T6116] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.941892][ T6116] device bridge_slave_0 entered promiscuous mode [ 191.986691][ T6116] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.013519][ T6116] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.021057][ T6116] device bridge_slave_1 entered promiscuous mode [ 192.410115][ T45] device bridge_slave_1 left promiscuous mode [ 192.416092][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.470561][ T45] device bridge_slave_0 left promiscuous mode [ 192.476582][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.517969][ T45] device veth1_macvtap left promiscuous mode [ 192.544016][ T45] device veth0_vlan left promiscuous mode [ 193.072781][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.084524][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.160190][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.208297][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.216306][ T3027] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.223174][ T3027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.247791][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.256364][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.264657][ T3027] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.271545][ T3027] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.278982][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.286955][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.295081][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.303229][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.318697][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.326294][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 193.334763][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 193.346568][ T6116] device veth0_vlan entered promiscuous mode [ 193.403826][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 193.440579][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 193.458184][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 193.471666][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 193.482038][ T6116] device veth1_macvtap entered promiscuous mode [ 193.497588][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 193.529284][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 193.537347][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 193.636873][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 193.661802][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 193.720631][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 193.812380][ T3027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 210.593499][ T6639] device pim6reg1 entered promiscuous mode [ 210.835169][ T6660] device syzkaller0 entered promiscuous mode [ 210.908972][ T30] audit: type=1400 audit(1718175026.735:128): avc: denied { remove_name } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 210.932566][ T30] audit: type=1400 audit(1718175026.735:129): avc: denied { rename } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 211.242349][ T6675] syz-executor.3[6675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.242390][ T6675] syz-executor.3[6675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.309007][ T6676] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 213.333409][ T6747] device syzkaller0 entered promiscuous mode [ 214.781281][ T6798] syz-executor.2[6798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.781370][ T6798] syz-executor.2[6798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.937742][ T6796] device syzkaller0 entered promiscuous mode [ 219.121765][ T6946] syz-executor.3[6946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.121852][ T6946] syz-executor.3[6946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.314184][ T6946] syz-executor.3[6946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.388172][ T6946] syz-executor.3[6946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.272453][ T6975] syz-executor.0[6975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.378141][ T6975] syz-executor.0[6975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.431840][ T6975] syz-executor.0[6975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.528692][ T6975] syz-executor.0[6975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.945153][ T7005] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 220.978316][ T7007] syz-executor.3[7007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.978384][ T7007] syz-executor.3[7007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.051036][ T7005] pim6reg0: linktype set to 0 [ 225.031461][ T7118] device veth1_macvtap left promiscuous mode [ 225.421360][ T7130] bpf_get_probe_write_proto: 4 callbacks suppressed [ 225.421378][ T7130] syz-executor.2[7130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.447851][ T7132] syz-executor.0[7132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.454885][ T7130] syz-executor.2[7130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.504873][ T7132] syz-executor.0[7132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.505081][ T7134] syz-executor.0[7134] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.535449][ T7134] syz-executor.0[7134] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.359337][ T7173] syz-executor.3[7173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.412349][ T7173] syz-executor.3[7173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.467087][ T7174] syz-executor.3[7174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.521173][ T7174] syz-executor.3[7174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.225808][ T7229] : renamed from ipvlan1 [ 227.382990][ T30] audit: type=1400 audit(1718175043.205:130): avc: denied { create } for pid=7226 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 229.209825][ T30] audit: type=1400 audit(1718175045.035:131): avc: denied { create } for pid=7279 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 230.577532][ T7353] : renamed from ipvlan1 [ 230.989537][ T7380] device sit0 entered promiscuous mode [ 233.789613][ T7477] bpf_get_probe_write_proto: 14 callbacks suppressed [ 233.789632][ T7477] syz-executor.2[7477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.796297][ T7477] syz-executor.2[7477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.757768][ T7506] syz-executor.4[7506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.898104][ T7506] syz-executor.4[7506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.135156][ T7548] syz-executor.0[7548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.188339][ T7548] syz-executor.0[7548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.421271][ T7555] EXT4-fs warning (device sda1): ext4_group_extend:1830: need to use ext2online to resize further [ 236.908083][ T7574] device syzkaller0 entered promiscuous mode [ 237.495213][ T7608] device syzkaller0 entered promiscuous mode [ 238.585075][ T7653] device syzkaller0 entered promiscuous mode [ 239.523152][ T7697] syz-executor.2[7697] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.523228][ T7697] syz-executor.2[7697] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.190144][ T7727] syz-executor.4[7727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.204851][ T30] audit: type=1400 audit(1718175056.035:132): avc: