last executing test programs: 2.422278235s ago: executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r0, 0x0, 0xda00) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b80)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x3}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x4}]}]}, {0x0, [0x0, 0x0, 0x0, 0x2e, 0x3e]}}, 0x0, 0x33}, 0x20) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb0100180077a4f30900007abaf19a357de4e7c80000000b000000000000010000000039001e0210000000000000000200000000000080000000000000000006000000020000060400000000000000000000000100000003000000005f5f00"], &(0x7f00000005c0)=""/122, 0x60, 0x7a, 0x1}, 0x20) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000008c0)=@generic={&(0x7f0000000880)='./file0\x00', 0x0, 0x14}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000900)={0x1, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000cc0)={@ifindex, 0x4, 0x1, 0x3, &(0x7f0000000980)=[0x0], 0x1, 0x0, &(0x7f0000000c00), &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000d00)={@cgroup=r0, r2, 0x33, 0x24, r0, @prog_fd=r0, r7}, 0x20) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000005c0)={@map, r8, 0x22}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x15, 0x9, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x199b}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @generic={0x3f, 0x0, 0x7, 0xcce6, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8c}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x7, 0xc1, &(0x7f0000000440)=""/193, 0x41100, 0x40, '\x00', 0x0, 0xf, r4, 0x8, &(0x7f0000000640)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x3, 0xa, 0x7, 0x20}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[r5, r6, r3, r8], &(0x7f0000000980), 0x10, 0xad1}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1}, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x9, 0x3, 0xf4, 0x7fff, 0x2}, 0x48) 2.204579019s ago: executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x100, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f00000004c0)=""/155}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) close(0xffffffffffffffff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x8002, 0x0, 0x1}, 0x48) close(r4) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x13, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b40000000000000061114c000000000085000000270000009500000000000000925d2101d06bcd9d97b42082c6574c62dd8f343a8dee60fe1f04807bce9b9fb2d138b481cfe07ac9a71ba6251145c8d758834ac8af63566aca622cf4be343ac721e8b8fd0164a4f15cb5c95006c857f26bd13b64342a88783453cbb29f15275953fa0a9bcf11f29d2edb134a6af306662fccb777ff44ff56ebfa"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x90) 1.87719733s ago: executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 1.769393137s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0xd2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008400000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000740)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_pid(r0, &(0x7f0000000980), 0x12) 1.672923971s ago: executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x15, 0x80000, 0x0, &(0x7f00000005c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd, @generic={0x66}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x21) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r0}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfe1b) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.619878499s ago: executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x900) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0xc000) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) write$cgroup_int(r0, &(0x7f0000000200), 0x44000) 1.55253221s ago: executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x1c, &(0x7f00000003c0)=ANY=[], 0x0}, 0x90) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0x4000}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x2d) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0xf, &(0x7f0000000280), 0xf) 1.514847175s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) 1.458827435s ago: executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x100, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f00000004c0)=""/155}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) close(0xffffffffffffffff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x8002, 0x0, 0x1}, 0x48) close(r4) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x13, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b40000000000000061114c000000000085000000270000009500000000000000925d2101d06bcd9d97b42082c6574c62dd8f343a8dee60fe1f04807bce9b9fb2d138b481cfe07ac9a71ba6251145c8d758834ac8af63566aca622cf4be343ac721e8b8fd0164a4f15cb5c95006c857f26bd13b64342a88783453cbb29f15275953fa0a9bcf11f29d2edb134a6af306662fccb777ff44ff56ebfa"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x90) 1.373798787s ago: executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)='%+9llu \x00'}, 0x20) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000780)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe50}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000400)={0x1b, 0x0, 0x0, 0x10000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='ext4_drop_inode\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) 947.577903ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\xff\xd3r\xa3\xc81U\x8ez.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcd\x01t\r=\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') 838.402191ms ago: executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000020000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='ext4_mballoc_alloc\x00', r6}, 0x10) 837.44458ms ago: executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x20}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa}, 0x80) 830.544381ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000580)='jbd2_handle_stats\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000f7008500000082000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='jbd2_handle_stats\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x2) 816.550254ms ago: executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_request_inode\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 808.746735ms ago: executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/200}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_forget\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) 796.038327ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x100004, 0xffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x3, 0x0, r0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r1, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x2, 0x2, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x10, 0x15, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f80100ffb703000008c48f00b704000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000180)={'macvlan0\x00', @multicast}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r2, 0x8901, 0x20000000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe58}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) write$cgroup_subtree(r4, &(0x7f0000000000)={[{0x0, 'pids'}]}, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="7c533121ba56b5b1000000000000", 0x0, 0xf000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 755.096193ms ago: executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003280)={0x18, 0x4, &(0x7f0000002ec0)=ANY=[@ANYBLOB="180000000000000000000000000000008520"], &(0x7f0000002fc0)='GPL\x00', 0x1, 0xfd, &(0x7f0000003000)=""/253}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x6}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x0, 0x4}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x2}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x9}, {0x7, 0x0, 0x0, 0x8}, {0x7, 0x1, 0xb, 0x4, 0x6}, {0x7, 0x0, 0x0, 0x9}, {}, {0x18, 0x6, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 684.074904ms ago: executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB='V\n\x00'], 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000000), 0x400000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="1801000007000038108bf07e7ab7996a2c00000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x60000000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/150}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 663.468278ms ago: executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x18, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000008000000000000000000000095"], &(0x7f0000000440)='GPL\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='contention_end\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000000), 0xffe000) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000001240)=0x80000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 572.579971ms ago: executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0xfffffffffffffece) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000002c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x70) 548.065665ms ago: executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x18}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000030000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000cc0)={&(0x7f0000000c80)='ext4_update_sb\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x41009432, &(0x7f00000005c0)) 544.574496ms ago: executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 508.080391ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\xff\xd3r\xa3\xc81U\x8ez.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcd\x01t\r=\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') 426.562234ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 359.371724ms ago: executing program 4: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='sys_enter\x00'}, 0x10) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001340)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002800)={0x18, 0x23, &(0x7f0000002680)=ANY=[@ANYBLOB="180000000100000000000000ff00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000184b0000020000000000000000000000950000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001839000004000000000000000000000085100000fdffffff18110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000a10000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000bf91000000000000b7020000010000008500000085000000b7000000000000209500000000000000"], &(0x7f0000001100)='syzkaller\x00', 0x6, 0x16, &(0x7f0000001280)=""/22, 0x40f00, 0x4, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000001380)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000013c0)=[r0, r0, r1, r1], &(0x7f00000027c0)=[{0x0, 0x3, 0x10}], 0x10, 0x3}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000025c0)={0x0, 0x2, &(0x7f0000001080)=ANY=[@ANYBLOB="18350000030000525500000000000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc4, &(0x7f0000001180)=""/196, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000014c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x4, 0x9, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000001540)=[{0x0, 0x5, 0x0, 0xa}, {0x0, 0x2, 0x2}], 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='page_pool_state_hold\x00', r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000772f0000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000010c0)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$inet(r4, &(0x7f0000001580)={0x0, 0x6, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c75256509e3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0x7ffff000}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r5, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) bpf$PROG_LOAD(0x5, &(0x7f0000001e00)={0x7, 0x23, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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", @ANYBLOB="0000000000000000b70500000800000085000000a50000000903ab0406000000950000000000000085100000f8ffffff850000001800000018440000fdffffff0000000000000000b7080000000000007b8af8ff00000000b7080000588f00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa4000000000000", @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f00000003c0)='GPL\x00', 0xc3c, 0xc7, &(0x7f0000000840)=""/199, 0x41100, 0x22, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0x6, 0x3f, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x8, 0x0, &(0x7f0000001d40)=[{0x2, 0x4}, {0x0, 0x5, 0x6}, {0x4, 0x5, 0xd, 0x6}, {0x0, 0x0, 0xc, 0x2}, {0x4, 0x0, 0xd}, {0x5, 0x3, 0x9, 0x2}, {0x1, 0x2, 0x0, 0xb}, {0x3, 0x4, 0x6, 0x9}], 0x10, 0x7}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb01001800"/27], &(0x7f0000000a40)=""/235, 0x1b, 0xeb, 0x1, 0x2}, 0x20) 339.495467ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000004c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000178500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000000)=0x80000) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000900)='jbd2_checkpoint_stats\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4004662b, &(0x7f00000005c0)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r7}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f2, &(0x7f0000000080)) 331.311089ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={0xffffffffffffffff, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000140)="b9ff03076804268cb89e14f088a847e0ffff20000000000000007f141416ac1414", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f008004de7f9c764360000000100", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 87.348246ms ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020701200000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x718841c8d685f806, &(0x7f0000000300)}, 0xfffffffffffffff0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'vlan0\x00'}) socketpair(0x6, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/200}, 0x20) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r0}, 0x10) 0s ago: executing program 1: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800084}, 0xfffffffffffffea9}, 0x90) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x20702, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x20, &(0x7f0000000500)={&(0x7f0000000400)=""/150, 0x96, 0x0, &(0x7f00000004c0)=""/10, 0xa}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x4, 0x11, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0xc0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffff078}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}]}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r4, r1, 0x2, &(0x7f0000000580)=[r2, r2, r2], &(0x7f00000006c0)=[{0x2, 0x3, 0x4, 0x9}, {0x5, 0x1, 0xe, 0xf}], 0x10, 0x3f}, 0x90) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) close(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r0, 0x40047451, 0x2000000c) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) kernel console output (not intermixed with test programs): T28] audit: type=1400 audit(1718289741.757:111): avc: denied { open } for pid=954 comm="syz-executor.0" path="/dev/ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 48.924782][ T28] audit: type=1400 audit(1718289741.767:112): avc: denied { ioctl } for pid=954 comm="syz-executor.0" path="/dev/ppp" dev="devtmpfs" ino=138 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 49.315465][ T974] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 50.960059][ T1040] tap0: tun_chr_ioctl cmd 1074025677 [ 50.996543][ T1040] tap0: linktype set to 773 [ 51.227895][ T28] audit: type=1400 audit(1718289744.377:113): avc: denied { setopt } for pid=1049 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 53.026183][ C1] sched: RT throttling activated [ 57.699592][ T1218] device pim6reg1 entered promiscuous mode [ 59.524844][ T28] audit: type=1400 audit(1718289752.657:114): avc: denied { create } for pid=1292 