last executing test programs: 12.685673575s ago: executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x6, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000590000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f0000000c80)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000c40)='syzkaller\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4c000000, 0x9}, 0x90) 9.255437911s ago: executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x6, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000590000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f0000000c80)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000c40)='syzkaller\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4c000000, 0x9}, 0x90) 6.787503149s ago: executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x6, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000590000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f0000000c80)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000c40)='syzkaller\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4c000000, 0x9}, 0x90) 4.845923617s ago: executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x6, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000590000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f0000000c80)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000c40)='syzkaller\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4c000000, 0x9}, 0x90) 2.93430089s ago: executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x6, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000590000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f0000000c80)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000c40)='syzkaller\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4c000000, 0x9}, 0x90) 2.326314213s ago: executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_remove_space_done\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_es_find_extent_range_exit\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000000)) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x0, 0x0, 0x0, 0x9}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc020660b, &(0x7f0000000040)=0x29a) 2.032081208s ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000680)=ANY=[@ANYRESHEX=r5, @ANYRES8=r3, @ANYRES64=0x0, @ANYRES64=r6, @ANYRES32=r4, @ANYRES32=r0, @ANYBLOB="7f217ff4ee45b21b967ef7771e459bd21da8ccdb9a160317b794d0dfb03249e63c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_int(r6, 0x0, 0x2, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000005c0)='scsi_dispatch_cmd_error\x00', r2}, 0xfffffeb9) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000040000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000900)='console\x00', r9}, 0x10) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'geneve1\x00', 0x2}) ioctl$TUNSETOFFLOAD(r10, 0x400454c9, 0x3) ioctl$TUNSETTXFILTER(r10, 0x400454d1, &(0x7f00000003c0)=ANY=[]) r11 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000ff5b00000000000000000002851000000600000018100000", @ANYRES32=r11, @ANYBLOB="00000000000000006608000000000000180000001000000000000000000000009500000000000000360a000000000000180000002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r12}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x25}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000040)={'hsr0\x00'}) 1.265848726s ago: executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000e0dd001000000000400000007010000080700007500fcff0000000095000000d3031a00041f8ea47c2eb2b7639c2ad3a4c89eb40634ab9b5ade7978eb59ff70cd62adbe9c31865cf39dc9e93813d9433f34dad576b1897b3533f883f9e873d9c435ab89afdd4ff0c24c0053f1721e9dc694f461734e10ea76584696317ca540336bc0e60e7d6d44484e01102b1c830d2630c3932755946ba8848b0d93caec1f4d89f99dcd2e9cb4d3646bc48d7ece5cbb87cdd67955cf5c813c05411a276d6afe065ac5849c64aebf30294fc591"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250}, 0x90) 1.025853992s ago: executing program 0: bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) bpf$ENABLE_STATS(0x20, &(0x7f0000000040), 0x4) bpf$ENABLE_STATS(0x20, &(0x7f0000000080), 0x4) bpf$ENABLE_STATS(0x20, &(0x7f00000000c0), 0x4) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x1a, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xffffffb3}, {}, {}, [@tail_call, @ldst={0x2, 0x0, 0x0, 0x5, 0xe, 0x1, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0xb2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x3, 0x6a, &(0x7f0000000240)=""/106, 0x40f00, 0x3c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x10, 0x3f, 0x62c}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000380)=[{0x0, 0x4, 0x5, 0x6}, {0x1, 0x3, 0x2, 0x3}], 0x10, 0x800}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000480)={r0}, 0xc) bpf$ENABLE_STATS(0x20, &(0x7f00000004c0), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000005c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x0, 0x27, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x13, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0), 0x4) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000009c0)=@generic={&(0x7f0000000980)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a80)={{0x1, 0xffffffffffffffff}, &(0x7f0000000a00), &(0x7f0000000a40)='%pB \x00'}, 0x20) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000ac0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000b40)={0x1, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000c00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)='%pI4 \x00'}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x1a, 0x10, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x8}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000580)='GPL\x00', 0x10000, 0x0, 0x0, 0x41100, 0x17, '\x00', r1, 0xd, r2, 0x8, &(0x7f0000000900)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000940)={0x2, 0x7, 0x8, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f0000000c40)=[r3, r4, r5, r6, r7], &(0x7f0000000c80)=[{0x4, 0x1, 0x3, 0x4}, {0x3, 0x5, 0x10, 0x7}, {0x5, 0x5, 0x9, 0x1}, {0x2, 0x1, 0xb, 0xb}, {0x0, 0x4, 0x2, 0x1}, {0x3, 0x2, 0x7, 0x6}, {0x4, 0x1, 0x7, 0x2}, {0x1, 0x2, 0x9, 0xa}, {0x4, 0x5, 0x3, 0xc}], 0x10, 0x2378739d}, 0x90) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) close(r7) bpf$ENABLE_STATS(0x20, &(0x7f0000000e40), 0x4) r10 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000e80), 0x4) bpf$LINK_DETACH(0x22, &(0x7f0000000ec0)=r10, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000f80)={{r5, 0xffffffffffffffff}, &(0x7f0000000f00), &(0x7f0000000f40)=r0}, 0x20) r12 = openat$cgroup_ro(r9, &(0x7f0000000fc0)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r12, 0x40042408, r8) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x11, 0x3a, &(0x7f0000001040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x3f}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r12}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7fff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @generic={0xdd, 0x4, 0x7, 0x5, 0x7}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_val={0x18, 0x6, 0x2, 0x0, r11, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x73}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}]}, &(0x7f0000001240)='GPL\x00', 0x400, 0x1000, &(0x7f0000001280)=""/4096, 0x41000, 0x5, '\x00', r1, 0x0, r12, 0x8, &(0x7f0000002280)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000022c0)={0x3, 0xd, 0xb4, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002300)=[r6, r6, r3, r5, r3, r12, r5, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002400)={&(0x7f0000001000)='netfs_failure\x00', r13}, 0x10) bpf$ENABLE_STATS(0x20, &(0x7f0000002440), 0x4) write$cgroup_devices(r12, &(0x7f0000002480)={'a', ' *:* ', 'rm\x00'}, 0x9) bpf$ENABLE_STATS(0x20, &(0x7f00000024c0), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002540)={&(0x7f0000002500)='netlink_extack\x00', r13}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002580)='./cgroup.cpu/syz1\x00', 0x1ff) 993.796167ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000140)='mm_page_alloc\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x4, &(0x7f0000000000)=@framed={{}, [@kfunc]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) 788.008319ms ago: executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 763.980312ms ago: executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x92, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1400000000000000", @ANYRES32=r2, @ANYBLOB], 0x18}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="54000000000000000000000400000000000000600000000100010001000000010000000700000007442cc05000000000000000010000ee06000000080000000100000e4a0000002000650e0300000005000000080000000030000000000000000100000001"], 0x88}, 0x0) close(r2) close(r3) ioctl$SIOCSIFHWADDR(r0, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40001) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r4}, 0x8) 740.489646ms ago: executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff0000a200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500"/72], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{r1}, &(0x7f0000000680), &(0x7f00000006c0)='%+9llu \x00'}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='ext4_discard_preallocations\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000c50000008385000000710000009500000000000000000000000000000000000000000000000000000000000000000000d99cad2dc962c5d723e094f0044909882edbaf007f35bd8bf0fb96144b42848ae04e44c0d7c136122cf70add424d9f2949584ca1ec99d6ed8409fc2206f993f47c5daab790c4cf46b1171d95"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='track_foreign_dirty\x00', r5}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xb, &(0x7f0000000380)=ANY=[@ANYRES16=r0, @ANYRES8=0x0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x26, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='track_foreign_dirty\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r8, &(0x7f0000000240)='THAWED\x00', 0x7) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000340)=ANY=[@ANYRESHEX=r6, @ANYBLOB="0000000000000000b708000000000040"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x28, r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r1, 0x58, &(0x7f0000000580)}, 0xfffffffffffffe36) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000240), 0x2, 0x0) write$cgroup_type(r9, &(0x7f00000002c0), 0x9) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x10008, 0x0, 0x0, 0x9, 0x3, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{r10}, &(0x7f0000000640), &(0x7f0000000680)='%+9llu \x00'}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x20, r10}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1d, 0x4, &(0x7f00000003c0)=ANY=[@ANYRESOCT], &(0x7f0000000140)='GPL\x00', 0x7, 0xffffffffffffffe0, &(0x7f0000000180)=""/153}, 0x90) perf_event_open(0x0, 0x0, 0x4000000000000000, 0xffffffffffffffff, 0x0) 663.937908ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000ba000000350011000000000062000000000000009500bca300000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffd0c}, 0x23) 640.703302ms ago: executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000001100)='!~') r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002100)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@enum={0x7, 0x3, 0x0, 0x6, 0x4, [{0xa, 0xff}, {0x3, 0x101}, {0xc, 0xffffffff}]}]}}, &(0x7f0000002040)=""/164, 0x3e, 0xa4, 0x80001}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r1, 0x20, &(0x7f0000000040)={&(0x7f0000000600)=""/197, 0xc5, 0x0, &(0x7f0000000700)=""/162, 0xa2}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800"/15, @ANYRESDEC=r0], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) 623.297424ms ago: executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7ffb, 0xcc, 0x0, 0xffffffffffffffff, 0x800200}, 0x48) 529.732218ms ago: executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x0, 0xd000000}, 0x2c) 517.6019ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='mm_lru_insertion\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000700)='mm_lru_insertion\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000500000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b700000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4004662b, &(0x7f00000005c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/15, @ANYRES8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r8}, &(0x7f0000000000), &(0x7f0000000080)=r5}, 0x20) recvmsg$unix(r6, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}], 0x1}, 0x0) sendmsg$inet(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000001080)='>', 0x1}], 0x1}, 0x0) 372.775032ms ago: executing program 3: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mm_page_alloc\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x18, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 366.515984ms ago: executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800"/11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0xfff}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) 346.318996ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x63, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000004000000b704000072000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_da_write_pages_extent\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000340)='ext4_da_write_pages_extent\x00', r1}, 0x10) write$cgroup_int(r0, &(0x7f0000000300), 0x12) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 331.111369ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x0, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_remove_blocks\x00', r1}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.stat\x00', 