denied { tracepoint } for pid=7725 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 240.242168][ T7727] syz-executor.4[7727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.725778][ T7766] syz-executor.1[7766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.839433][ T7766] syz-executor.1[7766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.733476][ T7802] syz-executor.3[7802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.787460][ T7802] syz-executor.3[7802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.712554][ T7819] device pim6reg1 entered promiscuous mode [ 243.239347][ T7851] tap0: tun_chr_ioctl cmd 1074025677 [ 243.265553][ T7851] tap0: linktype set to 825 [ 244.907746][ T7915] syz-executor.1[7915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.907816][ T7915] syz-executor.1[7915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.171304][ T7950] device syzkaller0 entered promiscuous mode [ 246.326797][ T7954] device syzkaller0 entered promiscuous mode [ 246.415410][ T7950] syz-executor.2[7950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.415493][ T7950] syz-executor.2[7950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.521777][ T7969] syz-executor.0[7969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.542149][ T7969] syz-executor.0[7969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.600604][ T30] audit: type=1400 audit(1718175063.425:133): avc: denied { create } for pid=8016 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 249.105657][ T8078] syz-executor.3[8078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.105727][ T8078] syz-executor.3[8078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.198714][ T8078] syz-executor.3[8078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.248230][ T8078] syz-executor.3[8078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.389048][ T8118] bpf_get_probe_write_proto: 2 callbacks suppressed [ 250.389065][ T8118] syz-executor.0[8118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.440453][ T8118] syz-executor.0[8118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.452595][ T8127] syz-executor.0[8127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.477446][ T8127] syz-executor.0[8127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.502444][ T8131] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.502957][ T8118] syz-executor.0[8118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.527662][ T8133] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.530073][ T8118] syz-executor.0[8118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.546858][ T8131] O3ãc¤±: renamed from bridge_slave_0 [ 250.610874][ T8133] O3ãc¤±: renamed from bridge_slave_0 [ 250.872052][ T8158] syz-executor.4[8158] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.872120][ T8158] syz-executor.4[8158] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.991075][ T8158] syz-executor.4[8158] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.058620][ T8158] syz-executor.4[8158] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.730521][ T8246] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.841343][ T8246] O3ãc¤±: renamed from bridge_slave_0 [ 255.617573][ T8292] device syzkaller0 entered promiscuous mode [ 255.977978][ T8313] bpf_get_probe_write_proto: 12 callbacks suppressed [ 255.977993][ T8313] syz-executor.2[8313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.048205][ T8313] syz-executor.2[8313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.127054][ T8313] syz-executor.2[8313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.246321][ T8313] syz-executor.2[8313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.559791][ T8353] syz-executor.4[8353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.627224][ T8353] syz-executor.4[8353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.680773][ T8353] syz-executor.4[8353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.795619][ T8353] syz-executor.4[8353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.350967][ T8399] syz-executor.3[8399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.432246][ T8399] syz-executor.3[8399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.996331][ T8540] bpf_get_probe_write_proto: 6 callbacks suppressed [ 261.996348][ T8540] syz-executor.4[8540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.112105][ T8540] syz-executor.4[8540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.193724][ T8540] syz-executor.4[8540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.327030][ T8540] syz-executor.4[8540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.003508][ T8575] : renamed from veth0_vlan [ 263.128200][ T8581] syz-executor.3[8581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.128278][ T8581] syz-executor.3[8581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.245640][ T8581] syz-executor.3[8581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.257377][ T8581] syz-executor.3[8581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.515296][ T8620] device syzkaller0 entered promiscuous mode [ 265.710726][ T8688] : renamed from veth0_vlan [ 267.099553][ T8730] device pim6reg1 entered promiscuous mode [ 267.797963][ T30] audit: type=1400 audit(1718175083.515:134): avc: denied { create } for pid=8770 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 268.475847][ T8795] syz-executor.4[8795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.475916][ T8795] syz-executor.4[8795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.556014][ T8802] syz-executor.3[8802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.678192][ T8802] syz-executor.3[8802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.086116][ T8826] syz-executor.1[8826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.128132][ T8826] syz-executor.1[8826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.170971][ T30] audit: type=1400 audit(1718175084.995:135): avc: denied { create } for pid=8830 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 269.408942][ T8841] syz-executor.2[8841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.409008][ T8841] syz-executor.2[8841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.123876][ T8862] syz-executor.3[8862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.205557][ T8862] syz-executor.3[8862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.442586][ T30] audit: type=1400 audit(1718175087.265:136): avc: denied { create } for pid=8912 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 273.802615][ T9007] bpf_get_probe_write_proto: 6 callbacks suppressed [ 273.802631][ T9007] syz-executor.0[9007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.846588][ T9007] syz-executor.0[9007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.924622][ T9014] syz-executor.3[9014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.946901][ T9014] syz-executor.3[9014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.017685][ T9047] device syzkaller0 entered promiscuous mode [ 275.039676][ T9048] syz-executor.2[9048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.039747][ T9048] syz-executor.2[9048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.098532][ T9048] syz-executor.2[9048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.163929][ T9048] syz-executor.2[9048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.559192][ T9091] syz-executor.2[9091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.572397][ T9091] syz-executor.2[9091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.840194][ T9099] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 276.171853][ T9120] ªªªªªª: renamed from vlan0 [ 276.439933][ T9149] ------------[ cut here ]------------ [ 276.451418][ T9149] trace type BPF program uses run-time allocation [ 276.461667][ T9149] WARNING: CPU: 1 PID: 9149 at kernel/bpf/verifier.c:11656 check_map_prog_compatibility+0x6f1/0x890 [ 276.481947][ T9149] Modules linked in: [ 276.485801][ T9149] CPU: 1 PID: 9149 Comm: syz-executor.3 Not tainted 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 276.496573][ T9149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 276.506924][ T9149] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890 [ 276.545966][ T9149] Code: db e9 f9 fc ff ff e8 fe 39 ed ff 31 db e9 ed fc ff ff e8 f2 39 ed ff c6 05 bd 7f 80 05 01 48 c7 c7 a0 be 67 85 e8 0f 7b be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff [ 276.567492][ T30] audit: type=1400 audit(1718175092.395:137): avc: denied { create } for pid=9158 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 276.622334][ T9149] RSP: 0018:ffffc9000161f348 EFLAGS: 00010246 [ 276.633412][ T9149] RAX: 06c7873fb9496400 RBX: 0000000000000001 RCX: 0000000000040000 [ 276.641558][ T9149] RDX: ffffc9000416d000 RSI: 0000000000000a3e RDI: 0000000000000a3f [ 276.649420][ T9149] RBP: ffffc9000161f390 R08: ffffffff815760e5 R09: ffffed103ee265e8 [ 276.657164][ T9149] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 276.665024][ T9149] R13: ffff8881225f0000 R14: ffffc900000dd000 R15: dffffc0000000000 [ 276.672934][ T9149] FS: 00007f1a111406c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 276.695452][ T9149] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 276.723936][ T9149] CR2: 0000001b2eb2a000 CR3: 000000012069d000 CR4: 00000000003506b0 [ 276.732101][ T9149] DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 276.740040][ T9149] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 276.748013][ T9149] Call Trace: [ 276.751111][ T9149] [ 276.753895][ T9149] ? show_regs+0x58/0x60 [ 276.758015][ T9149] ? __warn+0x160/0x2f0 [ 276.762079][ T9149] ? check_map_prog_compatibility+0x6f1/0x890 [ 276.768025][ T9149] ? report_bug+0x3d9/0x5b0 [ 276.772388][ T9149] ? check_map_prog_compatibility+0x6f1/0x890 [ 276.778436][ T9149] ? handle_bug+0x41/0x70 [ 276.782669][ T9149] ? exc_invalid_op+0x1b/0x50 [ 276.787146][ T9149] ? asm_exc_invalid_op+0x1b/0x20 [ 276.792788][ T9149] ? __wake_up_klogd+0xd5/0x110 [ 276.797522][ T9149] ? check_map_prog_compatibility+0x6f1/0x890 [ 276.803843][ T9149] ? check_map_prog_compatibility+0x6f1/0x890 [ 276.814342][ T9149] resolve_pseudo_ldimm64+0x671/0x1240 [ 276.819881][ T9149] ? check_attach_btf_id+0xef0/0xef0 [ 276.825128][ T9149] ? __mark_reg_known+0x1b0/0x1b0 [ 276.830786][ T9149] ? security_capable+0x87/0xb0 [ 276.835637][ T9149] bpf_check+0x3174/0x12bf0 [ 276.840625][ T9149] ? 0xffffffffa0028f0c [ 276.844640][ T9149] ? is_bpf_text_address+0x172/0x190 [ 276.850634][ T9149] ? stack_trace_save+0x1c0/0x1c0 [ 276.857253][ T9149] ? __kernel_text_address+0x9b/0x110 [ 276.862780][ T9149] ? unwind_get_return_address+0x4d/0x90 [ 276.893741][ T9149] ? bpf_get_btf_vmlinux+0x60/0x60 [ 276.904478][ T9149] ? arch_stack_walk+0xf3/0x140 [ 276.909445][ T9149] ? stack_trace_save+0x113/0x1c0 [ 276.914344][ T9149] ? stack_trace_snprint+0xf0/0xf0 [ 276.942240][ T9149] ? stack_trace_snprint+0xf0/0xf0 [ 276.957806][ T9149] ? __stack_depot_save+0x34/0x470 [ 276.997983][ T9149] ? ____kasan_kmalloc+0xed/0x110 [ 277.002921][ T9149] ? ____kasan_kmalloc+0xdb/0x110 [ 277.008781][ T9149] ? __kasan_kmalloc+0x9/0x10 [ 277.013370][ T9149] ? kmem_cache_alloc_trace+0x115/0x210 [ 277.018997][ T9149] ? selinux_bpf_prog_alloc+0x51/0x140 [ 277.024352][ T9149] ? security_bpf_prog_alloc+0x62/0x90 [ 277.029822][ T9149] ? bpf_prog_load+0x9ee/0x1b50 [ 277.078475][ T9149] ? __sys_bpf+0x4bc/0x760 [ 277.085352][ T9149] ? __x64_sys_bpf+0x7c/0x90 [ 277.091431][ T9149] ? do_syscall_64+0x3d/0xb0 [ 277.100887][ T9149] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 277.110553][ T9149] ? __kasan_kmalloc+0x9/0x10 [ 277.115073][ T9149] ? memset+0x35/0x40 [ 277.119490][ T9149] ? bpf_obj_name_cpy+0x196/0x1e0 [ 277.125425][ T9149] bpf_prog_load+0x12ac/0x1b50 [ 277.153244][ T9149] ? map_freeze+0x370/0x370 [ 277.160053][ T9149] ? selinux_bpf+0xcb/0x100 [ 277.214721][ T9149] ? security_bpf+0x82/0xb0 [ 277.258568][ T9149] __sys_bpf+0x4bc/0x760 [ 277.262676][ T9149] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 277.268252][ T9149] ? __kasan_check_read+0x11/0x20 [ 277.273104][ T9149] __x64_sys_bpf+0x7c/0x90 [ 277.277349][ T9149] do_syscall_64+0x3d/0xb0 [ 277.281868][ T9149] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 277.322893][ T9149] RIP: 0033:0x7f1a11dc5ea9 [ 277.327158][ T9149] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 279.030192][ T9149] RSP: 002b:00007f1a111400c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 280.028744][ T9149] RAX: ffffffffffffffda RBX: 00007f1a11efcf80 RCX: 00007f1a11dc5ea9 [ 280.057372][ T9149] RDX: 0000000000000036 RSI: 0000000020000440 RDI: 0000000000000005 [ 281.032482][ T9149] RBP: 00007f1a11e34ff4 R08: 0000000000000000 R09: 0000000000000000 [ 281.034208][ T9198] device syzkaller0 entered promiscuous mode [ 281.040654][ T9149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 281.053953][ T9149] R13: 000000000000000b R14: 00007f1a11efcf80 R15: 00007fff8a912168 [ 281.064653][ T9149] [ 281.067501][ T9149] ---[ end trace e80ae4a2a04fba91 ]--- [ 281.153421][ T9222] device syzkaller0 entered promiscuous mode [ 281.181097][ T9222] device pim6reg1 entered promiscuous mode [ 282.141236][ T9259] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.375005][ T9262] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.381899][ T9262] bridge0: port 2(bridge_slave_1) entered forwarding state [ 282.404448][ T9262] device bridge0 entered promiscuous mode [ 282.542394][ T9285] bpf_get_probe_write_proto: 10 callbacks suppressed [ 282.542411][ T9285] syz-executor.3[9285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.567928][ T9285] syz-executor.3[9285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.756879][ T9283] device syzkaller0 entered promiscuous mode [ 284.531796][ T30] audit: type=1400 audit(1718175100.355:138): avc: denied { create } for pid=9363 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 284.563739][ T9369] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.653629][ T30] audit: type=1400 audit(1718175100.365:139): avc: denied { create } for pid=9363 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 284.689597][ T9369] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.696466][ T9369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.726574][ T9369] device bridge0 entered promiscuous mode [ 285.151507][ T9390] device syzkaller0 entered promiscuous mode [ 285.668241][ T3645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 285.766000][ T30] audit: type=1400 audit(1718175101.585:140): avc: denied { write } for pid=9415 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 285.939577][ T30] audit: type=1400 