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 59.544987][ T1296] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.552118][ T1296] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.562671][ T1297] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.569546][ T1297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.576662][ T1297] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.583404][ T1297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.607322][ T1297] device bridge0 entered promiscuous mode [ 60.138798][ T1332] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.145956][ T1332] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.167649][ T1336] bond_slave_1: mtu less than device minimum [ 60.177316][ T1332] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.184203][ T1332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.191406][ T1332] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.198284][ T1332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.206518][ T1332] device bridge0 entered promiscuous mode [ 62.045352][ T1343] nicvf0: tun_chr_ioctl cmd 1074025677 [ 62.051043][ T1343] nicvf0: linktype set to 825 [ 66.165811][ T1394] nicvf0: tun_chr_ioctl cmd 1074025677 [ 66.171264][ T1394] nicvf0: linktype set to 825 [ 66.294596][ T28] audit: type=1400 audit(1718289759.437:115): avc: denied { create } for pid=1410 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 67.690381][ T1448] syz-executor.4 (1448) used greatest stack depth: 21184 bytes left [ 67.805756][ T1447] syz-executor.2 (1447) used greatest stack depth: 21040 bytes left [ 68.773067][ T1496] nicvf0: tun_chr_ioctl cmd 1074025677 [ 68.816353][ T1496] nicvf0: linktype set to 825 [ 68.886579][ T322] cgroup: fork rejected by pids controller in /syz3 [ 69.537678][ T1152] device bridge_slave_1 left promiscuous mode [ 69.556557][ T1152] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.616517][ T1152] device bridge_slave_0 left promiscuous mode [ 69.622505][ T1152] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.643376][ T1152] device veth1_macvtap left promiscuous mode [ 69.655274][ T1152] device veth0_vlan left promiscuous mode [ 69.789228][ T323] cgroup: fork rejected by pids controller in /syz1 [ 70.054729][ T1527] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.108844][ T1527] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.174425][ T1527] device bridge_slave_0 entered promiscuous mode [ 70.244227][ T1527] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.336635][ T1527] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.386715][ T1527] device bridge_slave_1 entered promiscuous mode [ 70.680607][ T1556] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.720110][ T1556] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.758421][ T1556] device bridge_slave_0 entered promiscuous mode [ 70.828065][ T1556] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.846290][ T1556] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.853612][ T1556] device bridge_slave_1 entered promiscuous mode [ 70.933476][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.941525][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.993676][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.002969][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.014666][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.021506][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.028722][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.036801][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.044745][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.051598][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.083013][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.097723][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.105598][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.145032][ T1527] device veth0_vlan entered promiscuous mode [ 71.178968][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 71.205972][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.242138][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 71.249929][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.278939][ T1527] device veth1_macvtap entered promiscuous mode [ 71.296626][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 71.338620][ T1152] device bridge_slave_1 left promiscuous mode [ 71.344566][ T1152] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.376958][ T1152] device bridge_slave_0 left promiscuous mode [ 71.382911][ T1152] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.429623][ T1152] device veth1_macvtap left promiscuous mode [ 71.435651][ T1152] device veth0_vlan left promiscuous mode [ 71.762051][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 71.780469][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 71.866288][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.873516][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.959452][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.970915][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.028082][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.034957][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.111370][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.140115][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.152514][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.159476][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.203955][ T1609] device syzkaller0 entered promiscuous mode [ 72.216812][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.225741][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 72.262327][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.318410][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 72.378419][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.450531][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 72.469384][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.477929][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 72.485678][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.506347][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.515402][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.534175][ T1556] device veth0_vlan entered promiscuous mode [ 72.550253][ T1556] device veth1_macvtap entered promiscuous mode [ 72.579305][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 72.593235][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 72.601681][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 72.609958][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 72.618611][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 72.626914][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 72.635003][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 73.814814][ T1675] device vlan0 entered promiscuous mode [ 74.731646][ T1689] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.738669][ T1689] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.756887][ T1689] device bridge_slave_0 entered promiscuous mode [ 74.766127][ T1689] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.773108][ T1689] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.780458][ T1689] device bridge_slave_1 entered promiscuous mode [ 74.876972][ T1152] device bridge_slave_1 left promiscuous mode [ 74.894766][ T1152] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.933137][ T1152] device bridge_slave_0 left promiscuous mode [ 74.962746][ T1152] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.973586][ T1152] device veth1_macvtap left promiscuous mode [ 75.525946][ T1719] device syzkaller0 entered promiscuous mode [ 75.612863][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.629659][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.716600][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.731727][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.746023][ T326] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.752907][ T326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.769966][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.804422][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.815219][ T326] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.822084][ T326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.829645][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 75.838159][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 75.846012][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 75.854265][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 75.877109][ T1689] device veth0_vlan entered promiscuous mode [ 75.897919][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 75.907213][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 75.915649][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 75.924317][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 75.944175][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.958262][ T1689] device veth1_macvtap entered promiscuous mode [ 75.974210][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 76.007107][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 76.017525][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 76.025877][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 76.045190][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 76.053509][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 76.061629][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 76.069945][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 76.379470][ T1756] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 76.507214][ T1760] EXT4-fs (sda1): Can't modify superblock whileperforming online resize [ 76.939411][ T1785] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 77.218087][ T1790] syz-executor.2 (1790) used greatest stack depth: 20248 bytes left [ 77.362918][ T1801] device syzkaller0 entered promiscuous mode [ 77.377871][ T28] audit: type=1400 audit(1718289770.527:116): avc: denied { create } for pid=1805 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 77.522584][ T1815] device syzkaller0 entered promiscuous mode [ 77.593382][ T1821] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 82.430621][ T1864] device syzkaller0 entered promiscuous mode [ 82.673220][ T28] audit: type=1400 audit(1718289775.817:117): avc: denied { create } for pid=1880 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 83.518017][ T1902] device vlan0 entered promiscuous mode [ 83.863235][ T1911] device syzkaller0 entered promiscuous mode [ 84.039479][ T1928] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 84.997987][ T1945] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 86.407961][ T1992] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 91.323995][ T325] syz-executor.2 (325) used greatest stack depth: 19944 bytes left [ 91.638750][ T2302] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.645648][ T2302] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.653478][ T2302] device bridge_slave_0 entered promiscuous mode [ 91.662316][ T2302] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.669341][ T2302] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.683528][ T2302] device bridge_slave_1 entered promiscuous mode [ 91.773673][ T2322] device veth1_macvtap left promiscuous mode [ 91.909887][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 91.923686][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 91.956884][ T410] device bridge_slave_1 left promiscuous mode [ 91.963290][ T410] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.991594][ T410] device bridge_slave_0 left promiscuous mode [ 92.036358][ T410] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.095454][ T410] device veth1_macvtap left promiscuous mode [ 92.132422][ T410] device veth0_vlan left promiscuous mode [ 92.425772][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.450267][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.499960][ T344] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.506861][ T344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.556352][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.564535][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.572881][ T344] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.579743][ T344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.587200][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.594993][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.604223][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 92.613509][ T2352] device veth1_macvtap left promiscuous mode [ 92.628176][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 92.638609][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.659638][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 92.670106][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.678773][ T2302] device veth0_vlan entered promiscuous mode [ 92.719901][ T2302] device veth1_macvtap entered promiscuous mode [ 92.746960][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 92.756530][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 92.764505][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 92.807942][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 92.817396][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 92.826524][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 92.834730][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 94.857160][ T2454] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 96.362307][ T2519] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 96.842360][ T2548] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 99.854015][ T2666] device syzkaller0 entered promiscuous mode [ 101.037903][ T2693] device syzkaller0 entered promiscuous mode [ 101.427179][ T2707] device syzkaller0 entered promiscuous mode [ 102.475330][ T2736] device syzkaller0 entered promiscuous mode [ 105.753049][ T2858] bpf_get_probe_write_proto: 2 callbacks suppressed [ 105.753065][ T2858] syz-executor.1[2858] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.764774][ T2858] syz-executor.1[2858] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.414814][ T2876] syz-executor.1[2876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.456383][ T2876] syz-executor.1[2876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.550595][ T2932] syz-executor.1[2932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.567739][ T2932] syz-executor.1[2932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.586162][ T2934] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 107.630970][ T2922] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.637902][ T2922] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.645129][ T2922] device bridge_slave_0 entered promiscuous mode [ 107.653498][ T2922] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.660558][ T2922] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.667864][ T2922] device bridge_slave_1 entered promiscuous mode [ 107.776802][ T1152] device bridge_slave_1 left promiscuous mode [ 107.782752][ T1152] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.878432][ T1152] device bridge_slave_0 left promiscuous mode [ 107.884390][ T1152] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.984669][ T1152] device veth1_macvtap left promiscuous mode [ 108.033782][ T1152] device veth0_vlan left promiscuous mode [ 108.440013][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 108.466658][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.560283][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 108.569690][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 108.578065][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.584936][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.592763][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 