0x275a, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r4}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000a40)=""/4096, 0x3e, 0x1000}, 0x20) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'macvlan0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r7, 0x401054d5, 0x0) r8 = openat$cgroup_ro(r6, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7f, 0xfe, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x80010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x5451, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x1}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='/./\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r8, 0x58, &(0x7f0000000580)}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r3, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000400)=r5}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)=@o_path={&(0x7f00000001c0)='./file0\x00', r9, 0x4000, r2}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r10, &(0x7f0000000040)='syz1\x00', 0x1ff) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x1}, 0x8) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 301.772913ms ago: executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x3, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000071105300000000009500000000000000a0d8993ef6304d2767864abf6447f7b8264c9f691753f4a28f137e9822182d81c9ace0afbd76e71c897312af6ece9278a1f771f18a6dde46a4d05268e25f05ac1ffb1c76acc9e1f489dc1c8ee93acb80019bb3e82c1fd2ec909978472a6c930f28a65f7fa3dc1ad28d40fc8dc9841e55d8bd2d47b73f84fccfb73754ce1aab6ebaa5"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYRES8=r3, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRESDEC, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_ext_remove_space\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_ext_remove_space\x00', r7}, 0x10) write$cgroup_int(r6, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r6, 0x4030582b, &(0x7f0000000000)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1a, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESHEX=0x0], 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2a, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_mballoc_alloc\x00', r8}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='ext4_mballoc_alloc\x00', r9}, 0x10) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000500)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x42a0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, 0x28, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x80000}, 0x8) 205.451968ms ago: executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x3, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x7a}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147}, 0x90) 176.600312ms ago: executing program 4: perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000c80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf9100ead8000000b7020000010000008500000085000000b7000000000000009500"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='ext4_unlink_enter\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1c1100000000000000fcffff0000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='tlb_flush\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r6}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001600)=@base={0x9, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x58}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x29, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xd, 0x1c, &(0x7f0000000b00)=ANY=[@ANYBLOB="1808000000001000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bca900000000000035090100000000009500000000000000b7020000000000007b2af8ff00000000b509000000000000c38af8fff1000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffc70200000800000018220000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 131.333909ms ago: executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000200)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0x5b, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x88, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000600)={r1}, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xd, &(0x7f0000000380)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x321155aa9921e786}}, @call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='block_plug\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) socketpair$tipc(0x2, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_tracing={0x1a, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="18010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000d40)=[{0x4}, {}], 0x10, 0x10001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x19, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000002000000000000000500000080e706003000000085100000faffffff117408000100000095000000000000009500000000000000183900000400000000000000000000009500000000000000ff8e01f007000000b7be236018d47c6f032954e119a6c539c77ca64acb9568ecb1dbe80b5a0b5fcf264fcd0b8af8ff00000000b7080000070000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000080000001823000086c2ba1fef600ab5d30d884289899e4184c799d6dcb817d4368c2f3a66ad1f5d6518bb8c2539a3ab1bf7f1f78fee1a28"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0xe6, &(0x7f0000000280)=""/230, 0x40f00, 0x0, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x55c800}, 0x10, 0x0, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000400)=[{0x0, 0x5, 0x6, 0x9}]}, 0x90) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x100000001}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x9, 0x3, &(0x7f0000000140)=ANY=[@ANYRESOCT=r5], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x41100, 0x4}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x2e}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x100, 0xfd, 0x9, 0x1, 0x1, 0x9}, 0x48) 105.508834ms ago: executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x6, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000590000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f0000000c80)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000c40)='syzkaller\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4c000000, 0x9}, 0x90) 89.598966ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0x15) close(r0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r7}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r6, 0x0, 0x7b, 0x10, &(0x7f0000000180)="c09e6720ce4439c4987f06f271e18930bfb56a7246546aca5fdcfcfa69fb48deb0f113078d33eef04af1fc666e6a44f1841f168dc1bee2cc2fed5c659e7635890bd2905ad4f62488c6279e21bf53b6598acf2ee4fb42adfa3673a02de56dab6fb4814e62752d5dbfc38d262f9f25980edbcb243a969613f9db8377", &(0x7f0000000200)=""/16, 0x2, 0x0, 0x94, 0x50, &(0x7f0000000280)="bcd5e8edcd5d3d986ffaf68b12194666bd1fae9f2b08a084fb5dbc2038d3c02dd0d2e1954ab3428beb4dfb911557117c89d1bfcd77ac6ce951df0ca313840d161a1a6ba699e4a0e931d50ab9819af9c2fa42844d692235e702cfb989d45517952a4d07953054438a44e3724d1a4d747d29729846640752ca9af6ccd0b82077d7cbdff1b2fa4d04c4a43a3ba0e187124cce719c82", &(0x7f0000000340)="b5f0b4253e8519ed38d592c62d98161782f54ccc8e1d695b30b4b521824e602220acd6156977d85822f4feee1a3f722035a51362b18c6ea159deded93f50649de7d66fea3ad0b676a1e46a358b74fcd1", 0x0, 0x0, 0x18be00}, 0x50) ioctl$TUNSETOFFLOAD(r6, 0x40086607, 0x20001412) 27.303665ms ago: executing program 3: r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r1, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) write$cgroup_devices(r1, &(0x7f0000000140)={'c', ' *:* ', 'rwm\x00'}, 0xa) write$cgroup_devices(r1, &(0x7f0000000180)={'c', ' *:* ', 'm\x00'}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='rxrpc_client\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000380)={r1, 0x0, 0x6f, 0x0, &(0x7f0000000240)="1433d774d49c6d4117b13db080075af0f5d05439e1c811d54addfc29b94e5a3791228e9c9d49e31f11ee686db371a8e95233415c7096af9094758e958d356e8249f02271129e5de1a470638d9570e524bc5e03e39f11e81d46315fadd838e2977ec09faf98b44bd828bcf0d261c904", 0x0, 0x0, 0x0, 0x8e, 0x0, &(0x7f00000002c0)="2e62607556dc6c1698160a548721068798ad3b4a9b64d6254b4a951c8014a0477c61ee2c034c2a520839a736f515780b73d4fa76e776a6e8126e2043f39015d8067e90a8bbd62de090a1cf5aec9c9f7c7a6adaff556048aef554b4cdf735ce326ca218ac125aa786fa0cecdc6bbe738d3fcd4c2f6751d094f3f1f9f094d81ff92b41c4b0de6fddcfccb3dd9fcae6", 0x0, 0x2, 0x0, 0x7}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='locks_get_lock_context\x00', r1}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r2, 0xde}, 0xc) socketpair(0x2c, 0x1, 0x1be6, &(0x7f00000004c0)) r5 = getpid() perf_event_open(&(0x7f0000000540)={0x6, 0x80, 0x81, 0xcb, 0x80, 0x2, 0x0, 0x800, 0x2240, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000500), 0x9}, 0x401, 0x2, 0x0, 0x3, 0xffffffff, 0xffff, 0x7, 0x0, 0x6, 0x0, 0x200}, r5, 0xa, 0xffffffffffffffff, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0], 0x0, 0x96, &(0x7f00000007c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x9c, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)=@o_path={&(0x7f0000000a00)='./file0\x00', 0x0, 0x4000}, 0x18) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r2, 0x5, 0x10}, 0xc) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x15, 0x5, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, [@cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000600)='GPL\x00', 0x6, 0x1b, &(0x7f0000000640)=""/27, 0x40f00, 0x1, '\x00', r3, 0xb, r1, 0x8, &(0x7f0000000680)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0xf, 0x4, 0x2}, 0x10, r7, r1, 0x1, &(0x7f0000000ac0)=[r4, r8, 0x1, r1, r1, r4, r4, 0xffffffffffffffff, r4, r9], &(0x7f0000000b00)=[{0x1, 0x2, 0x5, 0x4}], 0x10, 0x7ff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000ec0)={r1, 0x58, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0xa, 0x1e, &(0x7f0000000c00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x101}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@jmp={0x5, 0x0, 0xb, 0x8, 0x8, 0xc, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @jmp={0x5, 0x0, 0x2, 0x5, 0x0, 0x0, 0x4}, @ldst={0x3, 0x0, 0x2, 0x2, 0x9, 0x80, 0x4}, @jmp={0x5, 0x0, 0x9, 0x8, 0x3, 0x80, 0xfffffffffffffff0}, @map_idx_val={0x18, 0xf, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2}, @generic={0x7, 0xe, 0x7, 0x2, 0x3}, @jmp={0x5, 0x1, 0x7, 0x3, 0xb, 0x40, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000d00)='GPL\x00', 0x8, 0xd9, &(0x7f0000000d40)=""/217, 0x40f00, 0x3, '\x00', r11, 0x6, r1, 0x8, &(0x7f0000000f00)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000f40)={0x5, 0x8, 0x1, 0x3ba3}, 0x10, r7, r10, 0x0, &(0x7f0000000f80)=[r8], 0x0, 0x10, 0x8}, 0x90) r12 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001080)={r6}, 0x4) write$cgroup_int(r1, &(0x7f00000010c0)=0x7ff, 0x12) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@generic={&(0x7f0000001100)='./file0/file0\x00', 0x0, 0x18}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001240)={r13, &(0x7f0000001180)="e288a795adefecb21ddf28239551e0707e8932e3519fdf6ea1092990277cfc341d341dd32d4ff9610e5213dfcf98eaf771c9e8a1ec99f08f2d6d48ae811983fe81205f4302fbbbfdfdabd151482aa73268890f14245e8f21943b70eb21aed28305d905", &(0x7f0000001200)=""/1}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001380)={@map=r8, 0x24, 0x0, 0x0, &(0x7f0000001280)=[0x0], 0x1, 0x0, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001340)=[0x0, 0x0]}, 0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001440)=@o_path={&(0x7f00000013c0)='./file0\x00', 0x0, 0x0, r14}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001480)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001540)={r12, 0x58, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$MAP_CREATE(0x0, &(0x7f0000001580)=@bloom_filter={0x1e, 0x2, 0x3ff, 0x4, 0x10, r1, 0x0, '\x00', r15, 0xffffffffffffffff, 0x1, 0x5, 0x1, 0x5}, 0x48) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000001600)=""/14) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001640)={r1, r16}, 0xc) 0s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000000000000110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000702000000feffff7a0af0ff0000000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001010402000000000000b7030000000000006a0a00fe000000008500000032000000b700000001000000950000000000000075cdc4b57b0c65752a3ad50000007ddd0000cb4500639100f51f00000000000000ff7f0000002f17cee19d0001000000000000000000cb04fcbb0b9bafe3ba431351a58a885be602000000000000d11b6b9f6cf7db6d574620260000000000008062d77e84cef4a2ab938f65aac33c4d620de2c9b7dc2695ed094bd09b52680910d7d313f9f57606b83b994fb484510bef2e48f5f5c2fe6faaf75e5cc4051ade12f41deff6df6a936b4ec3827c739bb39aad16d875fe369258673b5df11cc2afb53611cc320000bc0b80e80e3c990b27da0f99c0a052fc8f5e64be2c9d2d29db3d36dd015c7bd3f15aa6aadbeab2a01685108e61aaffe400000000000000000000008b798b4f5458d1863cc67c4c6a06e828e5216f601b19db1af1b5d356d0f072137d866d11be4ba3f0151f07bd4e97d62ecc645e143a76f1c6edc76609077909826151e2b42bf0ed0c7e8b0db51662de6d87c493db845b10881eb8c9cfa72b08eecc952a3fd2c46f3c1cde71a19d1a2982492a210e00d2bfea3b8d188df2eff8d56aaae7d32a2e183722537395f69e02ec4b85f6aad7faca088de9b26797a8446b16c28d85f225992dbdd5bb01ba51508951c7a7d6ca0916c3a12912715649c2b1c7192a4251b59d378d060da48c7957e1226c9129a7c5f8ee5f50579e2f638f7eb12f63be72a3d817b324d6e417b1c2cbfdcada0a16e31790e26cf1010000805f6ee2782224cf30f810da86cf1a3204f4c9404f5d7321a4fefc4d1c9139ca4b65b99909950000006b4207e6078625cb2717e21f8f187b1866108b6e8c71e26032176066599783568628f0309c3afa716d3706e1fa89917e131f4034a8387e99c3568fd04201b37cd92ca6d2676bef8310f7032775cfd75652f87b039d543000000000000000008ce31344b554aca78a00000000000000e63a0dba7f6b25e8d5e40a3ae01a5dfde3b4dca2f38a9c0ea7b5bcd49f977c609915c7601080d10b96af1eb55922765313a0eeefae505f4535cd9dc69fbab92150c7e74e5c5b051ddf6399b0d00eee5c3afee38cdc55b8d3fbbe210bdec686a23503f4a547327caf381171cc9002be6d89f5734a9e204dbc0000c8f9851d273fa07369c419942509198605ff2781f4d2d4685d762d4764f7ff762e09116946137b7ab812a2d408ae4c53b3dcd3ab82f187bf77779d035818e562bf2737acf0412b217aa0d530438c101979312cbdb013c2f26afc26375d6e325e583e000000006a362b45436ae09a61859607693dfc004ea20306d00592e3ebd5093e4605e935378deef98e88ff2e203154a12efdf54805dd02055bcbb5d7334124a8bb777e7229f404e34572324ea33b024b0d54342f7e630e"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x1f2f, 0x241, 0x38f, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_da_write_pages_extent\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x90) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f2, &(0x7f0000000080)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.22' (ED25519) to the list of known hosts. 