audit(1718175101.615:141): avc: denied { read } for pid=9415 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 287.430987][ T9462] syz-executor.0[9462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.431064][ T9462] syz-executor.0[9462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.675210][ T9505] syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET) [ 288.820644][ T9510] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 289.626262][ T9560] device syzkaller0 entered promiscuous mode [ 290.902664][ T30] audit: type=1400 audit(1718175106.725:142): avc: denied { create } for pid=9608 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 291.637922][ T9640] device syzkaller0 entered promiscuous mode [ 292.988897][ T9674] device syzkaller0 entered promiscuous mode [ 293.659071][ T9691] syz-executor.1[9691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.659146][ T9691] syz-executor.1[9691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.832106][ T9695] device pim6reg1 entered promiscuous mode [ 294.409645][ T9734] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 294.479229][ T9734] device syzkaller0 entered promiscuous mode [ 297.051746][ T30] audit: type=1400 audit(1718175112.865:143): avc: denied { setopt } for pid=9756 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 297.172943][ T9766] device syzkaller0 entered promiscuous mode [ 300.077157][ T9792] device syzkaller0 entered promiscuous mode [ 302.075894][ T9832] device syzkaller0 entered promiscuous mode [ 302.109191][ T9840] syz-executor.3[9840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.109257][ T9840] syz-executor.3[9840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.411916][ T9874] device syzkaller0 entered promiscuous mode [ 303.465441][ T9876] device syzkaller0 entered promiscuous mode [ 306.241569][ T9980] syz-executor.4[9980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.241638][ T9980] syz-executor.4[9980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.439585][ T9989] EXT4-fs warning (device sda1): ext4_group_extend:1830: need to use ext2online to resize further [ 308.929157][T10085] EXT4-fs warning (device sda1): ext4_group_extend:1830: need to use ext2online to resize further [ 310.393848][T10122] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.435964][T10122] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.508328][T10122] device bridge_slave_0 entered promiscuous mode [ 310.543591][T10122] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.550580][T10122] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.557959][T10122] device bridge_slave_1 entered promiscuous mode [ 310.786654][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 310.829140][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 310.856996][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 310.872918][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 310.882621][ T331] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.889492][ T331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.896888][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 310.905296][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 310.935939][ T331] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.942798][ T331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.959443][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 310.968205][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 310.986596][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 311.022225][T10177] device syzkaller0 entered promiscuous mode [ 311.033606][ T6757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 311.096523][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 311.105497][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 311.112897][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 311.120360][T10122] device veth0_vlan entered promiscuous mode [ 311.144822][T10122] device veth1_macvtap entered promiscuous mode [ 311.183386][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 311.192260][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 311.200746][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 311.209246][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 311.217676][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 311.284137][ T879] device bridge_slave_1 left promiscuous mode [ 311.298164][ T879] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.312798][ T879] device O3ãc¤± left promiscuous mode [ 311.318080][ T879] bridge0: port 1(O3ãc¤±) entered disabled state [ 311.360241][ T879] device veth1_macvtap left promiscuous mode [ 311.404442][ T879] device veth0_vlan left promiscuous mode [ 311.570474][T10210] device syzkaller0 entered promiscuous mode [ 313.078641][T10348] device syzkaller0 entered promiscuous mode [ 313.395968][T10379] device syzkaller0 entered promiscuous mode [ 313.785699][T10395] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.792696][T10395] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.800223][T10395] device bridge_slave_0 entered promiscuous mode [ 313.827997][T10395] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.846720][T10395] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.854476][T10395] device bridge_slave_1 entered promiscuous mode [ 313.972360][T10411] device pim6reg1 entered promiscuous mode [ 314.026809][T10395] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.033701][T10395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.040830][T10395] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.047668][T10395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.098784][ T3645] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.127970][ T3645] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.157684][ T3645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 314.230303][ T3645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 314.327324][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 314.342366][ T338] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.349262][ T338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.363899][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 314.372899][ T338] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.379762][ T338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.413078][ T6757] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 314.424866][ T6757] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 314.441873][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 314.462227][T10395] device veth0_vlan entered promiscuous mode [ 314.478944][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.486712][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.504211][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 314.532790][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 314.562881][T10395] device veth1_macvtap entered promiscuous mode [ 314.593501][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 314.607092][ T6757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 314.616464][ T879] device bridge_slave_1 left promiscuous mode [ 314.622553][ T879] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.630940][ T879] device bridge_slave_0 left promiscuous mode [ 314.636979][ T879] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.645818][ T879] device veth1_macvtap left promiscuous