108.601190][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 108.624275][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.631151][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.682214][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 108.690256][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.702244][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 108.731806][ T2922] device veth0_vlan entered promiscuous mode [ 108.758526][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 108.767136][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.775411][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.783411][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.798969][ T2922] device veth1_macvtap entered promiscuous mode [ 108.806694][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 108.817995][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 108.826881][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 109.211428][ T3008] syz-executor.2[3008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.211485][ T3008] syz-executor.2[3008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.704289][ T3028] device pim6reg1 entered promiscuous mode [ 110.419221][ T3065] device sit0 entered promiscuous mode [ 110.769102][ T3076] device syzkaller0 entered promiscuous mode [ 111.665866][ T3125] device pim6reg1 entered promiscuous mode [ 115.008623][ T3283] device pim6reg1 entered promiscuous mode [ 115.621108][ T3314] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 115.857184][ T3333] device pim6reg1 entered promiscuous mode [ 116.116707][ T3342] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 116.229989][ T3352] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 116.254660][ T3354] device sit0 entered promiscuous mode [ 116.444386][ T3355] device bridge0 entered promiscuous mode [ 116.502267][ T3363] device pim6reg1 entered promiscuous mode [ 116.667299][ T3372] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 116.919353][ T3389] device sit0 left promiscuous mode [ 116.933254][ T3389] device sit0 entered promiscuous mode [ 117.115680][ T3398] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 119.615018][ T3544] syz-executor.3[3544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.615087][ T3544] syz-executor.3[3544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.916983][ T3586] device lo entered promiscuous mode [ 120.377939][ T3619] device sit0 entered promiscuous mode [ 120.477590][ T3621] device lo entered promiscuous mode [ 122.557398][ T3696] geneve1: tun_chr_ioctl cmd 19271 [ 123.418773][ T3777] device pim6reg1 entered promiscuous mode [ 123.576617][ T3784] geneve1: tun_chr_ioctl cmd 19271 [ 123.710702][ T3796] device pim6reg1 entered promiscuous mode [ 124.576696][ T3885] device pim6reg1 entered promiscuous mode [ 125.539570][ T3941] device sit0 left promiscuous mode [ 125.605755][ T3941] device sit0 entered promiscuous mode [ 126.566005][ T3963] device syzkaller0 entered promiscuous mode [ 126.803082][ T3983] device sit0 left promiscuous mode [ 126.871351][ T3983] device sit0 entered promiscuous mode [ 127.633794][ T28] audit: type=1400 audit(1718289820.777:118): avc: denied { create } for pid=4003 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 127.875418][ T28] audit: type=1400 audit(1718289821.017:119): avc: denied { create } for pid=4026 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 128.344815][ T4040] device sit0 left promiscuous mode [ 128.625915][ T4056] device pim6reg1 entered promiscuous mode [ 129.059640][ T28] audit: type=1400 audit(1718289822.207:120): avc: denied { create } for pid=4095 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 129.110438][ T4096] device bridge0 entered promiscuous mode [ 135.232896][ T4412] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 9 (only 8 groups) [ 135.288352][ T28] audit: type=1400 audit(1718289828.437:121): avc: denied { create } for pid=4411 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 135.527215][ T4441] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 9 (only 8 groups) [ 136.434105][ T28] audit: type=1400 audit(1718289829.577:122): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 136.991946][ T4516] device pim6reg1 entered promiscuous mode [ 137.080510][ T4513] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.091340][ T4513] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.107351][ T4513] device bridge_slave_0 entered promiscuous mode [ 137.114187][ T4513] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.121325][ T4513] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.129057][ T4513] device bridge_slave_1 entered promiscuous mode [ 137.286301][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.293551][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.319649][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 137.328051][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.336089][ T1623] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.342959][ T1623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.350519][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 137.363010][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.378688][ T1623] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.385531][ T1623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.400873][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.419081][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.431356][ T4551] device pim6reg1 entered promiscuous mode [ 137.479856][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 137.522868][ T4513] device veth0_vlan entered promiscuous mode [ 137.573313][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 137.596932][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 137.604760][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 137.730568][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 137.818222][ T4513] device veth1_macvtap entered promiscuous mode [ 137.895694][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 137.915569][ T10] device bridge_slave_1 left promiscuous mode [ 137.933168][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.000476][ T10] device bridge_slave_0 left promiscuous mode [ 138.035280][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.123318][ T10] device veth1_macvtap left promiscuous mode [ 138.180404][ T10] device veth0_vlan left promiscuous mode [ 138.540720][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 138.550156][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 138.559938][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 138.568555][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 138.583707][ T28] audit: type=1400 audit(1718289831.727:123): avc: denied { mounton } for pid=4513 comm="syz-executor.4" path="/dev/binderfs" dev="devtmpfs" ino=370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 141.164838][ T4669] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.171758][ T4669] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.179352][ T4669] device bridge_slave_0 entered promiscuous mode [ 141.186266][ T4669] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.193143][ T4669] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.201118][ T4669] device bridge_slave_1 entered promiscuous mode [ 141.603413][ T4669] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.610290][ T4669] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.617393][ T4669] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.624199][ T4669] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.957513][ T1288] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.015497][ T1288] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.146234][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 142.388117][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 142.395415][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 142.444395][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 142.457289][ T1288] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.464152][ T1288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.473731][ T410] device bridge_slave_1 left promiscuous mode [ 142.481891][ T410] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.496422][ T410] device bridge_slave_0 left promiscuous mode [ 142.502430][ T410] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.510967][ T410] device veth0_vlan left promiscuous mode [ 142.612815][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 142.621303][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 142.630049][ T1288] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.636927][ T1288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.672260][ T4669] device veth0_vlan entered promiscuous mode [ 142.708337][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 142.716919][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 142.724825][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 142.733324][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 142.763218][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 142.813757][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 142.874755][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 142.923238][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.012681][ T4669] device veth1_macvtap entered promiscuous mode [ 143.021119][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.028582][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 143.035833][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 143.046611][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 143.054649][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 143.086262][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 143.094323][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 143.119849][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 143.128027][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.497383][ T4752] syz-executor.0[4752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.497457][ T4752] syz-executor.0[4752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.655986][ T4766] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.675378][ T4766] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.682982][ T4766] device bridge_slave_0 entered promiscuous mode [ 144.690050][ T4766] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.698221][ T4766] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.713385][ T4766] device bridge_slave_1 entered promiscuous mode [ 144.922472][ T4766] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.929366][ T4766] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.936455][ T4766] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.943219][ T4766] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.120583][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.174122][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.206376][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.213797][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.227942][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 145.236170][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 145.245511][ T1623] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.252396][ T1623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.260032][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.268822][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.277280][ T1623] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.284145][ T1623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.291786][ T28] audit: type=1400 audit(1718289838.437:124): avc: denied { remove_name } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 145.316336][ T28] audit: type=1400 audit(1718289838.437:125): avc: denied { rename } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 145.342617][ T4766] device veth0_vlan entered promiscuous mode [ 145.388304][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 145.437145][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 145.462583][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 145.470764][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 145.485983][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 145.521226][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 145.560365][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 145.620981][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 145.681716][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 145.699695][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 145.782618][ T4766] device veth1_macvtap entered promiscuous mode [ 145.801877][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 145.816602][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 145.843286][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 145.888907][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 145.908650][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 145.963546][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 145.990129][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 146.310775][ T4879] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.403431][ T28] audit: type=1400 audit(1718289839.547:126): avc: denied { create } for pid=4884 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 148.982264][ T5029] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.770801][ T5076] device dummy0 entered promiscuous mode [ 149.962609][ T5084] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.013427][ T28] audit: type=1400 audit(1718289843.157:127): avc: denied { create } for pid=5083 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 150.071914][ T5087] device bridge_slave_1 left promiscuous mode [ 150.117028][ T28] audit: type=1400 audit(1718289843.187:128): avc: denied { create } for pid=5083 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 150.138668][ T5087] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.197697][ T5087] device bridge_slave_0 left promiscuous mode [ 150.244981][ T5087] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.375659][ T5145] syz-executor.0[5145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.375723][ T5145] syz-executor.0[5145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.156170][ T5168] device syzkaller0 entered promiscuous mode [ 152.319823][ T5170] syz-executor.2[5170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.324329][ T5170] syz-executor.2[5170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.778459][ T5199] syz-executor.0[5199] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.822150][ T5192] device syzkaller0 entered promiscuous mode [ 152.836552][ T5199] syz-executor.0[5199] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.191590][ T5218] device pim6reg1 entered promiscuous mode [ 153.567768][ T5228] syz-executor.3[5228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.567843][ T5228] syz-executor.3[5228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.871616][ T5245] device wg2 entered promiscuous mode [ 153.998630][ T5252] device pim6reg1 entered promiscuous mode [ 154.018251][ T5259] syz-executor.1[5259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.018312][ T5259] syz-executor.1[5259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.098999][ T5255] device syzkaller0 entered promiscuous mode [ 155.753440][ T5355] device pim6reg1 entered promiscuous mode [ 156.702085][ T5385] device pim6reg1 entered promiscuous mode [ 156.899516][ T5392] device syzkaller0 entered promiscuous mode [ 157.798974][ T5439] device syzkaller0 entered promiscuous mode [ 159.020124][ T5476] device syzkaller0 entered promiscuous mode [ 159.314272][ T5479] device syzkaller0 entered promiscuous mode [ 160.684313][ T5529] device syzkaller0 entered promiscuous mode [ 162.094699][ T5581] device wg2 entered promiscuous mode [ 163.026002][ T28] audit: type=1400 audit(1718289856.167:129): avc: denied { create } for pid=5608 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 163.247918][ T5615] device syzkaller0 entered promiscuous mode [ 163.310273][ T5620] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.382886][ T5625] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.390019][ T5625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.902810][ T5694] device wg2 left promiscuous mode [ 164.937449][ T5694] device wg2 entered promiscuous mode [ 166.126650][ T5731] device bridge_slave_0 entered promiscuous mode [ 166.172415][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.258003][ T5737] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.318514][ T5737] O3ãc¤±: renamed from bridge_slave_0 [ 167.257133][ T5748] syz-executor.3 (5748) used greatest stack depth: 19864 bytes left [ 167.482378][ T5768] O3ãc¤±: renamed from bridge_slave_0 [ 168.674651][ T5807] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.737875][ T5807] O3ãc¤±: renamed from bridge_slave_0 [ 170.250972][ T5845] device syzkaller0 entered promiscuous mode [ 170.897239][ T5878] device pim6reg1 entered promiscuous mode [ 171.881951][ T5896] device syzkaller0 entered promiscuous mode [ 173.592593][ T5966] device wg2 entered promiscuous mode [ 174.396613][ T5996] device pim6reg1 entered promiscuous mode [ 174.862388][ T6017] device pim6reg1 entered promiscuous mode [ 175.407722][ T6040] device wg2 entered promiscuous mode [ 176.411171][ T6079] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 177.086570][ T6112] device syzkaller0 entered promiscuous mode [ 179.316126][ T6220] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.388003][ T6223] device bridge_slave_1 left promiscuous mode [ 179.407655][ T6223] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.446478][ T6223] device O3ãc¤± left promiscuous mode [ 179.451749][ T6223] bridge0: port 1(O3ãc¤±) entered disabled state [ 179.618053][ T6220] tun0: tun_chr_ioctl cmd 1074025692 [ 179.875143][ T6227] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.882561][ T6227] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.890975][ T6227] device bridge_slave_0 entered promiscuous mode [ 180.009995][ T6243] device syzkaller0 entered promiscuous mode [ 180.027190][ T6227] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.039275][ T6227] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.053680][ T6227] device bridge_slave_1 entered promiscuous mode [ 180.478915][ T6227] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.485808][ T6227] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.492927][ T6227] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.499693][ T6227] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.760224][ T410] device veth1_macvtap left promiscuous mode [ 180.766073][ T410] device veth0_vlan left promiscuous mode [ 181.106879][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.124308][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.218464][ T6298] device syzkaller0 entered promiscuous mode [ 181.258330][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 181.267062][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.275804][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.285394][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.293866][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.300743][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.308484][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 181.316704][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.331173][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.338046][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.380917][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 181.391566][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 181.400866][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 181.409675][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 181.422991][ T6227] device veth0_vlan entered promiscuous mode [ 181.433203][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 181.441601][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 181.449764][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 181.457592][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.489475][ T6227] device veth1_macvtap entered promiscuous mode [ 181.523929][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.566591][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.573846][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 181.666769][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 181.674811][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 181.787726][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 181.795858][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 181.871189][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 181.922107][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 182.253072][ T6345] device syzkaller0 entered promiscuous mode [ 183.719831][ T6406] syz-executor.0[6406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.719896][ T6406] syz-executor.0[6406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.690853][ T6431] device syzkaller0 entered promiscuous mode [ 185.144159][ T6460] syz-executor.2[6460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.147598][ T6460] syz-executor.2[6460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.038900][ T6494] syz-executor.3[6494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.053033][ T6494] syz-executor.3[6494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.029621][ T6534] device pim6reg1 entered promiscuous mode [ 190.330283][ T6564] device syzkaller0 entered promiscuous mode [ 190.357134][ T6570] device pim6reg1 entered promiscuous mode [ 190.574374][ T6607] device syzkaller0 entered promiscuous mode [ 190.647611][ T6618] device pim6reg1 entered promiscuous mode [ 192.024336][ T6678] device pim6reg1 entered promiscuous mode [ 192.985342][ T6699] device syzkaller0 entered promiscuous mode [ 193.610588][ T6749] device syzkaller0 entered promiscuous mode [ 195.405475][ T410] device bridge_slave_1 left promiscuous mode [ 195.411553][ T410] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.479483][ T410] device O3ãc¤± left promiscuous mode [ 195.490955][ T410] bridge0: port 1(O3ãc¤±) entered disabled state [ 195.505682][ T410] device veth1_macvtap left promiscuous mode [ 195.579656][ T410] device veth0_vlan left promiscuous mode [ 195.879113][ T6804] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.885975][ T6804] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.008914][ T6804] device bridge_slave_0 entered promiscuous mode [ 196.092536][ T6804] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.134259][ T6804] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.142845][ T6804] device bridge_slave_1 entered promiscuous mode [ 196.329572][ T6808] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.385397][ T6808] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.428110][ T6808] device bridge_slave_0 entered promiscuous mode [ 196.466559][ T6808] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.489129][ T6808] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.523980][ T6808] device bridge_slave_1 entered promiscuous mode [ 196.923281][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.948346][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.024083][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.032611][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.040928][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.047784][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.055018][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.063411][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.071641][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.078507][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.085936][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.093811][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.101858][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.110649][ T410] device veth1_macvtap left promiscuous mode [ 197.116652][ T410] device veth0_vlan left promiscuous mode [ 197.373988][ T6804] device veth0_vlan entered promiscuous mode [ 197.414815][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 197.424747][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.435286][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.442587][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 197.464444][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 197.472747][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 197.487998][ T6804] device veth1_macvtap entered promiscuous mode [ 197.500656][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 197.509110][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.517441][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.524852][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.534699][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.542908][ T326] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.549768][ T326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.558410][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.566674][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.574657][ T326] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.581501][ T326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.605295][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.612848][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.620939][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.636596][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.648511][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.657884][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 197.666136][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 197.677774][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 197.686414][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 197.703677][ T6808] device veth0_vlan entered promiscuous mode [ 197.726134][ T6881] device syzkaller0 entered promiscuous mode [ 197.760709][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 197.805987][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 197.814445][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 197.822343][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.853554][ T6808] device veth1_macvtap entered promiscuous mode [ 197.884028][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.913329][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 197.956639][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 197.964640][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 198.066627][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 198.074145][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 198.176575][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 198.226813][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 198.286640][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 198.730048][ T6920] device pim6reg1 entered promiscuous mode [ 199.756987][ T6962] device pim6reg1 entered promiscuous mode [ 202.157280][ T7064] device pim6reg1 entered promiscuous mode [ 203.739170][ T7133] device pim6reg1 entered promiscuous mode [ 205.227872][ T7170] device pim6reg1 entered promiscuous mode [ 205.618929][ T7190] device pim6reg1 entered promiscuous mode [ 209.263510][ T7297] device syzkaller0 entered promiscuous mode [ 210.817496][ T7338] device syzkaller0 entered promiscuous mode [ 212.286125][ T7377] device syzkaller0 entered promiscuous mode [ 214.109524][ T7418] device syzkaller0 entered promiscuous mode [ 215.347106][ T7468] device syzkaller0 entered promiscuous mode [ 219.238999][ T7524] device syzkaller0 entered promiscuous mode [ 220.087405][ T7536] device syzkaller0 entered promiscuous mode [ 220.297103][ T7548] device pim6reg1 entered promiscuous mode [ 220.368040][ T7555] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.375093][ T7555] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.390533][ T7555] device bridge_slave_0 entered promiscuous mode [ 220.397868][ T7555] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.404816][ T7555] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.412231][ T7555] device bridge_slave_1 entered promiscuous mode [ 221.037385][ T1152] device bridge_slave_1 left promiscuous mode [ 221.045610][ T1152] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.118378][ T1152] device bridge_slave_0 left promiscuous mode [ 221.164182][ T1152] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.243426][ T1152] device veth1_macvtap left promiscuous mode [ 221.287097][ T1152] device veth0_vlan left promiscuous mode [ 221.648228][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.655761][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.675845][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.684568][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.693460][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.700342][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.711164][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.719960][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.728384][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.735230][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.742925][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 221.750988][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.767266][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.778600][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 221.792535][ T7555] device veth0_vlan entered promiscuous mode [ 221.848942][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 221.879824][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.904305][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 221.915347][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 221.935644][ T7555] device veth1_macvtap entered promiscuous mode [ 221.985954][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 222.036823][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 222.068230][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 222.163721][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 222.182000][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 222.271068][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 222.305488][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 222.340077][ T7595] device syzkaller0 entered promiscuous mode [ 222.857888][ T7614] device syzkaller0 entered promiscuous mode [ 223.961911][ T7642] device syzkaller0 entered promiscuous mode [ 224.016820][ T7655] device syzkaller0 entered promiscuous mode [ 229.135233][ T7703] device syzkaller0 entered promiscuous mode [ 229.225890][ T7706] device syzkaller0 entered promiscuous mode [ 237.136463][ T7767] device syzkaller0 entered promiscuous mode [ 243.430288][ T7818] device syzkaller0 entered promiscuous mode [ 243.521352][ T7819] device syzkaller0 entered promiscuous mode [ 247.407962][ T7865] device syzkaller0 entered promiscuous mode [ 247.807452][ T7876] device syzkaller0 entered promiscuous mode [ 248.655054][ T7914] device syzkaller0 entered promiscuous mode [ 248.748869][ T7920] device wg2 entered promiscuous mode [ 248.913512][ T7927] device syzkaller0 entered promiscuous mode [ 249.684626][ T7952] device syzkaller0 entered promiscuous mode [ 249.806619][ T7958] device wg2 left promiscuous mode [ 249.865259][ T7960] device wg2 entered promiscuous mode [ 250.317228][ T7966] device syzkaller0 entered promiscuous mode [ 250.742684][ T8000] device