2024/06/24 03:16:26 fuzzer started 2024/06/24 03:16:26 dialing manager at 10.128.0.163:30014 [ 18.582682][ T28] audit: type=1400 audit(1719198986.152:66): avc: denied { node_bind } for pid=282 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 18.585559][ T28] audit: type=1400 audit(1719198986.152:67): avc: denied { name_bind } for pid=282 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 18.617929][ T28] audit: type=1400 audit(1719198986.192:68): avc: denied { mounton } for pid=291 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 18.627067][ T291] cgroup: Unknown subsys name 'net' [ 18.647294][ T291] cgroup: Unknown subsys name 'devices' [ 18.654052][ T28] audit: type=1400 audit(1719198986.192:69): avc: denied { mounton } for pid=292 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 18.680778][ T28] audit: type=1400 audit(1719198986.192:70): avc: denied { mount } for pid=292 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 18.703764][ T28] audit: type=1400 audit(1719198986.192:71): avc: denied { setattr } for pid=293 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=166 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 18.710404][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 18.726684][ T28] audit: type=1400 audit(1719198986.192:72): avc: denied { mount } for pid=291 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.757187][ T28] audit: type=1400 audit(1719198986.222:73): avc: denied { unmount } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.777276][ T28] audit: type=1400 audit(1719198986.302:74): avc: denied { relabelto } for pid=299 comm="mkswap" name="swap-file" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.785620][ T296] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 18.802500][ T28] audit: type=1400 audit(1719198986.302:75): avc: denied { write } for pid=299 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.927273][ T291] cgroup: Unknown subsys name 'hugetlb' [ 18.932719][ T291] cgroup: Unknown subsys name 'rlimit' 2024/06/24 03:16:26 starting 5 executor processes [ 19.980121][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.987029][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.994262][ T308] device bridge_slave_0 entered promiscuous mode [ 20.029488][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.036536][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.043813][ T308] device bridge_slave_1 entered promiscuous mode [ 20.083873][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.090758][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.097928][ T309] device bridge_slave_0 entered promiscuous mode [ 20.122906][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.129795][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.137018][ T309] device bridge_slave_1 entered promiscuous mode [ 20.187446][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.194289][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.201608][ T312] device bridge_slave_0 entered promiscuous mode [ 20.209716][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.216599][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.223812][ T312] device bridge_slave_1 entered promiscuous mode [ 20.255123][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.262007][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.269269][ T311] device bridge_slave_0 entered promiscuous mode [ 20.287598][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.294524][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.301814][ T311] device bridge_slave_1 entered promiscuous mode [ 20.310399][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.317283][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.324352][ T313] device bridge_slave_0 entered promiscuous mode [ 20.347817][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.354646][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.362029][ T313] device bridge_slave_1 entered promiscuous mode [ 20.394950][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.401814][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.408895][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.415690][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.485384][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.492481][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.501138][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.508404][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.539381][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.547887][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.556480][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.563392][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.570612][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.578669][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.585513][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.592675][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.600490][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.624076][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.631943][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.639321][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.649554][ T308] device veth0_vlan entered promiscuous mode [ 20.710972][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.736391][ T308] device veth1_macvtap entered promiscuous mode [ 20.767361][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.775453][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.784309][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.791688][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.800436][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.808500][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.815342][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.822590][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.830566][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.837400][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.844652][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.852680][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.859517][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.866716][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.874626][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.881381][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.888944][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.896499][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.921531][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.929298][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.937115][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.944813][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.952648][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.965573][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 20.973856][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.982404][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.989261][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.996463][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.004520][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.012850][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.020957][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.028931][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.035791][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.059529][ T311] device veth0_vlan entered promiscuous mode [ 21.069777][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.077447][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.086170][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.094407][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.105273][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.115881][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.123716][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.131692][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.139520][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.153472][ T312] device veth0_vlan entered promiscuous mode [ 21.167470][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.174749][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.182478][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.190895][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.209817][ T312] device veth1_macvtap entered promiscuous mode [ 21.222625][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.230131][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.237505][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.244653][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.252822][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.260994][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.268931][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.275796][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.283030][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.291242][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.299153][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.305989][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.313208][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.321210][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.329128][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.336633][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.344496][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.358365][ T311] device veth1_macvtap entered promiscuous mode [ 21.364713][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.372356][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.395780][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.403837][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.412039][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.420087][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.428217][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.436226][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.444257][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.451961][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.459652][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.467544][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.475224][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.483262][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.491307][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.499233][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.506966][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.514934][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.523424][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.530732][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.538848][ T309] device veth0_vlan entered promiscuous mode [ 21.576521][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.587113][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.607117][ T313] device veth0_vlan entered promiscuous mode [ 21.622839][ T309] device veth1_macvtap entered promiscuous mode [ 21.645783][ C0] hrtimer: interrupt took 12029 ns [ 21.674961][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.687489][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.760595][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.768482][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.776369][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.788483][ T313] device veth1_macvtap entered promiscuous mode [ 21.802641][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.810014][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.817606][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.830188][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.838945][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.917503][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.005381][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.013565][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.022001][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.130569][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.162468][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.238336][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.249151][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.321969][ T470] bridge0: port 3(syz_tun) entered blocking state [ 23.360332][ T470] bridge0: port 3(syz_tun) entered disabled state [ 23.375035][ T470] device syz_tun entered promiscuous mode [ 23.393185][ T470] bridge0: port 3(syz_tun) entered blocking state [ 23.399456][ T470] bridge0: port 3(syz_tun) entered forwarding state [ 23.617409][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 23.617423][ T28] audit: type=1400 audit(1719198991.192:108): avc: denied { create } for pid=490 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 23.727440][ T28] audit: type=1400 audit(1719198991.222:109): avc: denied { write } for pid=494 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 23.897285][ T515] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 24.012453][ T530] bridge0: port 4(team_slave_1) entered blocking state [ 24.020734][ T530] bridge0: port 4(team_slave_1) entered disabled state [ 24.028676][ T530] device team_slave_1 entered promiscuous mode [ 24.549206][ T28] audit: type=1400 audit(1719198992.122:110): avc: denied { create } for pid=569 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 24.942287][ T28] audit: type=1400 audit(1719198992.512:111): avc: denied { read } for pid=611 comm="syz-executor.0" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 24.970689][ T28] audit: type=1400 audit(1719198992.512:112): avc: denied { open } for pid=611 comm="syz-executor.0" path="/dev/ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.172240][ T639] bond_slave_1: mtu less than device minimum [ 25.340798][ T28] audit: type=1400 audit(1719198992.912:113): avc: denied { read } for pid=663 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.141531][ T712] syz-executor.3[712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.141600][ T712] syz-executor.3[712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.864339][ T756] syz-executor.1 (756) used greatest stack depth: 20376 bytes left [ 26.910317][ T779] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 27.002424][ T28] audit: type=1400 audit(1719198994.572:114): avc: denied { setopt } for pid=778 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.781683][ T28] audit: type=1400 audit(1719198995.332:115): avc: denied { getattr } for pid=847 comm="syz-executor.3" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 27.807288][ T852] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 1025 (only 8 groups) [ 27.932958][ T28] audit: type=1400 audit(1719198995.422:116): avc: denied { create } for pid=854 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 28.499061][ T889] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 1025 (only 8 groups) [ 28.984675][ T28] audit: type=1400 audit(1719198996.552:117): avc: denied { create } for pid=902 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 29.257449][ T919] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 1025 (only 8 groups) [ 29.379929][ T28] audit: type=1400 audit(1719198996.952:118): avc: denied { create } for pid=915 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 29.786201][ T967] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 1025 (only 8 groups) [ 30.080410][ T991] syz-executor.1[991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.080512][ T991] syz-executor.1[991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.129516][ T28] audit: type=1400 audit(1719198997.702:119): avc: denied { ioctl } for pid=1000 comm="syz-executor.0" path="/dev/ppp" dev="devtmpfs" ino=138 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.248350][ T1019] Illegal XDP return value 4291006592 on prog (id 423) dev N/A, expect packet loss! [ 31.121887][ T28] audit: type=1400 audit(1719198998.692:120): avc: denied { create } for pid=1043 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 31.178721][ T1049] syz-executor.0[1049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.178788][ T1049] syz-executor.0[1049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.577180][ T1063] device syzkaller0 entered promiscuous mode [ 31.741480][ T28] audit: type=1400 audit(1719198999.312:121): avc: denied { ioctl } for pid=1074 comm="syz-executor.3" path="net:[4026532385]" dev="nsfs" ino=4026532385 ioctlcmd=0x5828 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 31.882817][ T1083] device veth1_macvtap left promiscuous mode [ 31.951479][ T1083] device veth1_macvtap entered promiscuous mode [ 32.018163][ T1083] device macsec0 entered promiscuous mode [ 34.064986][ T1171] device pim6reg1 entered promiscuous mode [ 34.430782][ T1198] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 35.912866][ T1247] device syzkaller0 entered promiscuous mode [ 37.149095][ T28] audit: type=1400 audit(1719199004.722:122): avc: denied { create } for pid=1316 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 38.529423][ T1417] device syzkaller0 entered promiscuous mode [ 38.807651][ T1447] device pim6reg1 entered promiscuous mode [ 38.885715][ T1455] device wg2 entered promiscuous mode [ 39.303923][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 40.311033][ T1547] Â: renamed from pim6reg1 [ 40.923472][ T1579] device pim6reg1 entered promiscuous mode [ 42.079976][ T1662] device pim6reg1 entered promiscuous mode [ 42.850623][ T1732] bridge0: port 3(team_slave_1) entered blocking state [ 42.952109][ T1732] bridge0: port 3(team_slave_1) entered disabled state [ 43.001231][ T1732] device team_slave_1 entered promiscuous mode [ 43.056365][ T1738] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 1 (only 8 groups) [ 45.100527][ T1814] device syzkaller0 entered promiscuous mode [ 46.113987][ T28] audit: type=1400 audit(1719199013.682:123): avc: denied { create } for pid=1863 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 46.669629][ T28] audit: type=1400 audit(1719199014.242:124): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 46.822496][ T1896] device syzkaller0 entered promiscuous mode [ 47.036257][ T1913] device pim6reg1 entered promiscuous mode [ 47.449517][ T28] audit: type=1400 audit(1719199015.022:125): avc: denied { create } for pid=1934 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 48.407498][ T1974] Â: renamed from pim6reg1 [ 49.305316][ T2028] device pim6reg1 entered promiscuous mode [ 50.181619][ T2085] device syzkaller0 entered promiscuous mode [ 50.765404][ T2123] syz-executor.1[2123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.765467][ T2123] syz-executor.1[2123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.812665][ T2123] syz-executor.1[2123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.844588][ T2123] syz-executor.1[2123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.875932][ T2140] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 50.914504][ T2139] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.921545][ T2139] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.969524][ T2139] device bridge_slave_1 left promiscuous mode [ 51.005547][ T2139] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.044301][ T2150] syz-executor.0[2150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.044375][ T2150] syz-executor.0[2150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.056235][ T2139] device bridge_slave_0 left promiscuous mode [ 51.166097][ T2139] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.676720][ T2217] syz-executor.2 (2217) used greatest stack depth: 18352 bytes left [ 54.773496][ T2240] syz-executor.2[2240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.773552][ T2240] syz-executor.2[2240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.798452][ T2234] device syzkaller0 entered promiscuous mode [ 54.822766][ T2240] syz-executor.2[2240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.822819][ T2240] syz-executor.2[2240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.073121][ T2263] FAULT_INJECTION: forcing a failure. [ 55.073121][ T2263] name failslab, interval 1, probability 0, space 0, times 0 [ 55.106860][ T2263] CPU: 1 PID: 2263 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 55.116764][ T2263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 55.126671][ T2263] Call Trace: [ 55.129783][ T2263] [ 55.132560][ T2263] dump_stack_lvl+0x151/0x1b7 [ 55.137248][ T2263] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 55.142541][ T2263] ? mls_context_isvalid+0xaa/0x3b0 [ 55.147576][ T2263] ? policydb_context_isvalid+0x1de/0x430 [ 55.153130][ T2263] dump_stack+0x15/0x1b [ 55.157121][ T2263] should_fail_ex+0x3d0/0x520 [ 55.161652][ T2263] __should_failslab+0xaf/0xf0 [ 55.166237][ T2263] should_failslab+0x9/0x20 [ 55.170572][ T2263] slab_pre_alloc_hook+0x2e/0x1b0 [ 55.175434][ T2263] kmem_cache_alloc_lru+0x49/0x220 [ 55.180385][ T2263] ? ext4_alloc_inode+0x2e/0x650 [ 55.185157][ T2263] ext4_alloc_inode+0x2e/0x650 [ 55.189753][ T2263] ? ext4_group_desc_free+0x110/0x110 [ 55.194964][ T2263] new_inode_pseudo+0x65/0x1d0 [ 55.199562][ T2263] new_inode+0x28/0x1c0 [ 55.203555][ T2263] ? avc_denied+0x1b0/0x1b0 [ 55.207893][ T2263] __ext4_new_inode+0x2a6/0x40a0 [ 55.212669][ T2263] ? memset+0x35/0x40 [ 55.216485][ T2263] ? __dquot_initialize+0x244/0xe10 [ 55.221520][ T2263] ? ext4_has_group_desc_csum+0x1f0/0x1f0 [ 55.227079][ T2263] ? dquot_initialize+0x20/0x20 [ 55.231764][ T2263] ? may_create+0x65a/0x900 [ 55.236104][ T2263] ext4_mkdir+0x421/0xce0 [ 55.240272][ T2263] ? ext4_symlink+0xc10/0xc10 [ 55.244782][ T2263] ? selinux_inode_mkdir+0x22/0x30 [ 55.249727][ T2263] ? security_inode_mkdir+0xbc/0x100 [ 55.254911][ T2263] vfs_mkdir+0x398/0x570 [ 55.258928][ T2263] do_mkdirat+0x1eb/0x450 [ 55.263094][ T2263] ? vfs_mkdir+0x570/0x570 [ 55.267344][ T2263] ? getname_flags+0x1fd/0x520 [ 55.271945][ T2263] __x64_sys_mkdir+0x6e/0x80 [ 55.276372][ T2263] do_syscall_64+0x3d/0xb0 [ 55.280623][ T2263] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 55.286350][ T2263] RIP: 0033:0x7f817267d0a9 [ 55.290607][ T2263] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 55.310048][ T2263] RSP: 002b:00007f81734240c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 55.318293][ T2263] RAX: ffffffffffffffda RBX: 00007f81727b3f80 RCX: 00007f817267d0a9 [ 55.326106][ T2263] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000240 [ 55.333914][ T2263] RBP: 00007f8173424120 R08: 0000000000000000 R09: 0000000000000000 [ 55.341724][ T2263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 55.349534][ T2263] R13: 000000000000000b R14: 00007f81727b3f80 R15: 00007ffdeb0ef068 [ 55.357353][ T2263] [ 56.406371][ T2319] device pim6reg1 entered promiscuous mode [ 56.499586][ T28] audit: type=1400 audit(1719199024.072:126): avc: denied { create } for pid=2325 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 57.621585][ T2366] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.678903][ T2366] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.734409][ T2366] device bridge_slave_0 entered promiscuous mode [ 57.824551][ T2366] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.857617][ T2366] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.921623][ T2366] device bridge_slave_1 entered promiscuous mode [ 58.057510][ T379] device team_slave_1 left promiscuous mode [ 58.063288][ T379] bridge0: port 3(team_slave_1) entered disabled state [ 58.091878][ T379] device bridge_slave_1 left promiscuous mode [ 58.097868][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.119842][ T379] device bridge_slave_0 left promiscuous mode [ 58.128866][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.141959][ T379] device veth1_macvtap left promiscuous mode [ 58.155591][ T379] device veth0_vlan left promiscuous mode [ 58.533692][ T2444] device veth0_vlan left promiscuous mode [ 58.541118][ T2444] device veth0_vlan entered promiscuous mode [ 58.553022][ T2455] Â: renamed from pim6reg1 [ 58.680303][ T2463] bpf_get_probe_write_proto: 2 callbacks suppressed [ 58.680320][ T2463] syz-executor.1[2463] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.687335][ T2463] syz-executor.1[2463] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.081800][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.212171][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.283247][ T1007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.303097][ T1007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.311753][ T1007] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.318616][ T1007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.332979][ T1007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.351380][ T1007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.359720][ T1007] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.366590][ T1007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.374087][ T1007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 59.382841][ T1007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.402386][ T2366] device veth0_vlan entered promiscuous mode [ 59.410503][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.418738][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 59.426707][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.434609][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 59.442928][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 59.452403][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 59.460706][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.473008][ T1007] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.481841][ T1007] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.493473][ T2366] device veth1_macvtap entered promiscuous mode [ 59.506238][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 59.520534][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 59.529517][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 59.547414][ T28] audit: type=1400 audit(1719199027.122:127): avc: denied { mounton } for pid=2366 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 