mode [ 314.651816][ T879] device veth0_vlan left promiscuous mode [ 314.783793][T10452] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 314.797988][T10452] dvmrp1: linktype set to 512 [ 316.208226][T10529] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.215212][T10529] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.223360][T10529] device bridge_slave_0 entered promiscuous mode [ 316.244246][T10529] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.264236][T10529] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.287376][T10529] device bridge_slave_1 entered promiscuous mode [ 316.383949][T10529] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.390834][T10529] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.397957][T10529] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.404814][T10529] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.434021][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 316.442941][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.450290][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.467691][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.476530][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.483440][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.490861][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 316.499152][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.506009][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.513692][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 316.531563][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 316.539802][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 316.557009][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 316.565926][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 316.574263][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 316.582770][T10529] device veth0_vlan entered promiscuous mode [ 316.596525][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 316.606121][T10529] device veth1_macvtap entered promiscuous mode [ 316.617514][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 316.638978][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 316.819993][T10559] device lo entered promiscuous mode [ 316.894959][T10559] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 318.202455][T10595] device lo entered promiscuous mode [ 318.281627][T10599] device lo left promiscuous mode [ 318.292873][T10599] device lo entered promiscuous mode [ 318.303349][T10599] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 318.378787][T10610] syz-executor.2[10610] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.378850][T10610] syz-executor.2[10610] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.215531][T10635] device lo left promiscuous mode [ 319.471042][T10635] device lo entered promiscuous mode [ 320.124114][T10670] device syzkaller0 entered promiscuous mode [ 320.138461][T10676] device lo left promiscuous mode [ 320.148697][T10676] device lo entered promiscuous mode [ 320.158511][T10676] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 320.678314][T10717] device lo left promiscuous mode [ 320.708839][T10717] device lo entered promiscuous mode [ 320.718244][T10717] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 320.976956][T10747] device lo left promiscuous mode [ 320.982762][T10747] device lo entered promiscuous mode [ 320.989843][T10747] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 321.810299][T10782] device veth0_vlan left promiscuous mode [ 321.818235][T10782] device veth0_vlan entered promiscuous mode [ 321.855907][T10783] device syzkaller0 entered promiscuous mode [ 322.138596][T10798] device lo entered promiscuous mode [ 322.506107][T10818] device syzkaller0 entered promiscuous mode [ 322.783722][T10828] device lo entered promiscuous mode [ 323.708585][T10847] device syzkaller0 entered promiscuous mode [ 323.888037][T10856] device syzkaller0 entered promiscuous mode [ 324.066707][T10872] device syzkaller0 entered promiscuous mode [ 324.246975][T10883] device syzkaller0 entered promiscuous mode [ 324.519624][T10895] device syzkaller0 entered promiscuous mode [ 324.602956][T10901] device syzkaller0 entered promiscuous mode [ 325.012055][T10919] device lo left promiscuous mode [ 325.201666][T10934] syz-executor.1[10934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.201797][T10934] syz-executor.1[10934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.305850][T10934] syz-executor.1[10934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.317649][T10934] syz-executor.1[10934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.554425][T10998] device syzkaller0 entered promiscuous mode [ 327.044200][T11029] device syzkaller0 entered promiscuous mode [ 327.189022][T11032] device syzkaller0 entered promiscuous mode [ 327.436503][T11045] device syzkaller0 entered promiscuous mode [ 327.526986][T11048] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.534253][T11048] device bridge0 left promiscuous mode [ 327.554080][T11048] device bridge_slave_1 left promiscuous mode [ 327.569145][T11048] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.582227][T11048] device O3ãc¤± left promiscuous mode [ 327.587517][T11048] bridge0: port 1(O3ãc¤±) entered disabled state [ 327.755534][T11074] device syzkaller0 entered promiscuous mode [ 327.886858][T11081] device syzkaller0 entered promiscuous mode [ 328.451052][T11106] device syzkaller0 entered promiscuous mode [ 328.703638][T11123] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.710743][T11123] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.794509][T11123] device bridge_slave_1 left promiscuous mode [ 328.836836][T11123] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.846420][T11123] device bridge_slave_0 left promiscuous mode [ 328.856372][T11123] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.266922][T11151] device syzkaller0 entered promiscuous mode [ 329.902114][T11179] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.950850][T11179] device bridge_slave_1 left promiscuous mode [ 329.958275][T11179] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.979577][T11179] device bridge_slave_0 left promiscuous mode [ 329.986043][T11179] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.998926][ T30] audit: type=1400 audit(1718175145.825:144): avc: denied { create } for pid=11183 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 332.075161][T11304] device lo entered promiscuous mode [ 332.728546][T11326] device syzkaller0 entered promiscuous mode [ 334.273210][T11423] device syzkaller0 entered promiscuous mode [ 335.628701][T11494] device syzkaller0 entered promiscuous mode [ 335.848831][T11510] device lo entered promiscuous mode [ 335.862826][T11510] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 339.921117][T11682] device syzkaller0 entered promiscuous mode [ 341.004572][T11722] device syzkaller0 entered promiscuous mode [ 341.100999][T11726] device syzkaller0 entered promiscuous mode [ 342.239016][T11768] device syzkaller0 entered promiscuous mode [ 342.615406][T11804] device syzkaller0 entered promiscuous mode [ 342.689528][T11810] device syzkaller0 entered promiscuous mode [ 342.766098][T11812] device syzkaller0 entered promiscuous mode [ 343.534931][T11841] device syzkaller0 entered promiscuous mode [ 343.624082][T11848] device syzkaller0 