wg2 entered promiscuous mode [ 251.172953][ T8018] device syzkaller0 entered promiscuous mode [ 251.722422][ T8041] device wg2 left promiscuous mode [ 251.796101][ T8041] device wg2 entered promiscuous mode [ 252.223682][ T8057] device syzkaller0 entered promiscuous mode [ 253.013971][ T8095] device wg2 entered promiscuous mode [ 253.020350][ T8097] syz-executor.4[8097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.021834][ T8097] syz-executor.4[8097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.350868][ T8104] device syzkaller0 entered promiscuous mode [ 253.653569][ T8143] device wg2 left promiscuous mode [ 253.741422][ T8147] device wg2 entered promiscuous mode [ 254.133175][ T8162] device syzkaller0 entered promiscuous mode [ 254.451311][ T8191] device wg2 entered promiscuous mode [ 255.026753][ T8234] device wg2 left promiscuous mode [ 255.128777][ T8234] device wg2 entered promiscuous mode [ 255.734309][ T8280] device wg2 left promiscuous mode [ 255.763399][ T8280] device wg2 entered promiscuous mode [ 256.650541][ T8326] device wg2 left promiscuous mode [ 256.676589][ T8326] device wg2 entered promiscuous mode [ 257.308613][ T8364] device wg2 left promiscuous mode [ 257.345585][ T8364] device wg2 entered promiscuous mode [ 257.930826][ T8413] device wg2 left promiscuous mode [ 257.953459][ T8413] device wg2 entered promiscuous mode [ 258.700971][ T8445] device wg2 left promiscuous mode [ 258.752092][ T8445] device wg2 entered promiscuous mode [ 259.110642][ T8471] syz-executor.3[8471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.110706][ T8471] syz-executor.3[8471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.149373][ T8471] device syzkaller0 entered promiscuous mode [ 259.171585][ T8475] device pim6reg1 entered promiscuous mode [ 259.187265][ T8471] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 259.480826][ T8502] device wg2 left promiscuous mode [ 259.517085][ T8502] device wg2 entered promiscuous mode [ 260.322299][ T8520] syz-executor.3[8520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.322364][ T8520] syz-executor.3[8520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.371204][ T8520] device syzkaller0 entered promiscuous mode [ 260.395670][ T8533] device wg2 left promiscuous mode [ 260.411890][ T8533] device wg2 entered promiscuous mode [ 260.422346][ T8520] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 261.369442][ T8562] syz-executor.2[8562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.369512][ T8562] syz-executor.2[8562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.438619][ T8562] device syzkaller0 entered promiscuous mode [ 261.526092][ T8581] device wg2 left promiscuous mode [ 261.539928][ T8562] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 261.580689][ T8581] device wg2 entered promiscuous mode [ 262.562959][ T8613] syz-executor.4[8613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.563027][ T8613] syz-executor.4[8613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.741068][ T8613] device syzkaller0 entered promiscuous mode [ 262.886392][ T8630] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 263.718208][ T8659] syz-executor.2[8659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.718276][ T8659] syz-executor.2[8659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.040109][ T8674] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 265.067029][ T8659] device syzkaller0 entered promiscuous mode [ 267.020021][ T8708] bond_slave_1: mtu greater than device maximum [ 267.246611][ T8727] syzkaller0: refused to change device tx_queue_len [ 267.751429][ T8741] bond_slave_1: mtu greater than device maximum [ 268.341664][ T8769] bond_slave_1: mtu greater than device maximum [ 269.097389][ T28] audit: type=1400 audit(1718289962.237:130): avc: denied { create } for pid=8806 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 271.107510][ T8872] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 272.407703][ T8910] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 272.594963][ T8925] device pim6reg1 entered promiscuous mode [ 272.982393][ T8958] device pim6reg1 entered promiscuous mode [ 282.116290][ T9055] device syzkaller0 entered promiscuous mode [ 282.236536][ T28] audit: type=1400 audit(1718289975.387:131): avc: denied { create } for pid=9068 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 286.349509][ T9123] device syzkaller0 entered promiscuous mode [ 286.645318][ T9155] geneve1: tun_chr_ioctl cmd 1074025672 [ 286.656991][ T9155] geneve1: ignored: set checksum enabled [ 286.911110][ T9169] device syzkaller0 entered promiscuous mode [ 287.445093][ T9210] device syzkaller0 entered promiscuous mode [ 287.520840][ T9222] device syzkaller0 entered promiscuous mode [ 287.545738][ T9222] ip6_tunnel: non-ECT from db5b:6861:58bb:cfc8:875a:6596:9ff5:7b00 with DS=0x31 [ 287.629067][ T9219] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.635960][ T9219] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.643545][ T9219] device bridge_slave_0 entered promiscuous mode [ 287.652786][ T9219] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.659906][ T9219] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.668551][ T9219] device bridge_slave_1 entered promiscuous mode [ 287.748817][ T1152] device bridge_slave_1 left promiscuous mode [ 287.754803][ T1152] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.808843][ T1152] device O3ãc¤± left promiscuous mode [ 287.830325][ T1152] bridge0: port 1(O3ãc¤±) entered disabled state [ 287.844924][ T1152] device veth1_macvtap left promiscuous mode [ 287.850844][ T1152] device veth0_vlan left promiscuous mode [ 288.132342][ T9265] device syzkaller0 entered promiscuous mode [ 288.221546][ T9265] ip6_tunnel: non-ECT from db5b:6861:58bb:cfc8:875a:6596:9ff5:7b00 with DS=0x31 [ 288.393381][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 288.400853][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.424702][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 288.433924][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.442146][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.449011][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.485686][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 288.516901][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.565460][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.572346][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.587608][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 288.597848][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 288.624388][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 288.636594][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 288.660898][ T9219] device veth0_vlan entered promiscuous mode [ 288.674775][ T9304] syz-executor.1[9304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.674842][ T9304] syz-executor.1[9304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.677495][ T9219] device veth1_macvtap entered promiscuous mode [ 288.710299][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 288.719282][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 288.726925][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 288.750755][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 288.758936][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 288.767045][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 288.791506][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 288.801867][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 288.915165][ T9312] device syzkaller0 entered promiscuous mode [ 289.462872][ T9356] device syzkaller0 entered promiscuous mode [ 289.517568][ T9356] ip6_tunnel: non-ECT from db5b:6861:58bb:cfc8:875a:6596:9ff5:7b00 with DS=0x31 [ 289.825934][ T9383] syz-executor.2[9383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.826003][ T9383] syz-executor.2[9383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.135830][ T9496] tap0: tun_chr_ioctl cmd 1074812117 [ 291.154031][ T9485] tap0: tun_chr_ioctl cmd 2147767517 [ 291.451107][ T9556] syz-executor.2[9556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.451176][ T9556] syz-executor.2[9556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.502482][ T9556] syz-executor.2[9556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.515517][ T9556] syz-executor.2[9556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.586388][ T9566] : renamed from veth0_vlan [ 291.734877][ T9595] syz-executor.0[9595] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.734924][ T9595] syz-executor.0[9595] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.487368][ T28] audit: type=1400 audit(1718289986.637:132): avc: denied { ioctl } for pid=9688 comm="syz-executor.3" path="socket:[46121]" dev="sockfs" ino=46121 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 294.497393][ T9704] tap0: tun_chr_ioctl cmd 1074812117 [ 294.548501][ T9711] tap0: tun_chr_ioctl cmd 2147767517 [ 296.614285][ T9765] tap0: tun_chr_ioctl cmd 1074812117 [ 296.619905][ T9765] tap0: tun_chr_ioctl cmd 2147767517 [ 302.625371][T10099] bpf_get_probe_write_proto: 2 callbacks suppressed [ 302.625389][T10099] syz-executor.2[10099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.671962][T10099] syz-executor.2[10099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.824387][T10237] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.842945][T10237] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.850444][T10237] device bridge_slave_0 entered promiscuous mode [ 304.861060][T10237] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.867993][T10237] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.875028][T10237] device bridge_slave_1 entered promiscuous mode [ 304.973092][T10248] syz-executor.4[10248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.973158][T10248] syz-executor.4[10248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.116499][T10237] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.119877][T10250] syz-executor.3[10250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.128067][T10237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.128157][T10237] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.128172][T10237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.149543][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 305.174963][T10250] syz-executor.3[10250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.188577][ T400] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.207856][ T400] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.223694][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 305.231790][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.238645][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.267414][T10250] syz-executor.3[10250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.269172][T10250] syz-executor.3[10250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.358337][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 305.378297][ T400] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.385162][ T400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.393627][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 305.401516][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 305.446678][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 305.461215][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 305.469467][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 305.476763][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 305.487551][T10237] device veth0_vlan entered promiscuous mode [ 305.500569][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 305.510147][T10237] device veth1_macvtap entered promiscuous mode [ 305.523848][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 305.537969][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 305.628613][ T516] device bridge_slave_1 left promiscuous mode [ 305.634583][ T516] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.643636][ T516] device bridge_slave_0 left promiscuous mode [ 305.649764][ T516] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.657750][ T516] device veth1_macvtap left promiscuous mode [ 305.663737][ T516] device veth0_vlan left promiscuous mode [ 306.825329][T10326] syz-executor.0[10326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.825422][T10326] syz-executor.0[10326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.722831][T10382] bpf_get_probe_write_proto: 2 callbacks suppressed [ 307.722966][T10382] syz-executor.4[10382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.757763][T10382] syz-executor.4[10382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.828414][T10382] syz-executor.4[10382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.852683][T10382] syz-executor.4[10382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.004038][T10401] device syzkaller0 entered promiscuous mode [ 308.195881][T10436] device veth1_macvtap left promiscuous mode [ 308.386409][T10443] device syzkaller0 entered promiscuous mode [ 308.725203][T10470] device syzkaller0 entered promiscuous mode [ 309.529257][T10536] syz-executor.3[10536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.529349][T10536] syz-executor.3[10536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.658980][T10539] device syzkaller0 entered promiscuous mode [ 309.705049][T10524] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.712000][T10524] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.719268][T10524] device bridge_slave_0 entered promiscuous mode [ 309.726012][T10545] bridge0: port 3(macsec0) entered blocking state [ 309.735624][T10545] bridge0: port 3(macsec0) entered disabled state [ 309.772993][T10545] device macsec0 entered promiscuous mode [ 309.786921][T10524] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.793906][T10524] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.801528][T10524] device bridge_slave_1 entered promiscuous mode [ 310.175412][T10574] bridge0: port 3(macsec0) entered blocking state [ 310.181762][T10574] bridge0: port 3(macsec0) entered disabled state [ 310.188400][T10574] device macsec0 entered promiscuous mode [ 310.194117][T10574] bridge0: port 3(macsec0) entered blocking state [ 310.200364][T10574] bridge0: port 3(macsec0) entered forwarding state [ 310.249268][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 310.257316][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 310.275061][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 310.283999][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 310.292523][ T1623] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.299395][ T1623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.306720][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 310.314891][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 310.331860][ T1623] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.338742][ T1623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.368653][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 310.376764][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 310.385396][ T516] device bridge_slave_1 left promiscuous mode [ 310.391771][ T516] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.400006][ T516] device bridge_slave_0 left promiscuous mode [ 310.405998][ T516] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.414139][ T516] device veth1_macvtap left promiscuous mode [ 310.420054][ T516] device veth0_vlan left promiscuous mode [ 310.679633][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 310.687654][T10598] bridge0: port 3(macsec0) entered blocking state [ 310.694561][T10598] bridge0: port 3(macsec0) entered disabled state [ 310.701278][T10598] device macsec0 entered promiscuous mode [ 