59.592030][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 59.603234][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 59.663350][ T2510] Â: renamed from pim6reg1 [ 59.726655][ T2516] syz-executor.1[2516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.726695][ T2516] syz-executor.1[2516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.742440][ T2516] syz-executor.1[2516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.759142][ T2516] syz-executor.1[2516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.962914][ T2555] syz-executor.2[2555] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.026306][ T2555] syz-executor.2[2555] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.058458][ T2558] syz-executor.2[2558] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.077195][ T2558] syz-executor.2[2558] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.040796][ T28] audit: type=1400 audit(1719199029.612:128): avc: denied { create } for pid=2677 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 62.203853][ T2676] device sit0 entered promiscuous mode [ 62.796511][ T2721] device pim6reg1 entered promiscuous mode [ 64.005485][ C0] sched: RT throttling activated [ 64.350018][ T2737] device sit0 entered promiscuous mode [ 65.642822][ T2787] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) [ 65.877609][ T28] audit: type=1400 audit(1719199033.452:129): avc: denied { create } for pid=2812 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 65.927874][ T2818] bpf_get_probe_write_proto: 2 callbacks suppressed [ 65.927892][ T2818] syz-executor.0[2818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.934386][ T2818] syz-executor.0[2818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.050204][ T2820] device sit0 entered promiscuous mode [ 66.102712][ T2826] device veth1_macvtap left promiscuous mode [ 66.165825][ T28] audit: type=1400 audit(1719199033.742:130): avc: denied { tracepoint } for pid=2833 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 70.191589][ T2877] syz-executor.3[2877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.191662][ T2877] syz-executor.3[2877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.318171][ T2892] syz-executor.3[2892] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.425802][ T2892] syz-executor.3[2892] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.136601][ T2950] bridge0: port 5(dummy0) entered blocking state [ 74.141768][ T28] audit: type=1400 audit(1719199041.712:131): avc: denied { ioctl } for pid=2949 comm="syz-executor.2" path="socket:[23013]" dev="sockfs" ino=23013 ioctlcmd=0x89a2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 74.208750][ T2950] bridge0: port 5(dummy0) entered disabled state [ 74.220102][ T2950] device dummy0 entered promiscuous mode [ 74.226504][ T2950] bridge0: port 5(dummy0) entered blocking state [ 74.232649][ T2950] bridge0: port 5(dummy0) entered forwarding state [ 75.468397][ T3027] syz-executor.3[3027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.468468][ T3027] syz-executor.3[3027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.637833][ T3082] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.656286][ T3082] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.668248][ T3082] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.675128][ T3082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.682233][ T3082] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.689083][ T3082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.696495][ T3082] device bridge0 entered promiscuous mode [ 77.057548][ T3122] bond_slave_1: mtu less than device minimum [ 77.085976][ T3122] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 77.201698][ T28] audit: type=1400 audit(1719199044.772:132): avc: denied { create } for pid=3134 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 78.159668][ T3179] device pim6reg1 entered promiscuous mode [ 78.461917][ T3209] Â: renamed from pim6reg1 [ 80.924086][ T3337] syz-executor.1[3337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.924154][ T3337] syz-executor.1[3337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.069372][ T3341] syz-executor.1[3341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.086463][ T3341] syz-executor.1[3341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.231474][ T3382] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.250660][ T3382] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.596231][ T3412] syzkaller0: refused to change device tx_queue_len [ 82.611947][ T3423] syz-executor.1[3423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.612010][ T3423] syz-executor.1[3423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.619963][ T3424] syz-executor.1[3424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.644736][ T3424] syz-executor.1[3424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.002355][ T3448] €Â: renamed from pim6reg1 [ 83.557980][ T28] audit: type=1400 audit(1719199051.132:133): avc: denied { setattr } for pid=3485 comm="syz-executor.1" path="/dev/ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 84.006698][ T3506] bond_slave_1: mtu less than device minimum [ 84.603577][ T3544] device syzkaller0 entered promiscuous mode [ 84.909030][ T3578] syz-executor.4[3578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.909091][ T3578] syz-executor.4[3578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.341013][ T28] audit: type=1400 audit(1719199052.912:134): avc: denied { create } for pid=3627 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 86.191820][ T3683] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 86.203199][ T3681] bpf_get_probe_write_proto: 2 callbacks suppressed [ 86.203221][ T3681] syz-executor.3[3681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.209911][ T3681] syz-executor.3[3681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.696862][ T28] audit: type=1400 audit(1719199054.272:135): avc: denied { create } for pid=3712 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 86.809343][ T28] audit: type=1400 audit(1719199054.302:136): avc: denied { setopt } for pid=3712 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 86.988118][ T3723] device veth1_macvtap left promiscuous mode [ 86.993932][ T3723] device macsec0 entered promiscuous mode [ 87.096907][ T3729] device veth1_macvtap entered promiscuous mode [ 87.235429][ T3739] syz-executor.1[3739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.235595][ T3739] syz-executor.1[3739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.407434][ T28] audit: type=1400 audit(1719199054.982:137): avc: denied { read } for pid=3749 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 87.507291][ T28] audit: type=1400 audit(1719199055.032:138): avc: denied { write } for pid=3749 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 88.308745][ T3776] syz-executor.4[3776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.308810][ T3776] syz-executor.4[3776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.676986][ T3805] bridge0: port 3(veth1_macvtap) entered blocking state [ 88.702775][ T3805] bridge0: port 3(veth1_macvtap) entered disabled state [ 89.243034][ T3879] device pim6reg1 entered promiscuous mode [ 90.620833][ T3979] syz-executor.0[3979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.620899][ T3979] syz-executor.0[3979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.580508][ T4012] device syzkaller0 entered promiscuous mode [ 92.040231][ T4061] syz-executor.0[4061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.040521][ T4061] syz-executor.0[4061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.004026][ T4142] device syzkaller0 entered promiscuous mode [ 98.647630][ T4159] device syzkaller0 entered promiscuous mode [ 98.657106][ T28] audit: type=1400 audit(1719199066.232:139): avc: denied { create } for pid=4168 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 99.143365][ T4198] device syzkaller0 entered promiscuous mode [ 99.226637][ T4193] bridge0: port 3(team_slave_1) entered blocking state [ 99.233409][ T4193] bridge0: port 3(team_slave_1) entered disabled state [ 99.259579][ T4193] device team_slave_1 entered promiscuous mode [ 99.458589][ T4212] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 99.757262][ T4224] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 100.012774][ T4259] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.020285][ T4259] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.028181][ T4259] device bridge0 left promiscuous mode [ 100.054774][ T28] audit: type=1400 audit(1719199067.622:140): avc: denied { create } for pid=4258 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 100.057767][ T4259] device bridge_slave_1 left promiscuous mode [ 100.075042][ T28] audit: type=1400 audit(1719199067.622:141): avc: denied { create } for pid=4258 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 100.103433][ T4259] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.118978][ T4259] device bridge_slave_0 left promiscuous mode [ 100.125279][ T4259] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.383946][ T4276] syzkaller0: refused to change device tx_queue_len [ 100.631645][ T4308] syz-executor.0[4308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.631714][ T4308] syz-executor.0[4308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.208080][ T4347] bond_slave_1: mtu greater than device maximum [ 102.826733][ T4446] device pim6reg1 entered promiscuous mode [ 104.812990][ T4531] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.858764][ T4531] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.895818][ T4531] device bridge_slave_0 entered promiscuous mode [ 104.931605][ T4531] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.942338][ T4531] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.967621][ T4531] device bridge_slave_1 entered promiscuous mode [ 105.186421][ T4531] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.193296][ T4531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.200405][ T4531] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.207186][ T4531] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.235474][ T1017] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.243612][ T1017] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.252984][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 105.261512][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.299871][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.328003][ T330] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.334841][ T330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.342378][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.352832][ T330] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.359696][ T330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.376913][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.392222][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.428555][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 105.472228][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.482500][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.497126][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.517249][ T4531] device veth0_vlan entered promiscuous mode [ 105.563291][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 105.584566][ T4531] device veth1_macvtap entered promiscuous mode [ 105.604739][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 105.630587][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 105.827555][ T4581] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.838423][ T4581] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.846434][ T4581] device bridge_slave_0 entered promiscuous mode [ 105.855901][ T4581] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.862929][ T4581] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.870607][ T4581] device bridge_slave_1 entered promiscuous mode [ 106.019297][ T379] device bridge_slave_1 left promiscuous mode [ 106.026434][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.035266][ T379] device bridge_slave_0 left promiscuous mode [ 106.087230][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.095914][ T379] device veth1_macvtap left promiscuous mode [ 106.110862][ T379] device veth0_vlan left promiscuous mode [ 106.390766][ T4581] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.397656][ T4581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.404743][ T4581] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.411540][ T4581] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.435357][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.449999][ T2547] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.460052][ T2547] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.486755][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.494790][ T2547] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.501676][ T2547] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.685840][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.743285][ T2547] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.750356][ T2547] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.774947][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.784596][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 106.884318][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 106.906067][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 106.974360][ T4581] device veth0_vlan entered promiscuous mode [ 