entered promiscuous mode [ 343.818083][ C0] ------------[ cut here ]------------ [ 343.823491][ C0] WARNING: CPU: 0 PID: 11833 at kernel/softirq.c:358 __local_bh_enable_ip+0x6c/0x80 [ 343.832683][ C0] Modules linked in: [ 343.836501][ C0] CPU: 0 PID: 11833 Comm: syz-executor.2 Tainted: G W 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 343.848043][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 343.858023][ C0] RIP: 0010:__local_bh_enable_ip+0x6c/0x80 [ 343.863663][ C0] Code: 66 8b 05 27 89 c0 7e 66 85 c0 75 22 bf 01 00 00 00 e8 98 42 09 00 65 8b 05 99 86 bf 7e 85 c0 74 02 5d c3 e8 9a 9a bd ff 5d c3 <0f> 0b eb a2 e8 0b 00 00 00 eb d7 66 0f 1f 84 00 00 00 00 00 55 48 [ 343.883116][ C0] RSP: 0018:ffffc90000007d80 EFLAGS: 00010006 [ 343.889010][ C0] RAX: 0000000080010202 RBX: ffff88810ed50128 RCX: dffffc0000000000 [ 343.896906][ C0] RDX: 0000000080010202 RSI: 0000000000000201 RDI: ffffffff83fe44cb [ 343.904841][ C0] RBP: ffffc90000007d80 R08: dffffc0000000000 R09: ffffed102277a4f1 [ 343.912705][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88810ed50128 [ 343.920512][ C0] R13: ffff888113bd2780 R14: 0000000000000000 R15: ffff888113bd2780 [ 343.928323][ C0] FS: 00007f5e90e846c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 343.937179][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 343.943603][ C0] CR2: 0000786c6c257830 CR3: 00000001206d2000 CR4: 00000000003506b0 [ 343.951501][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 343.959310][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 343.967207][ C0] Call Trace: [ 343.970335][ C0] [ 343.973051][ C0] ? show_regs+0x58/0x60 [ 343.977103][ C0] ? __warn+0x160/0x2f0 [ 343.981096][ C0] ? __local_bh_enable_ip+0x6c/0x80 [ 343.986152][ C0] ? report_bug+0x3d9/0x5b0 [ 343.990485][ C0] ? __local_bh_enable_ip+0x6c/0x80 [ 343.995503][ C0] ? handle_bug+0x41/0x70 [ 343.999672][ C0] ? exc_invalid_op+0x1b/0x50 [ 344.004181][ C0] ? asm_exc_invalid_op+0x1b/0x20 [ 344.009044][ C0] ? sock_map_delete_elem+0xcb/0x130 [ 344.014163][ C0] ? __local_bh_enable_ip+0x6c/0x80 [ 344.019285][ C0] _raw_spin_unlock_bh+0x51/0x60 [ 344.024055][ C0] sock_map_delete_elem+0xcb/0x130 [ 344.029002][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x2fc [ 344.034385][ C0] bpf_trace_run2+0xec/0x210 [ 344.038900][ C0] ? lapic_next_event+0x5f/0x70 [ 344.043585][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 344.048270][ C0] ? flush_tlb_one_user+0x50/0x50 [ 344.053225][ C0] __bpf_trace_tlb_flush+0x23/0x30 [ 344.058173][ C0] flush_tlb_func+0x530/0x550 [ 344.062773][ C0] flush_smp_call_function_queue+0x222/0x6a0 [ 344.068588][ C0] ? native_flush_tlb_multi+0x210/0x210 [ 344.073968][ C0] generic_smp_call_function_single_interrupt+0x13/0x20 [ 344.080737][ C0] __sysvec_call_function_single+0x63/0x1b0 [ 344.086467][ C0] sysvec_call_function_single+0x92/0xb0 [ 344.091934][ C0] [ 344.094711][ C0] [ 344.097487][ C0] asm_sysvec_call_function_single+0x1b/0x20 [ 344.103303][ C0] RIP: 0010:up_read+0x0/0x170 [ 344.107818][ C0] Code: 3e b7 ad 7e 74 0a bb 01 00 00 00 e9 f9 fe ff ff e8 51 cb ab ff eb ef 0f 1f 00 55 48 89 e5 e8 e7 0e 00 00 0f b6 c0 5d c3 66 90 <55> 48 89 e5 41 57 41 56 53 48 89 fb bf 01 00 00 00 e8 5a 71 f7 ff [ 344.127261][ C0] RSP: 0018:ffffc90000d37520 EFLAGS: 00000246 [ 344.133161][ C0] RAX: 0000000000000000 RBX: 000000002065f000 RCX: 0000000000040000 [ 344.140970][ C0] RDX: ffffc9000175f000 RSI: 000000000001417e RDI: ffff888100060078 [ 344.148781][ C0] RBP: ffffc90000d37668 R08: ffffffff81a7c72f R09: ffffed102000c07a [ 344.156593][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 344.164405][ C0] R13: 0000000000000000 R14: ffff888100060000 R15: 0000000000000214 [ 344.172219][ C0] ? do_handle_mm_fault+0x175f/0x23a0 [ 344.177428][ C0] ? exc_page_fault+0x459/0x830 [ 344.182116][ C0] asm_exc_page_fault+0x27/0x30 [ 344.186798][ C0] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 344.193307][ C0] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 344.212767][ C0] RSP: 0018:ffffc90000d37728 EFLAGS: 00050206 [ 344.218648][ C0] RAX: ffffffff82639401 RBX: 0000000020666cd4 RCX: 0000000000007cd4 [ 344.226462][ C0] RDX: 0000000000008000 RSI: 000000002065f000 RDI: ffff88814985832c [ 344.234281][ C0] RBP: ffffc90000d377a8 R08: dffffc0000000000 R09: ffffed102930c000 [ 344.242083][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000008000 [ 344.249897][ C0] R13: ffff888149858000 R14: 0000000000008000 R15: 000000002065ecd4 [ 344.257712][ C0] ? copy_page_from_iter+0x2a1/0x640 [ 344.262831][ C0] ? copy_page_from_iter+0x34c/0x640 [ 344.267949][ C0] skb_copy_datagram_from_iter+0x2f3/0x6d0 [ 344.273592][ C0] unix_stream_sendmsg+0x78f/0x1060 [ 344.278626][ C0] ? unix_stream_sendmsg+0x891/0x1060 [ 344.283832][ C0] ? unix_show_fdinfo+0xa0/0xa0 [ 344.288518][ C0] ? check_stack_object+0xf4/0x130 [ 344.293465][ C0] ? security_socket_sendmsg+0x82/0xb0 [ 344.298807][ C0] ? unix_show_fdinfo+0xa0/0xa0 [ 344.303535][ C0] ____sys_sendmsg+0x59e/0x8f0 [ 344.308321][ C0] ? __sys_sendmsg_sock+0x40/0x40 [ 344.313169][ C0] ___sys_sendmsg+0x252/0x2e0 [ 344.317682][ C0] ? native_set_ldt+0x360/0x360 [ 344.322370][ C0] ? __sys_sendmsg+0x260/0x260 [ 344.326967][ C0] ? finish_task_switch+0x167/0x7b0 [ 344.332006][ C0] ? __fdget+0x1bc/0x240 [ 344.336083][ C0] __se_sys_sendmsg+0x19a/0x260 [ 344.340772][ C0] ? __x64_sys_sendmsg+0x90/0x90 [ 344.345554][ C0] ? switch_fpu_return+0x1ed/0x3d0 [ 344.350842][ C0] ? __kasan_check_read+0x11/0x20 [ 344.355697][ C0] __x64_sys_sendmsg+0x7b/0x90 [ 344.360297][ C0] do_syscall_64+0x3d/0xb0 [ 344.364547][ C0] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 344.370275][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 344.376004][ C0] RIP: 0033:0x7f5e91b09ea9 [ 344.380258][ C0] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 344.399699][ C0] RSP: 002b:00007f5e90e840c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 344.407941][ C0] RAX: ffffffffffffffda RBX: 00007f5e91c40f80 RCX: 00007f5e91b09ea9 [ 344.415762][ C0] RDX: 0000000000000000 RSI: 0000000020001580 RDI: 0000000000000006 [ 344.423572][ C0] RBP: 00007f5e91b78ff4 R08: 0000000000000000 R09: 0000000000000000 [ 344.431639][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 344.439448][ C0] R13: 000000000000000b R14: 00007f5e91c40f80 R15: 00007ffea3514558 [ 344.447269][ C0] [ 344.450124][ C0] ---[ end trace e80ae4a2a04fba92 ]--- [ 344.592748][T11880] device syzkaller0 entered promiscuous mode [ 344.656167][T11884] device syzkaller0 entered promiscuous mode [ 344.712440][T11886] device syzkaller0 entered promiscuous mode [ 344.798256][T11888] device syzkaller0 entered promiscuous mode [ 345.002963][T11901] device syzkaller0 entered promiscuous mode [ 345.073234][T11908] device syzkaller0 entered promiscuous mode [ 345.332150][T11919] device syzkaller0 entered promiscuous mode [ 345.598315][ C1] ================================================================== [ 345.606207][ C1] BUG: KASAN: null-ptr-deref in flush_tlb_func+0x43/0x550 [ 345.613150][ C1] Read of size 8 at addr 0000000000000329 by task syz-executor.3/11892 [ 345.621224][ C1] [ 345.623401][ C1] CPU: 1 PID: 11892 Comm: syz-executor.3 Tainted: G W 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 345.634933][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 345.644825][ C1] Call Trace: [ 345.647951][ C1] [ 345.650647][ C1] dump_stack_lvl+0x151/0x1b7 [ 345.655156][ C1] ? io_uring_drop_tctx_refs+0x190/0x190 [ 345.660622][ C1] ? enqueue_task_rt+0x788/0xc10 [ 345.665395][ C1] kasan_report+0x16f/0x1c0 [ 345.669733][ C1] ? flush_tlb_func+0x43/0x550 [ 345.674334][ C1] ? flush_tlb_func+0x43/0x550 [ 345.678935][ C1] kasan_check_range+0x293/0x2a0 [ 345.683709][ C1] __kasan_check_read+0x11/0x20 [ 345.688396][ C1] flush_tlb_func+0x43/0x550 [ 345.692820][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 345.697854][ C1] ? sched_clock+0x9/0x10 [ 345.702021][ C1] ? sched_clock_cpu+0x18/0x3b0 [ 345.706708][ C1] flush_smp_call_function_queue+0x222/0x6a0 [ 345.712522][ C1] ? debug_smp_processor_id+0x17/0x20 [ 345.717728][ C1] ? native_flush_tlb_multi+0x210/0x210 [ 345.723114][ C1] generic_smp_call_function_single_interrupt+0x13/0x20 [ 345.729880][ C1] __sysvec_call_function_single+0x63/0x1b0 [ 345.735697][ C1] sysvec_call_function_single+0x41/0xb0 [ 345.741166][ C1] asm_sysvec_call_function_single+0x1b/0x20 [ 345.746978][ C1] RIP: 0010:_raw_spin_unlock_irqrestore+0x57/0x80 [ 345.753319][ C1] Code: 8d 86 e8 ec 45 e9 fc 48 83 3d 2c 2b c4 01 00 74 35 48 89 df e8 5e bc 8b fc 66 90 41 f7 c6 00 02 00 00 74 01 fb bf 01 00 00 00 b4 ff 82 fc 65 8b 05 b5 43 39 7b 85 c0 74 05 5b 41 5e 5d c3 e8 [ 345.772843][ C1] RSP: 0018:ffffc900001d0d70 EFLAGS: 00000206 [ 345.778745][ C1] RAX: 0000000000000001 RBX: ffffffff869ab120 RCX: dffffc0000000000 [ 345.786557][ C1] RDX: ffffc900000e7d68 RSI: 0000000000000246 RDI: 0000000000000001 [ 345.794369][ C1] RBP: ffffc900001d0d80 R08: dffffc0000000000 R09: ffffed1021eac4f1 [ 345.802272][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 345.810272][ C1] R13: ffffc900000e7d68 R14: 0000000000000246 R15: ffffffff869ab120 [ 345.818101][ C1] swake_up_one+0x152/0x170 [ 345.822422][ C1] rcu_report_qs_rnp+0x381/0x390 [ 345.827201][ C1] rcu_core+0xae2/0x1020 [ 345.831279][ C1] ? irqtime_account_irq+0xdc/0x3c0 [ 345.836308][ C1] ? rcu_cpu_kthread_park+0x90/0x90 [ 345.841341][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 345.847332][ C1] rcu_core_si+0x9/0x10 [ 345.851323][ C1] __do_softirq+0x26d/0x5bf [ 345.855663][ C1] do_softirq+0xf6/0x150 [ 345.859743][ C1] [ 345.862520][ C1] [ 345.865295][ C1] ? __local_bh_enable_ip+0x80/0x80 [ 345.870336][ C1] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 345.875197][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 345.880402][ C1] __local_bh_enable_ip+0x75/0x80 [ 345.885260][ C1] _raw_spin_unlock_bh+0x51/0x60 [ 345.890033][ C1] sock_map_delete_elem+0xcb/0x130 [ 345.894982][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xc40 [ 345.900360][ C1] bpf_trace_run2+0xec/0x210 [ 345.904799][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 345.909479][ C1] ? __perf_event_task_sched_out+0x831/0x980 [ 345.915293][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 345.920669][ C1] __bpf_trace_tlb_flush+0x23/0x30 [ 345.925616][ C1] switch_mm_irqs_off+0x616/0x9b0 [ 345.930480][ C1] __schedule+0xb2b/0x1590 [ 345.934736][ C1] ? __sched_text_start+0x8/0x8 [ 345.939419][ C1] ? _raw_write_unlock_irq+0x20/0x60 [ 345.944624][ C1] preempt_schedule_irq+0xc7/0x140 [ 345.949572][ C1] ? __cond_resched+0x20/0x20 [ 345.954090][ C1] irqentry_exit_cond_resched+0x2a/0x30 [ 345.959468][ C1] irqentry_exit+0x30/0x40 [ 345.963719][ C1] sysvec_apic_timer_interrupt+0x55/0xc0 [ 345.969186][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 345.975003][ C1] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 345.981429][ C1] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 346.000865][ C1] RSP: 0018:ffffc90000d17728 EFLAGS: 00050206 [ 346.006769][ C1] RAX: ffffffff82639401 RBX: 0000000020718ed4 RCX: 0000000000002ed4 [ 346.014576][ C1] RDX: 0000000000008000 RSI: 0000000020716000 RDI: ffff88810f24512c [ 346.022393][ C1] RBP: ffffc90000d177a8 R08: dffffc0000000000 R09: ffffed1021e49000 [ 346.030209][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000008000 [ 346.038014][ C1] R13: ffff88810f240000 R14: 0000000000008000 R15: 0000000020710ed4 [ 346.045830][ C1] ? copy_page_from_iter+0x2a1/0x640 [ 346.050948][ C1] ? copy_page_from_iter+0x34c/0x640 [ 346.056248][ C1] skb_copy_datagram_from_iter+0x2f3/0x6d0 [ 346.061889][ C1] unix_stream_sendmsg+0x78f/0x1060 [ 346.066924][ C1] ? unix_stream_sendmsg+0x891/0x1060 [ 346.072131][ C1] ? unix_show_fdinfo+0xa0/0xa0 [ 346.076819][ C1] ? security_socket_sendmsg+0x82/0xb0 [ 346.082110][ C1] ? unix_show_fdinfo+0xa0/0xa0 [ 346.086930][ C1] ____sys_sendmsg+0x59e/0x8f0 [ 346.091518][ C1] ? __sys_sendmsg_sock+0x40/0x40 [ 346.096380][ C1] ? ___sys_sendmsg+0x237/0x2e0 [ 346.101066][ C1] ? ____sys_sendmsg+0x8/0x8f0 [ 346.105664][ C1] ___sys_sendmsg+0x252/0x2e0 [ 346.110177][ C1] ? __sys_sendmsg+0x260/0x260 [ 346.114780][ C1] ? __fdget+0x1bc/0x240 [ 346.118860][ C1] __se_sys_sendmsg+0x19a/0x260 [ 346.123545][ C1] ? __x64_sys_sendmsg+0x90/0x90 [ 346.128315][ C1] ? switch_fpu_return+0x1ed/0x3d0 [ 346.133275][ C1] ? __kasan_check_read+0x11/0x20 [ 346.138126][ C1] __x64_sys_sendmsg+0x7b/0x90 [ 346.142730][ C1] do_syscall_64+0x3d/0xb0 [ 346.146975][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 346.152620][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 346.158432][ C1] RIP: 0033:0x7f1a11dc5ea9 [ 346.162684][ C1] Code: Unable to access opcode bytes at RIP 0x7f1a11dc5e7f. [ 346.169888][ C1] RSP: 002b:00007f1a111400c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 346.178132][ C1] RAX: ffffffffffffffda RBX: 00007f1a11efcf80 RCX: 00007f1a11dc5ea9 [ 346.185947][ C1] RDX: 0000000000000000 RSI: 0000000020001580 RDI: 0000000000000009 [ 346.193842][ C1] RBP: 00007f1a11e34ff4 R08: 0000000000000000 R09: 0000000000000000 [ 346.201653][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 346.209469][ C1] R13: 000000000000000b R14: 00007f1a11efcf80 R15: 00007fff8a912168 [ 346.217367][ C1] [ 346.220227][ C1] ================================================================== [ 346.228302][ C1] Disabling lock debugging due to kernel taint [ 346.234328][ C1] general protection fault, probably for non-canonical address 0xdffffc0000000065: 0000 [#1] PREEMPT SMP KASAN [ 346.245831][ C1] KASAN: null-ptr-deref in range [0x0000000000000328-0x000000000000032f] [ 346.254080][ C1] CPU: 1 PID: 11892 Comm: syz-executor.3 Tainted: G B W 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 346.265620][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 346.275519][ C1] RIP: 0010:flush_tlb_func+0x4a/0x550 [ 346.280724][ C1] Code: 8b 35 6a 97 cd 7e 65 66 44 8b 25 71 97 cd 7e 49 8d 9e 28 03 00 00 48 89 df be 08 00 00 00 e8 fd 97 7c 00 48 89 d8 48 c1 e8 03 <42> 80 3c 38 00 74 08 48 89 df e8 07 96 7c 00 4c 8b 3b 66 44 89 65 [ 346.300257][ C1] RSP: 0018:ffffc900001d0ba0 EFLAGS: 00010006 [ 346.306150][ C1] RAX: 0000000000000065 RBX: 0000000000000329 RCX: ffff888116dfbb40 [ 346.314050][ C1] RDX: 0000000080010105 RSI: 0000000000000096 RDI: 00000000ffffffff [ 346.321865][ C1] RBP: ffffc900001d0c10 R08: ffffffff81416edb R09: 0000000000000003 [ 346.329678][ C1] R10: fffffbfff0e5284c R11: dffffc0000000001 R12: 1ffff1103ee20000 [ 346.337485][ C1] R13: ffff8881f7037180 R14: 0000000000000001 R15: dffffc0000000000 [ 346.345303][ C1] FS: 00007f1a111406c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 346.354138][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 346.360523][ C1] CR2: 0000000000000000 CR3: 000000010e6fc000 CR4: 