310.928973][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 310.945873][T10618] syz-executor.1[10618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.950670][T10618] syz-executor.1[10618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.079547][T10524] device veth0_vlan entered promiscuous mode [ 312.091780][T10628] syz-executor.1[10628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.104475][T10628] syz-executor.1[10628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.158968][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 312.179044][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 312.194770][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 312.202156][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 312.209466][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 312.217510][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 312.226438][T10524] device veth1_macvtap entered promiscuous mode [ 312.243960][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 312.251422][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 312.259512][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 312.267552][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 312.275491][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 312.775209][T10696] device syzkaller0 entered promiscuous mode [ 313.006881][T10700] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.013737][T10700] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.195321][T10700] device bridge_slave_0 entered promiscuous mode [ 313.247521][T10700] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.293620][T10700] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.301084][T10700] device bridge_slave_1 entered promiscuous mode [ 313.550210][ T516] device macsec0 left promiscuous mode [ 313.556797][ T516] bridge0: port 3(macsec0) entered disabled state [ 313.606365][ T516] device bridge_slave_1 left promiscuous mode [ 313.612317][ T516] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.631219][ T516] device bridge_slave_0 left promiscuous mode [ 313.645879][ T516] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.084108][T10754] device syzkaller0 entered promiscuous mode [ 314.109632][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 314.118368][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 314.137506][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 314.145630][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 314.154341][ T1623] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.161205][ T1623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.168680][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 314.176831][ T1623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 314.184793][ T1623] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.191699][ T1623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.229824][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 314.238272][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 314.245770][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 314.254211][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 314.335641][T10700] device veth0_vlan entered promiscuous mode [ 314.390427][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.408919][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.440581][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 314.468789][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 314.486500][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 314.540549][T10700] device veth1_macvtap entered promiscuous mode [ 314.577873][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 314.585330][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 314.608345][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 314.656138][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 314.695236][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 314.953866][T10814] device syzkaller0 entered promiscuous mode [ 315.237314][T10849] syz-executor.1[10849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.237378][T10849] syz-executor.1[10849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.408128][T10866] syz-executor.0[10866] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.419941][T10866] syz-executor.0[10866] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.562476][T10883] device sit0 entered promiscuous mode [ 315.855546][T10909] device syzkaller0 entered promiscuous mode [ 315.969654][T10941] syz-executor.1[10941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.969725][T10941] syz-executor.1[10941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.197919][T10971] device syzkaller0 entered promiscuous mode [ 316.378596][T10998] syz-executor.4[10998] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.378664][T10998] syz-executor.4[10998] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.519739][T11016] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 316.705125][T11039] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.712565][T11039] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.719895][T11039] device bridge_slave_0 entered promiscuous mode [ 316.726798][T11039] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.736098][T11039] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.743460][T11039] device bridge_slave_1 entered promiscuous mode [ 316.785872][T11049] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 318.145115][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 318.152946][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 318.216950][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 318.225117][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 318.241744][ T400] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.248633][ T400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.263068][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 318.271757][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 318.280118][ T400] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.286986][ T400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.306686][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 318.317546][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 318.325485][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 318.335703][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 318.343832][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 318.365508][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 318.374145][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 318.383152][T11089] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 318.405538][T11039] device veth0_vlan entered promiscuous mode [ 318.417129][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 318.425057][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 320.092252][T11039] device veth1_macvtap entered promiscuous mode [ 320.109953][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 320.118370][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 320.127874][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 320.135957][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 320.152412][ T516] device macsec0 left promiscuous mode [ 320.160536][ T516] bridge0: port 3(macsec0) entered disabled state [ 320.189153][ T516] device bridge_slave_1 left promiscuous mode [ 320.195223][ T516] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.212113][ T516] device bridge_slave_0 left promiscuous mode [ 320.218180][ T516] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.317088][T11126] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 320.356053][T11130] syz-executor.1[11130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.356129][T11130] syz-executor.1[11130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.434156][T11130] syz-executor.1[11130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.454993][T11130] syz-executor.1[11130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.472509][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 320.494875][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 320.503578][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 320.512366][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 321.174343][T11175] device syzkaller0 entered promiscuous mode [ 321.595194][T11189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 322.308217][T11311] device syzkaller0 entered promiscuous mode [ 323.155431][T11356] device syzkaller0 entered promiscuous mode [ 323.520631][T11399] device syzkaller0 entered promiscuous mode [ 324.672474][T11454] device syzkaller0 entered promiscuous mode [ 325.923080][T11540] device syzkaller0 entered promiscuous mode [ 325.952806][ T43] device bridge_slave_1 left promiscuous mode [ 325.969799][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.982240][ T43] device bridge_slave_0 left promiscuous mode [ 325.988313][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.996286][ T43] device veth1_macvtap left promiscuous mode [ 326.002176][ T43] device veth0_vlan left promiscuous mode [ 326.372649][T11532] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.388593][T11532] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.446502][T11532] device bridge_slave_0 entered promiscuous mode [ 326.504468][T11532] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.551638][T11532] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.586230][T11532] device bridge_slave_1 entered promiscuous mode [ 326.922584][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 326.930155][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 326.951953][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 326.968798][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 326.984598][ T344] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.991475][ T344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.057022][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 327.065324][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 327.074974][ T344] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.081847][ T344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.180015][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 327.221464][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 327.255886][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 327.278299][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 327.288307][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 327.296152][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 327.307493][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 327.314840][T11532] device veth0_vlan entered promiscuous mode [ 327.375082][T11532] device veth1_macvtap entered promiscuous mode [ 327.395879][T11189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 327.404699][T11189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 327.426807][T11189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 327.851098][T11639] device pim6reg1 entered promiscuous mode [ 327.974253][T11646] device sit0 entered promiscuous mode [ 328.607367][T11675] device sit0 entered promiscuous mode [ 328.759249][T11681] device pim6reg1 entered promiscuous mode [ 328.927783][T11683] device pim6reg1 entered promiscuous mode [ 330.126292][T11768] device veth0_vlan left promiscuous mode [ 330.156642][T11768] device veth0_vlan entered promiscuous mode [ 330.165208][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 330.182393][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 330.223966][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 330.505269][T11788] device pim6reg1 entered promiscuous mode [ 330.687013][T11798] device syzkaller0 entered promiscuous mode [ 330.749221][T11808] device pim6reg1 entered promiscuous mode [ 331.077738][T11828] device pim6reg1 entered promiscuous mode [ 331.592955][T11847] device sit0 left promiscuous mode [ 331.777415][T11854] device sit0 entered promiscuous mode [ 332.431785][T11905] device veth0_vlan left promiscuous mode [ 332.438206][T11905] device veth0_vlan entered promiscuous mode [ 332.612516][T11911] device pim6reg1 entered promiscuous mode [ 332.877460][T11927] device pim6reg1 entered promiscuous mode [ 332.932032][T11932] device veth0_vlan left promiscuous mode [ 332.961084][T11932] device veth0_vlan entered promiscuous mode [ 334.563944][T12025] device veth0_vlan left promiscuous mode [ 334.583822][T12025] device veth0_vlan entered promiscuous mode [ 335.289212][ T28] audit: type=1400 audit(1718290028.437:133): avc: denied { create } for pid=12064 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 335.415815][T12077] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 335.661548][T12087] device veth0_vlan left promiscuous mode [ 335.697548][T12087] device veth0_vlan entered promiscuous mode [ 335.749063][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 335.772061][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 335.790620][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 335.855393][T12097] device sit0 left promiscuous mode [ 335.978028][T12104] device sit0 entered promiscuous mode [ 336.214614][T12125] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 336.526411][T12146] device sit0 left promiscuous mode [ 336.784552][T12164] device sit0 entered promiscuous mode [ 337.468367][T12190] syz-executor.2[12190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.468436][T12190] syz-executor.2[12190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.595819][T12203] device pim6reg1 entered promiscuous mode [ 337.888591][T12222] syz-executor.3[12222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.888661][T12222] syz-executor.3[12222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.014955][T12227] device veth0_vlan left promiscuous mode [ 338.067728][T12227] device veth0_vlan entered promiscuous mode [ 338.368935][T12249] device pim6reg1 entered promiscuous mode [ 338.640678][T12261] syz-executor.2[12261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.640772][T12261] syz-executor.2[12261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.678262][T12257] device pim6reg1 entered promiscuous mode [ 339.026086][T12268] device syzkaller0 entered promiscuous mode [ 339.269407][T12288] syz-executor.2[12288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.269479][T12288] syz-executor.2[12288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.368172][T12282] device syzkaller0 entered promiscuous mode [ 339.584899][T12300] device pim6reg1 entered promiscuous mode [ 339.745137][T12313] device sit0 left promiscuous mode [ 339.773629][T12307] device sit0 entered promiscuous mode [ 339.848845][T12326] syz-executor.3[12326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.848918][T12326] syz-executor.3[12326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.233150][T12355] device pim6reg1 entered promiscuous mode [ 340.561817][T12361] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.568791][T12361] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.576649][T12361] device bridge_slave_0 entered promiscuous mode [ 340.584303][T12361] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.591467][T12361] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.599919][T12361] device bridge_slave_1 entered promiscuous mode [ 340.798081][T12387] device syzkaller0 entered promiscuous mode [ 341.050470][T12361] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.057358][T12361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.064441][T12361] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.071230][T12361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 341.180639][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 