106.994252][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 107.005127][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.066566][ T4581] device veth1_macvtap entered promiscuous mode [ 107.096471][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.116451][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 107.127247][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 107.135283][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 107.144346][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 107.178473][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 107.188030][ T4670] syz-executor.3[4670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.188133][ T4670] syz-executor.3[4670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.200383][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 107.221276][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 107.229575][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 107.280414][ T4664] device pim6reg1 entered promiscuous mode [ 107.441862][ T4677] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 107.862817][ T340] device bridge_slave_1 left promiscuous mode [ 107.868939][ T340] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.876805][ T340] device bridge_slave_0 left promiscuous mode [ 107.882901][ T340] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.903503][ T340] device veth1_macvtap left promiscuous mode [ 107.911927][ T340] device veth0_vlan left promiscuous mode [ 108.133365][ T4728] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.140462][ T4728] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.223423][ T4697] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.249955][ T4697] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.258859][ T4697] device bridge_slave_0 entered promiscuous mode [ 108.265941][ T4697] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.272924][ T4697] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.280802][ T4697] device bridge_slave_1 entered promiscuous mode [ 108.379642][ T4756] syz-executor.0[4756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.379704][ T4756] syz-executor.0[4756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.450694][ T28] audit: type=1400 audit(1719199076.022:142): avc: denied { create } for pid=4761 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 108.550485][ T4697] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.557377][ T4697] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.564620][ T4697] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.571517][ T4697] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.662940][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.676597][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 108.685013][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.730971][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 108.790713][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.797591][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.862742][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.879695][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 108.897796][ T4791] device pim6reg1 entered promiscuous mode [ 108.908628][ T4697] device veth0_vlan entered promiscuous mode [ 108.915710][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 108.924156][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 108.933466][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 108.955902][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.988541][ T4697] device veth1_macvtap entered promiscuous mode [ 109.017101][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.024461][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.032734][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 109.041919][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 109.050209][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 109.058050][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 109.067102][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 109.075427][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 109.083909][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 109.723511][ T2089] device bridge_slave_1 left promiscuous mode [ 109.738823][ T2089] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.746261][ T2089] device bridge_slave_0 left promiscuous mode [ 109.756063][ T2089] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.764157][ T2089] device veth1_macvtap left promiscuous mode [ 109.770259][ T2089] device veth0_vlan left promiscuous mode [ 109.972257][ T4837] bond_slave_1: mtu less than device minimum [ 110.124688][ T4831] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.133302][ T4831] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.147810][ T4831] device bridge_slave_0 entered promiscuous mode [ 110.154695][ T4831] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.164170][ T4831] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.175835][ T4831] device bridge_slave_1 entered promiscuous mode [ 110.289102][ T4874] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.296205][ T4874] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.303893][ T4874] device bridge_slave_0 entered promiscuous mode [ 110.311873][ T4831] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.318749][ T4831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.325847][ T4831] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.332622][ T4831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.340597][ T4874] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.347967][ T4874] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.355707][ T4874] device bridge_slave_1 entered promiscuous mode [ 110.413496][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.421757][ T331] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.429298][ T331] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.456236][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 110.465860][ T330] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.472732][ T330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.481248][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.489298][ T330] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.496162][ T330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.545576][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 110.554065][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 110.606472][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 110.679218][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.687170][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.694509][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.702889][ T4831] device veth0_vlan entered promiscuous mode [ 110.774323][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 110.791504][ T4831] device veth1_macvtap entered promiscuous mode [ 110.809157][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 110.818334][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.878466][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 110.886738][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 110.894748][ T1017] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.901608][ T1017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.909914][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.917984][ T1017] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.924840][ T1017] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.946480][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 110.959771][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 110.969551][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 110.986231][ T4924] bond_slave_1: mtu greater than device maximum [ 111.020282][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 111.085809][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 111.098435][ T4874] device veth0_vlan entered promiscuous mode [ 111.123219][ T4874] device veth1_macvtap entered promiscuous mode [ 111.167490][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 111.175366][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.219590][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 111.252231][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 111.284971][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 111.316037][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 111.355082][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 111.445376][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 111.458248][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 111.512475][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 111.566252][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 111.604714][ T2089] device veth1_macvtap left promiscuous mode [ 111.875591][ T4931] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.946057][ T4931] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.995081][ T4931] device bridge_slave_0 entered promiscuous mode [ 112.005545][ T4931] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.013159][ T4931] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.020663][ T4931] device bridge_slave_1 entered promiscuous mode [ 112.245711][ T4979] FAULT_INJECTION: forcing a failure. [ 112.245711][ T4979] name failslab, interval 1, probability 0, space 0, times 0 [ 112.403393][ T4979] CPU: 0 PID: 4979 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 112.413286][ T4979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 112.423186][ T4979] Call Trace: [ 112.426736][ T4979] [ 112.429511][ T4979] dump_stack_lvl+0x151/0x1b7 [ 112.434027][ T4979] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 112.439318][ T4979] ? write_boundary_block+0xb0/0xb0 [ 112.444355][ T4979] dump_stack+0x15/0x1b [ 112.448343][ T4979] should_fail_ex+0x3d0/0x520 [ 112.452857][ T4979] ? jbd2__journal_start+0x150/0x720 [ 112.457976][ T4979] __should_failslab+0xaf/0xf0 [ 112.462578][ T4979] should_failslab+0x9/0x20 [ 112.466916][ T4979] kmem_cache_alloc+0x3b/0x2c0 [ 112.471517][ T4979] jbd2__journal_start+0x150/0x720 [ 112.476464][ T4979] __ext4_journal_start_sb+0x24d/0x4b0 [ 112.481757][ T4979] __ext4_new_inode+0x135d/0x40a0 [ 112.486636][ T4979] ? ext4_has_group_desc_csum+0x1f0/0x1f0 [ 112.492172][ T4979] ? dquot_initialize+0x20/0x20 [ 112.496860][ T4979] ? may_create+0x65a/0x900 [ 112.501291][ T4979] ext4_mkdir+0x421/0xce0 [ 112.505455][ T4979] ? ext4_symlink+0xc10/0xc10 [ 112.509965][ T4979] ? selinux_inode_mkdir+0x22/0x30 [ 112.514911][ T4979] ? security_inode_mkdir+0xbc/0x100 [ 112.520034][ T4979] vfs_mkdir+0x398/0x570 [ 112.524115][ T4979] do_mkdirat+0x1eb/0x450 [ 112.528281][ T4979] ? vfs_mkdir+0x570/0x570 [ 112.532541][ T4979] ? getname_flags+0x1fd/0x520 [ 112.537130][ T4979] __x64_sys_mkdir+0x6e/0x80 [ 112.541557][ T4979] do_syscall_64+0x3d/0xb0 [ 112.545810][ T4979] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 112.551537][ T4979] RIP: 0033:0x7fe69ba7d0a9 [ 112.555790][ T4979] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 112.575235][ T4979] RSP: 002b:00007fe69c8950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 112.583476][ T4979] RAX: ffffffffffffffda RBX: 00007fe69bbb3f80 RCX: 00007fe69ba7d0a9 [ 112.591288][ T4979] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000240 [ 112.599100][ T4979] RBP: 00007fe69c895120 R08: 0000000000000000 R09: 0000000000000000 [ 112.606910][ T4979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 112.614720][ T4979] R13: 000000000000000b R14: 00007fe69bbb3f80 R15: 00007ffddbe25338 [ 112.622538][ T4979] [ 112.706610][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 112.713913][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 112.726630][ T4979] EXT4-fs error (device sda1) in __ext4_new_inode:1084: Out of memory [ 112.799755][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 112.825992][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 112.859703][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.866589][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.873816][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.882236][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.890476][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.897336][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.905010][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 112.926157][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.946220][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 112.993700][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.013249][ T4931] device veth0_vlan entered promiscuous mode [ 113.024655][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 113.032739][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.058421][ T4931] device veth1_macvtap entered promiscuous mode [ 113.088371][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.157715][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 113.165294][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 113.173572][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 113.181776][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 113.189391][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 113.197730][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 113.268671][ T2089] device bridge_slave_1 left promiscuous mode [ 113.274614][ T2089] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.320218][ T2089] device bridge_slave_0 left promiscuous mode [ 113.339124][ T2089] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.348036][ T2089] device veth1_macvtap left promiscuous mode [ 113.353932][ T2089] device veth0_vlan left promiscuous mode [ 113.424605][ T28] audit: type=1400 audit(1719199080.992:143): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 113.461044][ T28] audit: type=1400 audit(1719199080.992:144): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 113.613056][ T1007] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 113.623156][ T1007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.926827][ T5059] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 114.027944][ T5062] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.034919][ T5062] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.042807][ T5062] device bridge_slave_0 entered promiscuous mode [ 114.052699][ T5062] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.061409][ T5062] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.068685][ T5062] device bridge_slave_1 entered promiscuous mode [ 114.132455][ T5062] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.139349][ T5062] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.146441][ T5062] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.153199][ T5062] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.171886][ T5073] syz-executor.2[5073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.171953][ T5073] syz-executor.2[5073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.298944][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 114.402658][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.436422][ T1017] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.591785][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.610836][ T1017] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.617718][ T1017] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.704472][ T1017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.780131][ T5091] device syzkaller0 entered promiscuous mode [ 114.922568][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.994283][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 115.026289][ T2089] device bridge_slave_1 left promiscuous mode [ 115.032230][ T2089] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.100056][ T2089] device bridge_slave_0 left promiscuous mode [ 115.116671][ T2089] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.225223][ T2089] device veth1_macvtap left promiscuous mode [ 115.251520][ T2089] device veth0_vlan left promiscuous mode [ 115.652296][ T5062] device veth0_vlan entered promiscuous mode [ 115.676679][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 115.715331][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.809239][ T5062] device veth1_macvtap entered promiscuous mode [ 115.819027][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.826630][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.834735][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 115.856079][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 115.877633][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 115.904932][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 115.915422][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 115.927453][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 115.935803][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 115.981943][ T5149] syz-executor.3[5149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.982010][ T5149] syz-executor.3[5149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.139659][ T5157] device veth0_vlan left promiscuous mode [ 116.165281][ T5157] device veth0_vlan entered promiscuous mode [ 116.243194][ T5172] Â: renamed from pim6reg1 [ 116.435766][ T5181] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.436218][ T5193] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 116.442698][ T5181] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.463649][ T5181] device bridge_slave_0 entered promiscuous mode [ 116.471004][ T5181] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.478272][ T5181] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.485700][ T5181] device bridge_slave_1 entered promiscuous mode [ 116.496456][ T5193] FAULT_INJECTION: forcing a failure. [ 116.496456][ T5193] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 116.509485][ T5193] CPU: 0 PID: 5193 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 116.519363][ T5193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 116.529255][ T5193] Call Trace: [ 116.532382][ T5193] [ 116.535154][ T5193] dump_stack_lvl+0x151/0x1b7 [ 116.539668][ T5193] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 116.544967][ T5193] dump_stack+0x15/0x1b [ 116.548954][ T5193] should_fail_ex+0x3d0/0x520 [ 116.553469][ T5193] should_fail+0xb/0x10 [ 116.557460][ T5193] should_fail_usercopy+0x1a/0x20 [ 116.562332][ T5193] _copy_from_user+0x1e/0xc0 [ 116.566755][ T5193] kstrtouint_from_user+0xc2/0x180 [ 116.571698][ T5193] ? kstrtol_from_user+0x180/0x180 [ 116.576732][ T5193] ? __kasan_check_read+0x11/0x20 [ 116.581589][ T5193] proc_fail_nth_write+0xa6/0x290 [ 116.586448][ T5193] ? selinux_file_permission+0x2bb/0x560 [ 116.591916][ T5193] ? proc_fail_nth_read+0x210/0x210 [ 116.596951][ T5193] ? fsnotify_perm+0x6a/0x5d0 [ 116.601463][ T5193] ? security_file_permission+0x86/0xb0 [ 116.606846][ T5193] ? proc_fail_nth_read+0x210/0x210 [ 116.611882][ T5193] vfs_write+0x41d/0xeb0 [ 116.616047][ T5193] ? __kasan_check_read+0x11/0x20 [ 116.620907][ T5193] ? file_end_write+0x1c0/0x1c0 [ 116.625591][ T5193] ? mutex_lock+0xb1/0x1e0 [ 116.629854][ T5193] ? bit_wait_io_timeout+0x120/0x120 [ 116.634967][ T5193] ? __fdget_pos+0x2e2/0x390 [ 116.639392][ T5193] ? ksys_write+0x77/0x2c0 [ 116.643646][ T5193] ksys_write+0x199/0x2c0 [ 116.647812][ T5193] ? __ia32_sys_read+0x90/0x90 [ 116.652411][ T5193] ? debug_smp_processor_id+0x17/0x20 [ 116.657619][ T5193] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 116.663543][ T5193] __x64_sys_write+0x7b/0x90 [ 116.667945][ T5193] do_syscall_64+0x3d/0xb0 [ 116.672200][ T5193] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 116.677927][ T5193] RIP: 0033:0x7fe69ba7bdef [ 116.682181][ T5193] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 116.701622][ T5193] RSP: 002b:00007fe69c8950c0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 116.709952][ T5193] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe69ba7bdef [ 116.717763][ T5193] RDX: 0000000000000001 RSI: 00007fe69c895130 RDI: 0000000000000007 [ 116.725660][ T5193] RBP: 00007fe69c895120 R08: 0000000000000000 R09: 0000000000000000 [ 116.733559][ T5193] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 116.741370][ T5193] R13: 000000000000000b R14: 00007fe69bbb3f80 R15: 00007ffddbe25338 [ 116.749187][ T5193] [ 116.990522][ T2089] device bridge_slave_1 left promiscuous mode [ 117.017854][ T2089] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.058285][ T2089] device bridge_slave_0 left promiscuous mode [ 117.064260][ T2089] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.121744][ T2089] device veth1_macvtap left promiscuous mode [ 117.153498][ T2089] device veth0_vlan left promiscuous mode [ 117.190887][ T5238] syz-executor.0[5238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.190960][ T5238] syz-executor.0[5238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.496121][ T28] audit: type=1400 audit(1719199085.072:145): avc: denied { create } for pid=5256 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 117.535586][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 117.546776][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 117.559569][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 117.577526][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 117.593002][ T330] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.600148][ T330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 117.622961][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 117.631716][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 117.658170][ T330] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.665032][ T330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 117.672661][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 117.704747][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 117.768657][ T5181] device veth0_vlan entered promiscuous mode [ 117.785328][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 117.793877][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 117.802852][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 117.819266][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 117.842508][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 117.876224][ T5181] device veth1_macvtap entered promiscuous mode [ 117.885297][ T5291] tap0: tun_chr_ioctl cmd 1074025677 [ 117.897463][ T5291] tap0: linktype set to 823 [ 117.955386][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 117.999831][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 118.059414][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 118.089663][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 118.101133][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 118.109571][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 118.118015][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 118.138426][ T5303] device pim6reg1 entered promiscuous mode [ 118.213366][ T5315] syz-executor.4[5315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.213450][ T5315] syz-executor.4[5315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.741726][ T8] device bridge_slave_1 left promiscuous mode [ 118.824910][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.876186][ T8] device bridge_slave_0 left promiscuous mode [ 118.906966][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.962034][ T8] device veth1_macvtap left promiscuous mode [ 118.985672][ T8] device veth0_vlan left promiscuous mode [ 119.394643][ T5342] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.465705][ T5342] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.472980][ T5342] device bridge_slave_0 entered promiscuous mode [ 119.549047][ T5342] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.581135][ T5342] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.610377][ T5342] device bridge_slave_1 entered promiscuous mode [ 120.037111][ T5342] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.043993][ T5342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 120.051120][ T5342] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.058094][ T5342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.303088][ T5052] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.317125][ T5052] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.396282][ T5422] syz-executor.3[5422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.396350][ T5422] syz-executor.3[5422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.418596][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.604327][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.701513][ T5432] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 120.736139][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 120.744878][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 120.769798][ T5430] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 120.814036][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.820921][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.908999][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 120.941837][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 120.951827][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.958705][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 120.967893][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 120.976702][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 120.996245][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 121.004610][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 121.055885][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 121.121990][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 121.130239][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 121.137992][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.146786][ T5342] device veth0_vlan entered promiscuous mode [ 121.155977][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 121.191292][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 121.211193][ T5342] device veth1_macvtap entered promiscuous mode [ 121.250445][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 121.261871][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 121.324051][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 121.415120][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 121.433500][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 121.488223][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 121.498041][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 121.535865][ T5465] syz-executor.0[5465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.535937][ T5465] syz-executor.0[5465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.550127][ T5465] syz-executor.0[5465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.808432][ T5487] syz-executor.4[5487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.824853][ T5487] syz-executor.4[5487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.846257][ T5487] syz-executor.4[5487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.877066][ T5487] syz-executor.4[5487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.932251][ T28] audit: type=1400 audit(1719199089.502:146): avc: denied { create } for pid=5499 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 122.343999][ T2089] device bridge_slave_1 left promiscuous mode [ 122.352379][ T2089] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.462518][ T2089] device bridge_slave_0 left promiscuous mode [ 122.506012][ T2089] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.541698][ T2089] device veth1_macvtap left promiscuous mode [ 122.555757][ T2089] device veth0_vlan left promiscuous mode [ 122.777805][ T5523] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.784747][ T5523] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.792110][ T5523] device bridge_slave_0 entered promiscuous mode [ 122.800567][ T5523] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.807599][ T5523] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.814993][ T5523] device bridge_slave_1 entered promiscuous mode [ 123.221064][ T5523] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.227947][ T5523] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.235032][ T5523] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.241832][ T5523] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.331821][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.339214][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.346761][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 123.354126][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 123.390785][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 123.398857][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.405730][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.416191][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 123.497217][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.504087][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.557291][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 123.595422][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 123.634424][ T5523] device veth0_vlan entered promiscuous mode [ 123.677049][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 123.685292][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 123.742867][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 123.775369][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 123.813570][ T5523] device veth1_macvtap entered promiscuous mode [ 123.850965][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 123.879683][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 123.929174][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 123.985249][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 124.013694][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 124.693136][ T5647] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.749469][ T5647] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.812190][ T5647] device bridge_slave_0 entered promiscuous mode [ 124.874923][ T5647] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.881834][ T5647] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.889237][ T5647] device bridge_slave_1 entered promiscuous mode [ 124.952326][ T8] device bridge_slave_1 left promiscuous mode [ 124.966707][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.003423][ T8] device bridge_slave_0 left promiscuous mode [ 125.032796][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.074205][ T8] device veth1_macvtap left promiscuous mode [ 125.090374][ T8] device veth0_vlan left promiscuous mode [ 125.419893][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 125.427703][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 125.447462][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 125.456359][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 125.464597][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.475294][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.482168][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.489499][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 125.518029][ T28] audit: type=1400 audit(1719199093.092:147): avc: denied { write } for pid=5705 comm="syz-executor.2" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 125.547008][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.555184][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.562137][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.569700][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 125.579370][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 125.589032][ T5647] device veth0_vlan entered promiscuous mode [ 125.645259][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 125.665942][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.666355][ T5718] syz-executor.0[5718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.673559][ T5718] syz-executor.0[5718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.724990][ T5647] device veth1_macvtap entered promiscuous mode [ 125.744121][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 125.767814][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.804115][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 125.838060][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 125.894598][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 125.938293][ T5724] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 126.087974][ T5716] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.094825][ T5716] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.185771][ T5716] device bridge_slave_0 entered promiscuous mode [ 126.246654][ T5716] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.300694][ T5716] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.392743][ T5716] device bridge_slave_1 entered promiscuous mode [ 126.534991][ T5750] device veth0_vlan left promiscuous mode [ 126.543619][ T5750] device veth0_vlan entered promiscuous mode [ 126.567017][ T5752] bond_slave_1: mtu less than device minimum [ 126.668083][ T5745] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.674922][ T5745] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.686557][ T5745] device bridge_slave_0 entered promiscuous mode [ 126.707878][ T5745] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.714724][ T5745] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.736002][ T5745] device bridge_slave_1 entered promiscuous mode [ 126.743059][ T5716] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.749932][ T5716] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.757017][ T5716] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.763778][ T5716] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.787657][ T2090] device veth0_vlan left promiscuous mode [ 126.842332][ T5770] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 126.944072][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.952772][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.983114][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 126.990397][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.006438][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 127.019745][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.028012][ T5052] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.034864][ T5052] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.042755][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 127.050997][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.059234][ T5052] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.066092][ T5052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.093783][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 127.101776][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 127.109904][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 127.118043][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 127.133966][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 127.148359][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 127.163656][ T5716] device veth0_vlan entered promiscuous mode [ 127.177963][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 127.186359][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 127.212587][ T5716] device veth1_macvtap entered promiscuous mode [ 127.219458][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 127.227743][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 127.235109][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 127.243180][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 127.251878][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 127.286816][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 127.294823][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 127.325931][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 127.334290][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 127.386729][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 127.394087][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.427530][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 127.441519][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.465979][ T5052] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.472849][ T5052] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.484429][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 127.506372][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.521906][ T5052] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.528788][ T5052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.539407][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 127.547401][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 127.566735][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 127.620290][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 127.641962][ T5745] device veth0_vlan entered promiscuous mode [ 127.654484][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 127.665082][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 127.673406][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 127.734323][ T5745] device veth1_macvtap entered promiscuous mode [ 127.759041][ T5052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 127.798635][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 127.823652][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 128.006632][ T2090] device bridge_slave_1 left promiscuous mode [ 128.012585][ T2090] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.076834][ T2090] device bridge_slave_0 left promiscuous mode [ 128.107221][ T2090] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.116801][ T2090] device veth1_macvtap left promiscuous mode [ 128.123173][ T2090] device veth0_vlan left promiscuous mode [ 128.388550][ T5851] device pim6reg1 entered promiscuous mode [ 128.598893][ T5853] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.677008][ T5853] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.684281][ T5853] device bridge_slave_0 entered promiscuous mode [ 128.730360][ T5853] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.753666][ T5853] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.809551][ T5853] device bridge_slave_1 entered promiscuous mode [ 129.177575][ T5886] geneve1: tun_chr_ioctl cmd 1074025681 [ 129.521633][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 129.530578][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.549643][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.558711][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.635935][ T330] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.642790][ T330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.711304][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.826921][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.888239][ T330] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.895089][ T330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.002089][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.013717][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.021465][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.039798][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.052226][ T5853] device veth0_vlan entered promiscuous mode [ 130.065363][ T5924] tap0: tun_chr_ioctl cmd 2147767506 [ 130.100921][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.161751][ T5853] device veth1_macvtap entered promiscuous mode [ 130.171501][ T2090] device bridge_slave_1 left promiscuous mode [ 130.179823][ T2090] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.202356][ T2090] device bridge_slave_0 left promiscuous mode [ 130.239495][ T2090] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.250222][ T2090] device veth1_macvtap left promiscuous mode [ 130.265161][ T2090] device veth0_vlan left promiscuous mode [ 130.437405][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.454935][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.462649][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 130.471002][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.493105][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 130.512674][ T5942] device veth1_macvtap left promiscuous mode [ 130.556689][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 130.564687][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 130.642671][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 130.659431][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2024/06/24 03:18:18 SYZFATAL: executor 1 failed 11 times: executor 1: exit status 67 err exit status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 exit status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 exit status 67