00000000003506a0 [ 346.368297][ C1] DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 346.376194][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 346.384003][ C1] Call Trace: [ 346.387130][ C1] [ 346.389823][ C1] ? __die_body+0x62/0xb0 [ 346.393987][ C1] ? die_addr+0x9f/0xd0 [ 346.397977][ C1] ? exc_general_protection+0x311/0x4b0 [ 346.403363][ C1] ? asm_exc_general_protection+0x27/0x30 [ 346.408914][ C1] ? check_panic_on_warn+0x5b/0xb0 [ 346.413863][ C1] ? flush_tlb_func+0x4a/0x550 [ 346.418461][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 346.423507][ C1] ? sched_clock+0x9/0x10 [ 346.427672][ C1] ? sched_clock_cpu+0x18/0x3b0 [ 346.432349][ C1] flush_smp_call_function_queue+0x222/0x6a0 [ 346.438163][ C1] ? debug_smp_processor_id+0x17/0x20 [ 346.443369][ C1] ? native_flush_tlb_multi+0x210/0x210 [ 346.448751][ C1] generic_smp_call_function_single_interrupt+0x13/0x20 [ 346.455521][ C1] __sysvec_call_function_single+0x63/0x1b0 [ 346.461247][ C1] sysvec_call_function_single+0x41/0xb0 [ 346.466717][ C1] asm_sysvec_call_function_single+0x1b/0x20 [ 346.472543][ C1] RIP: 0010:_raw_spin_unlock_irqrestore+0x57/0x80 [ 346.478784][ C1] Code: 8d 86 e8 ec 45 e9 fc 48 83 3d 2c 2b c4 01 00 74 35 48 89 df e8 5e bc 8b fc 66 90 41 f7 c6 00 02 00 00 74 01 fb bf 01 00 00 00 b4 ff 82 fc 65 8b 05 b5 43 39 7b 85 c0 74 05 5b 41 5e 5d c3 e8 [ 346.498231][ C1] RSP: 0018:ffffc900001d0d70 EFLAGS: 00000206 [ 346.504123][ C1] RAX: 0000000000000001 RBX: ffffffff869ab120 RCX: dffffc0000000000 [ 346.511935][ C1] RDX: ffffc900000e7d68 RSI: 0000000000000246 RDI: 0000000000000001 [ 346.519747][ C1] RBP: ffffc900001d0d80 R08: dffffc0000000000 R09: ffffed1021eac4f1 [ 346.527563][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 346.535369][ C1] R13: ffffc900000e7d68 R14: 0000000000000246 R15: ffffffff869ab120 [ 346.543189][ C1] swake_up_one+0x152/0x170 [ 346.547520][ C1] rcu_report_qs_rnp+0x381/0x390 [ 346.552293][ C1] rcu_core+0xae2/0x1020 [ 346.556613][ C1] ? irqtime_account_irq+0xdc/0x3c0 [ 346.561732][ C1] ? rcu_cpu_kthread_park+0x90/0x90 [ 346.566763][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 346.572754][ C1] rcu_core_si+0x9/0x10 [ 346.576746][ C1] __do_softirq+0x26d/0x5bf [ 346.581087][ C1] do_softirq+0xf6/0x150 [ 346.585166][ C1] [ 346.587943][ C1] [ 346.590719][ C1] ? __local_bh_enable_ip+0x80/0x80 [ 346.595839][ C1] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 346.600700][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 346.605737][ C1] __local_bh_enable_ip+0x75/0x80 [ 346.610595][ C1] _raw_spin_unlock_bh+0x51/0x60 [ 346.615370][ C1] sock_map_delete_elem+0xcb/0x130 [ 346.620317][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xc40 [ 346.625697][ C1] bpf_trace_run2+0xec/0x210 [ 346.630123][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 346.634809][ C1] ? __perf_event_task_sched_out+0x831/0x980 [ 346.640626][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 346.646007][ C1] __bpf_trace_tlb_flush+0x23/0x30 [ 346.650955][ C1] switch_mm_irqs_off+0x616/0x9b0 [ 346.655815][ C1] __schedule+0xb2b/0x1590 [ 346.660069][ C1] ? __sched_text_start+0x8/0x8 [ 346.664950][ C1] ? _raw_write_unlock_irq+0x20/0x60 [ 346.670072][ C1] preempt_schedule_irq+0xc7/0x140 [ 346.675017][ C1] ? __cond_resched+0x20/0x20 [ 346.679533][ C1] irqentry_exit_cond_resched+0x2a/0x30 [ 346.684911][ C1] irqentry_exit+0x30/0x40 [ 346.689177][ C1] sysvec_apic_timer_interrupt+0x55/0xc0 [ 346.694637][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 346.700448][ C1] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 346.706871][ C1] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 346.726312][ C1] RSP: 0018:ffffc90000d17728 EFLAGS: 00050206 [ 346.732213][ C1] RAX: ffffffff82639401 RBX: 0000000020718ed4 RCX: 0000000000002ed4 [ 346.740028][ C1] RDX: 0000000000008000 RSI: 0000000020716000 RDI: ffff88810f24512c [ 346.747921][ C1] RBP: ffffc90000d177a8 R08: dffffc0000000000 R09: ffffed1021e49000 [ 346.755744][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000008000 [ 346.763555][ C1] R13: ffff88810f240000 R14: 0000000000008000 R15: 0000000020710ed4 [ 346.771445][ C1] ? copy_page_from_iter+0x2a1/0x640 [ 346.776565][ C1] ? copy_page_from_iter+0x34c/0x640 [ 346.781686][ C1] skb_copy_datagram_from_iter+0x2f3/0x6d0 [ 346.787328][ C1] unix_stream_sendmsg+0x78f/0x1060 [ 346.792361][ C1] ? unix_stream_sendmsg+0x891/0x1060 [ 346.797574][ C1] ? unix_show_fdinfo+0xa0/0xa0 [ 346.802263][ C1] ? security_socket_sendmsg+0x82/0xb0 [ 346.807549][ C1] ? unix_show_fdinfo+0xa0/0xa0 [ 346.812236][ C1] ____sys_sendmsg+0x59e/0x8f0 [ 346.816836][ C1] ? __sys_sendmsg_sock+0x40/0x40 [ 346.821696][ C1] ? ___sys_sendmsg+0x237/0x2e0 [ 346.826383][ C1] ? ____sys_sendmsg+0x8/0x8f0 [ 346.830991][ C1] ___sys_sendmsg+0x252/0x2e0 [ 346.835496][ C1] ? __sys_sendmsg+0x260/0x260 [ 346.840107][ C1] ? __fdget+0x1bc/0x240 [ 346.844173][ C1] __se_sys_sendmsg+0x19a/0x260 [ 346.848980][ C1] ? __x64_sys_sendmsg+0x90/0x90 [ 346.853721][ C1] ? switch_fpu_return+0x1ed/0x3d0 [ 346.858673][ C1] ? __kasan_check_read+0x11/0x20 [ 346.863617][ C1] __x64_sys_sendmsg+0x7b/0x90 [ 346.868217][ C1] do_syscall_64+0x3d/0xb0 [ 346.872469][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 346.878111][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 346.883839][ C1] RIP: 0033:0x7f1a11dc5ea9 [ 346.888091][ C1] Code: Unable to access opcode bytes at RIP 0x7f1a11dc5e7f. [ 346.895295][ C1] RSP: 002b:00007f1a111400c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 346.903540][ C1] RAX: ffffffffffffffda RBX: 00007f1a11efcf80 RCX: 00007f1a11dc5ea9 [ 346.911353][ C1] RDX: 0000000000000000 RSI: 0000000020001580 RDI: 0000000000000009 [ 346.919163][ C1] RBP: 00007f1a11e34ff4 R08: 0000000000000000 R09: 0000000000000000 [ 346.927062][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 346.934872][ C1] R13: 000000000000000b R14: 00007f1a11efcf80 R15: 00007fff8a912168 [ 346.942688][ C1] [ 346.945550][ C1] Modules linked in: [ 346.949298][ C1] ---[ end trace e80ae4a2a04fba93 ]--- [ 346.954661][ C1] RIP: 0010:flush_tlb_func+0x4a/0x550 [ 346.959878][ C1] Code: 8b 35 6a 97 cd 7e 65 66 44 8b 25 71 97 cd 7e 49 8d 9e 28 03 00 00 48 89 df be 08 00 00 00 e8 fd 97 7c 00 48 89 d8 48 c1 e8 03 <42> 80 3c 38 00 74 08 48 89 df e8 07 96 7c 00 4c 8b 3b 66 44 89 65 [ 346.979404][ C1] RSP: 0018:ffffc900001d0ba0 EFLAGS: 00010006 [ 346.985322][ C1] RAX: 0000000000000065 RBX: 0000000000000329 RCX: ffff888116dfbb40 [ 346.993112][ C1] RDX: 0000000080010105 RSI: 0000000000000096 RDI: 00000000ffffffff [ 347.000921][ C1] RBP: ffffc900001d0c10 R08: ffffffff81416edb R09: 0000000000000003 [ 347.008732][ C1] R10: fffffbfff0e5284c R11: dffffc0000000001 R12: 1ffff1103ee20000 [ 347.016542][ C1] R13: ffff8881f7037180 R14: 0000000000000001 R15: dffffc0000000000 [ 347.024359][ C1] FS: 00007f1a111406c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 347.033120][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 347.039543][ C1] CR2: 0000000000000000 CR3: 000000010e6fc000 CR4: 00000000003506a0 [ 347.047358][ C1] DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 347.055166][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 347.062987][ C1] Kernel panic - not syncing: Fatal exception in interrupt [ 348.174807][ C1] Shutting down cpus with NMI [ 348.179540][ C1] Kernel Offset: disabled [ 348.183705][ C1] Rebooting in 86400 seconds..