341.206474][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.246393][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.280516][ T516] device bridge_slave_1 left promiscuous mode [ 341.287623][ T516] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.299344][ T516] device bridge_slave_0 left promiscuous mode [ 341.366280][ T516] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.545539][T11189] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 341.557117][T11189] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.563973][T11189] bridge0: port 1(bridge_slave_0) entered forwarding state [ 341.579174][T12413] device pim6reg1 entered promiscuous mode [ 341.622873][T12420] device syzkaller0 entered promiscuous mode [ 341.639740][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 341.651444][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 341.674125][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.681008][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.771198][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 341.800836][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 341.843345][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 341.882594][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 341.977645][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 341.985787][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 342.039036][T12361] device veth0_vlan entered promiscuous mode [ 342.047066][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 342.066447][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 342.094151][T12361] device veth1_macvtap entered promiscuous mode [ 342.134927][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 342.150248][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 342.226643][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 342.234663][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 342.256697][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 342.264144][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 342.304574][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 342.312885][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 342.320907][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 342.350112][T12452] device veth0_vlan left promiscuous mode [ 342.364677][T12452] device veth0_vlan entered promiscuous mode [ 342.385408][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 342.395930][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 342.408298][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 342.446096][T12473] device syzkaller0 entered promiscuous mode [ 342.760493][T12504] device syzkaller0 entered promiscuous mode [ 343.451248][T12544] bpf_get_probe_write_proto: 10 callbacks suppressed [ 343.451266][T12544] syz-executor.2[12544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.540676][T12544] syz-executor.2[12544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.844477][T12569] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 343.947497][T12573] syz-executor.1[12573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.947570][T12573] syz-executor.1[12573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.100846][T12583] syz-executor.3[12583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.113475][T12583] syz-executor.3[12583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.371401][T12605] syz-executor.0[12605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.394142][T12605] syz-executor.0[12605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.486584][T12613] device sit0 left promiscuous mode [ 344.664878][T12619] device sit0 entered promiscuous mode [ 345.916728][T12690] syz-executor.3[12690] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.916865][T12690] syz-executor.3[12690] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.252986][T12847] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 349.939703][T12884] bpf_get_probe_write_proto: 6 callbacks suppressed [ 349.939722][T12884] syz-executor.1[12884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.948278][T12882] device syzkaller0 entered promiscuous mode [ 349.965858][T12884] syz-executor.1[12884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.147959][T12891] device syzkaller0 entered promiscuous mode [ 351.285181][T12920] device syzkaller0 entered promiscuous mode [ 351.790595][T12968] device pim6reg1 entered promiscuous mode [ 352.119073][T13000] device pim6reg1 entered promiscuous mode [ 353.086762][T13039] syz-executor.4[13039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.092663][T13039] syz-executor.4[13039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.709601][T13060] device syzkaller0 entered promiscuous mode [ 354.077877][T13078] syz-executor.4[13078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.081866][T13078] syz-executor.4[13078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.625889][T13138] device team_slave_0 entered promiscuous mode [ 355.762912][T13141] syz-executor.0[13141] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.764752][T13141] syz-executor.0[13141] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.069056][T13159] device syzkaller0 entered promiscuous mode [ 356.149491][ T28] audit: type=1400 audit(1718290049.297:134): avc: denied { create } for pid=13166 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 356.822811][T13184] syz-executor.3[13184] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.824255][T13184] syz-executor.3[13184] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.929957][T13200] device team_slave_0 entered promiscuous mode [ 356.963393][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 356.971611][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 357.486307][ T28] audit: type=1400 audit(1718290050.627:135): avc: denied { create } for pid=13230 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 357.629150][ T28] audit: type=1400 audit(1718290050.657:136): avc: denied { setopt } for pid=13230 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 358.295532][T13283] device sit0 left promiscuous mode [ 358.398414][ T28] audit: type=1400 audit(1718290051.547:137): avc: denied { read } for pid=13292 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 358.490506][ T28] audit: type=1400 audit(1718290051.597:138): avc: denied { write } for pid=13292 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 358.560065][T13291] device sit0 entered promiscuous mode [ 361.102692][T13426] device sit0 entered promiscuous mode [ 361.588172][ T28] audit: type=1400 audit(1718290054.737:139): avc: denied { write } for pid=13454 comm="syz-executor.3" name="task" dev="proc" ino=58795 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 361.745081][ T28] audit: type=1400 audit(1718290054.737:140): avc: denied { add_name } for pid=13454 comm="syz-executor.3" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 361.951648][ T28] audit: type=1400 audit(1718290054.737:141): avc: denied { create } for pid=13454 comm="syz-executor.3" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 362.079446][ T28] audit: type=1400 audit(1718290054.737:142): avc: denied { associate } for pid=13454 comm="syz-executor.3" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 362.406292][T13479] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.413152][T13479] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.442615][T13479] device bridge_slave_0 entered promiscuous mode [ 362.462584][T13479] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.497801][T13479] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.525686][T13479] device bridge_slave_1 entered promiscuous mode [ 362.539260][ T1152] device bridge_slave_1 left promiscuous mode [ 362.559689][ T1152] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.580488][ T1152] device bridge_slave_0 left promiscuous mode [ 362.591658][ T1152] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.616294][ T1152] device veth1_macvtap left promiscuous mode [ 362.622148][ T1152] device veth0_vlan left promiscuous mode [ 363.608477][ T28] audit: type=1400 audit(1718290056.757:143): avc: denied { create } for pid=13540 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 363.636452][T13541] device pim6reg1 entered promiscuous mode [ 363.683795][T13545] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 363.734704][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 363.742318][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 363.757155][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 363.765732][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 363.781901][ T1630] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.788826][ T1630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 363.813661][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 363.822022][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 363.851579][ T1630] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.858468][ T1630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 363.924674][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 363.936365][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 363.948076][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 364.037068][ T1288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 364.075506][T13479] device veth0_vlan entered promiscuous mode [ 364.112053][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 364.121799][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 364.136539][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 364.180794][T13479] device veth1_macvtap entered promiscuous mode [ 364.220485][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 364.248579][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 364.264087][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 364.347965][T13570] device pim6reg1 entered promiscuous mode [ 364.361344][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 364.410045][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 364.804153][T13592] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.811174][T13592] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.845708][T13597] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 364.871245][T13595] device pim6reg1 entered promiscuous mode [ 364.890637][T13592] ÿÿÿÿÿÿ: renamed from bridge0 [ 364.989174][ T28] audit: type=1400 audit(1718290058.137:144): avc: denied { create } for pid=13615 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 364.990397][T13603] device syzkaller0 entered promiscuous mode [ 365.018184][T13611] device pim6reg1 entered promiscuous mode [ 365.078959][T13624] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 366.063166][T13677] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 367.215043][T13771] device pim6reg1 entered promiscuous mode [ 367.530007][T13789] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 367.937941][T13816] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 368.089084][T13827] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 368.591296][T13865] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 369.167806][T13889] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 369.178296][T13894] EXT4-fs (sda1): Can't modify superblock whileperforming online resize [ 369.189742][T13898] device syzkaller0 entered promiscuous mode [ 369.235504][T13906] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 369.677649][T13940] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 370.532859][T13981] device syzkaller0 entered promiscuous mode [ 370.921066][T14014] device syzkaller0 entered promiscuous mode [ 370.992349][ T43] device macsec0 left promiscuous mode [ 370.999613][ T43] bridge0: port 3(macsec0) entered disabled state [ 371.006300][ T43] device bridge_slave_1 left promiscuous mode [ 371.012279][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.056535][ T43] device bridge_slave_0 left promiscuous mode [ 371.064460][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.073187][ T43] device veth1_macvtap left promiscuous mode [ 371.228699][T14004] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.235726][T14004] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.243005][T14004] device bridge_slave_0 entered promiscuous mode [ 371.272785][T14004] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.279796][T14004] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.287164][T14004] device bridge_slave_1 entered promiscuous mode [ 371.333444][T14021] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.358775][T14021] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.383563][T14021] device bridge_slave_0 entered promiscuous mode [ 371.431897][T14021] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.439229][T14021] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.460818][T14021] device bridge_slave_1 entered promiscuous mode [ 371.701274][T14004] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.708163][T14004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.715239][T14004] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.722056][T14004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.751387][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.767447][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.912895][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 371.933619][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 371.976266][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 371.993458][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 372.027575][ T1630] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.034519][ T1630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 372.063626][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 372.078651][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 372.094242][ T1630] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.101112][ T1630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 372.140625][T14004] device veth0_vlan entered promiscuous mode [ 372.154007][T14004] device veth1_macvtap entered promiscuous mode [ 372.162811][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 372.179570][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 372.189869][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 372.197960][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 372.205628][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 372.213812][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 372.221953][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 372.229769][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 372.237430][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 372.245238][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 372.252981][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 372.260583][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 372.267909][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 372.299394][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 372.307739][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 372.318548][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 372.338659][ T1630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 372.385849][T14092] device syzkaller0 entered promiscuous mode [ 372.394534][T14088] tap0: tun_chr_ioctl cmd 1074025677 [ 372.399917][T14088] tap0: linktype set to 804 [ 372.445026][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 372.452398][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 372.460354][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 372.469516][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 372.477725][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.484588][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 372.501925][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 372.511518][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 372.520212][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.527058][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 372.534342][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 372.542401][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 372.550590][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 372.558545][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 372.586010][T14097] device syzkaller0 entered promiscuous mode [ 372.613083][T14021] device veth0_vlan entered promiscuous mode [ 372.632657][T14021] device veth1_macvtap entered promiscuous mode [ 372.646611][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 372.654841][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 372.663584][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 372.670885][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 372.691910][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 372.700653][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 372.733745][T11189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 372.759986][T11189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 372.781322][T11189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 372.796690][T11189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 372.867723][ T43] device bridge_slave_1 left promiscuous mode [ 372.873667][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.894663][ T43] device bridge_slave_0 left promiscuous mode [ 372.903190][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.969009][ T43] device veth1_macvtap left promiscuous mode [ 373.610902][T14172] tap0: tun_chr_ioctl cmd 1074025677 [ 373.616045][T14172] tap0: linktype set to 804 [ 373.628336][T14178] device veth1_macvtap left promiscuous mode [ 373.683553][T14178] device veth1_macvtap entered promiscuous mode [ 373.731449][T14178] device macsec0 entered promiscuous mode [ 374.352441][T14203] device syzkaller0 entered promiscuous mode [ 374.597238][ T43] device bridge_slave_1 left promiscuous mode [ 374.606542][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.675458][ T43] device bridge_slave_0 left promiscuous mode [ 374.735961][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.762233][ T43] device veth1_macvtap left promiscuous mode [ 374.826298][ T43] device veth0_vlan left promiscuous mode [ 375.311316][T14244] device veth1_macvtap left promiscuous mode [ 375.326281][T14244] device macsec0 left promiscuous mode [ 375.384861][T14244] device veth1_macvtap entered promiscuous mode [ 375.396767][T14244] device macsec0 entered promiscuous mode [ 376.010070][T14282] device veth1_macvtap left promiscuous mode [ 376.078525][T14284] device veth1_macvtap entered promiscuous mode [ 376.146397][T14284] device macsec0 entered promiscuous mode [ 376.952602][T14334] device syzkaller0 entered promiscuous mode [ 378.436284][T14408] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.443309][T14408] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.648452][T14408] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.655310][T14408] bridge0: port 2(bridge_slave_1) entered forwarding state [ 378.662465][T14408] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.669318][T14408] bridge0: port 1(bridge_slave_0) entered forwarding state [ 378.868787][T14408] device bridge0 entered promiscuous mode [ 379.138180][T14417] syz-executor.3[14417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.138252][T14417] syz-executor.3[14417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.374365][T14417] syz-executor.3[14417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.424706][T14430] syz-executor.3[14430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.525726][T14430] syz-executor.3[14430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.581488][T14417] syz-executor.3[14417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.979270][T14658] syz-executor.0[14658] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.029619][T14661] syz-executor.0[14661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.041252][T14658] syz-executor.0[14658] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.079688][T14661] syz-executor.0[14661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.125304][T14674] Â: renamed from pim6reg1 [ 384.410647][T14708] device syzkaller0 entered promiscuous mode [ 384.427246][T14704] Â: renamed from pim6reg1 [ 384.623633][T14741] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.630674][T14741] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.659301][T14741] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.666193][T14741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 384.673293][T14741] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.680071][T14741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 384.687709][T14741] device bridge0 entered promiscuous mode [ 385.733156][T14850] Â: renamed from pim6reg1 [ 387.320958][T14959] device syzkaller0 entered promiscuous mode [ 388.301974][T14992] device syzkaller0 entered promiscuous mode [ 389.852835][T15048] device syzkaller0 entered promiscuous mode [ 390.716218][ T28] audit: type=1400 audit(1718290083.857:145): avc: denied { write } for pid=15075 comm="syz-executor.3" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 391.073283][T15095] device macsec0 entered promiscuous mode [ 395.837459][T15174] device sit0 entered promiscuous mode [ 396.383287][T15232] device syzkaller0 entered promiscuous mode [ 396.391086][T11189] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 397.477241][T15321] device syzkaller0 entered promiscuous mode [ 397.498129][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 397.680062][T15356] device sit0 left promiscuous mode [ 397.743098][T15356] device sit0 entered promiscuous mode [ 397.882181][T15381] device pim6reg1 entered promiscuous mode [ 397.903206][T15384] device syzkaller0 entered promiscuous mode [ 397.920788][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 398.354313][T15423] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.663067][T15444] device macsec0 entered promiscuous mode [ 398.757909][T15449] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.087150][T15484] syz-executor.2[15484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.087212][T15484] syz-executor.2[15484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.104198][T15484] syz-executor.2[15484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.116703][T15484] syz-executor.2[15484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.194450][T15542] device syzkaller0 entered promiscuous mode [ 400.342904][T15550] syz-executor.4[15550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.342978][T15550] syz-executor.4[15550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.416042][T15550] syz-executor.4[15550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.477603][T15550] syz-executor.4[15550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.862833][T15577] device sit0 entered promiscuous mode [ 401.250547][T15615] device sit0 left promiscuous mode [ 401.374048][T15619] device syzkaller0 entered promiscuous mode [ 401.404995][T15615] device sit0 entered promiscuous mode [ 401.610049][T15624] syz-executor.4[15624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.610119][T15624] syz-executor.4[15624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.961196][T15647] device sit0 left promiscuous mode [ 402.038680][T15654] device sit0 left promiscuous mode [ 402.077936][T15647] device sit0 entered promiscuous mode [ 402.241278][T15654] device sit0 entered promiscuous mode [ 403.558615][T15743] device sit0 left promiscuous mode [ 403.656298][T15743] device sit0 entered promiscuous mode [ 403.772973][T15757] device sit0 left promiscuous mode [ 403.832377][T15762] device sit0 entered promiscuous mode [ 404.632909][T15801] device sit0 entered promiscuous mode [ 406.614343][ T28] audit: type=1400 audit(1718290099.757:146): avc: denied { create } for pid=15892 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 407.524810][T15947] device syzkaller0 entered promiscuous mode [ 407.773214][T15952] device sit0 entered promiscuous mode [ 408.632840][T15988] device pim6reg1 entered promiscuous mode [ 409.891672][T16059] syz-executor.3[16059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.891739][T16059] syz-executor.3[16059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.088740][T16072] device pim6reg1 entered promiscuous mode [ 410.445309][T16085] syz-executor.1[16085] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.445857][T16085] syz-executor.1[16085] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.486058][T16085] syz-executor.1[16085] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.507401][T16085] syz-executor.1[16085] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.211430][T16116] device syzkaller0 entered promiscuous mode [ 411.745575][T16145] device syzkaller0 entered promiscuous mode [ 412.282506][T16164] device syzkaller0 entered promiscuous mode [ 413.355593][T16200] device syzkaller0 entered promiscuous mode [ 415.219703][T16255] device syzkaller0 entered promiscuous mode [ 415.857079][T16295] device macsec0 left promiscuous mode [ 418.276903][T16377] syz-executor.2[16377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.276965][T16377] syz-executor.2[16377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.362419][T16377] syz-executor.2[16377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.449044][T16393] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) [ 418.518034][T16377] syz-executor.2[16377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.631136][T16384] device syzkaller0 entered promiscuous mode [ 419.040650][T16431] device syzkaller0 entered promiscuous mode [ 419.350508][T16448] device syzkaller0 entered promiscuous mode [ 419.550659][T16459] syz-executor.2[16459] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.550729][T16459] syz-executor.2[16459] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.165569][T16484] syz-executor.2[16484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.262870][T16484] syz-executor.2[16484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.966471][T16530] device veth1_macvtap left promiscuous mode [ 421.016445][T16530] device macsec0 left promiscuous mode [ 421.481854][T16532] device syzkaller0 entered promiscuous mode [ 421.740346][T16571] syz-executor.0[16571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.740410][T16571] syz-executor.0[16571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.231144][T16681] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 425.250497][T16681] #PF: supervisor instruction fetch in kernel mode [ 425.256828][T16681] #PF: error_code(0x0010) - not-present page [ 425.262644][T16681] PGD 139228067 P4D 139228067 PUD 12b1db067 PMD 0 [ 425.268981][T16681] Oops: 0010 [#1] PREEMPT SMP KASAN [ 425.274029][T16681] CPU: 1 PID: 16681 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00007-g7c734edeaafd #0 [ 425.284081][T16681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 425.293981][T16681] RIP: 0010:0x0 [ 425.297276][T16681] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 425.304479][T16681] RSP: 0018:ffffc900009a7908 EFLAGS: 00010246 [ 425.310378][T16681] RAX: 1ffff110251daf17 RBX: ffff888128ed78b8 RCX: 0000000000040000 [ 425.318192][T16681] RDX: ffffc90007d91000 RSI: 0000000000035bb0 RDI: ffff8881350879c0 2024/06/13 14:48:38 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 425.326003][T16681] RBP: ffffc900009a7930 R08: ffffffff841d7de7 R09: ffff8881002a7080 [ 425.333814][T16681] R10: 0000000000000010 R11: dffffc0000000001 R12: 0000000000000004 [ 425.341625][T16681] R13: dffffc0000000000 R14: ffff8881350879c0 R15: dffffc0000000000 [ 425.349436][T16681] FS: 00007efc24e5c6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 425.358204][T16681] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 425.364625][T16681] CR2: ffffffffffffffd6 CR3: 000000012cb62000 CR4: 00000000003506a0 [ 425.372441][T16681] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 425.380254][T16681] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 425.388061][T16681] Call Trace: [ 425.391183][T16681] [ 425.393963][T16681] ? __die_body+0x62/0xb0 [ 425.398129][T16681] ? __die+0x7e/0x90 [ 425.401859][T16681] ? page_fault_oops+0x7f9/0xa90 [ 425.406635][T16681] ? kernelmode_fixup_or_oops+0x270/0x270 [ 425.412185][T16681] ? kmem_cache_free+0x291/0x510 [ 425.416961][T16681] ? kfree_skbmem+0x104/0x170 [ 425.421482][T16681] ? preempt_schedule_notrace+0x140/0x140 [ 425.427033][T16681] ? is_errata93+0xc7/0x240 [ 425.431371][T16681] ? exc_page_fault+0x537/0x700 [ 425.436058][T16681] ? asm_exc_page_fault+0x27/0x30 [ 425.440920][T16681] ? sk_psock_verdict_data_ready+0xf7/0x160 [ 425.446646][T16681] sk_psock_verdict_data_ready+0x129/0x160 [ 425.452289][T16681] unix_stream_sendmsg+0x8fd/0x1070 [ 425.457324][T16681] ? unix_stream_sendmsg+0x821/0x1070 [ 425.462534][T16681] ? unix_show_fdinfo+0x2f0/0x2f0 [ 425.467394][T16681] ? security_socket_sendmsg+0x82/0xb0 [ 425.472681][T16681] ? unix_show_fdinfo+0x2f0/0x2f0 [ 425.477545][T16681] ____sys_sendmsg+0x5d3/0x9a0 [ 425.482148][T16681] ? __sys_sendmsg_sock+0x40/0x40 [ 425.487015][T16681] __sys_sendmsg+0x2a9/0x390 [ 425.491432][T16681] ? ____sys_sendmsg+0x9a0/0x9a0 [ 425.496217][T16681] ? restore_fpregs_from_fpstate+0xfc/0x230 [ 425.501938][T16681] ? __kasan_check_write+0x14/0x20 [ 425.506882][T16681] ? fpregs_restore_userregs+0x130/0x290 [ 425.512348][T16681] __x64_sys_sendmsg+0x7f/0x90 [ 425.516950][T16681] do_syscall_64+0x3d/0xb0 [ 425.521206][T16681] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 425.526845][T16681] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 425.532569][T16681] RIP: 0033:0x7efc2407cea9 [ 425.536825][T16681] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 425.556267][T16681] RSP: 002b:00007efc24e5c0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 425.564512][T16681] RAX: ffffffffffffffda RBX: 00007efc241b3f80 RCX: 00007efc2407cea9 [ 425.572325][T16681] RDX: 0000000000000003 RSI: 0000000020000980 RDI: 0000000000000004 [ 425.580136][T16681] RBP: 00007efc240ebff4 R08: 0000000000000000 R09: 0000000000000000 [ 425.587946][T16681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 425.595754][T16681] R13: 000000000000000b R14: 00007efc241b3f80 R15: 00007fff7f9d9868 [ 425.603578][T16681] [ 425.606432][T16681] Modules linked in: [ 425.610184][T16681] CR2: 0000000000000000 [ 425.614157][T16681] ---[ end trace 0000000000000000 ]--- [ 425.619450][T16681] RIP: 0010:0x0 [ 425.622753][T16681] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 425.629955][T16681] RSP: 0018:ffffc900009a7908 EFLAGS: 00010246 [ 425.635856][T16681] RAX: 1ffff110251daf17 RBX: ffff888128ed78b8 RCX: 0000000000040000 [ 425.643664][T16681] RDX: ffffc90007d91000 RSI: 0000000000035bb0 RDI: ffff8881350879c0 [ 425.651479][T16681] RBP: ffffc900009a7930 R08: ffffffff841d7de7 R09: ffff8881002a7080 [ 425.659294][T16681] R10: 0000000000000010 R11: dffffc0000000001 R12: 0000000000000004 [ 425.667104][T16681] R13: dffffc0000000000 R14: ffff8881350879c0 R15: dffffc0000000000 [ 425.674912][T16681] FS: 00007efc24e5c6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 425.683678][T16681] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 425.690101][T16681] CR2: ffffffffffffffd6 CR3: 000000012cb62000 CR4: 00000000003506a0 [ 425.697917][T16681] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 425.705721][T16681] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 425.713536][T16681] Kernel panic - not syncing: Fatal exception [ 425.719648][T16681] Kernel Offset: disabled [ 425.723765][T16681] Rebooting in 86400 seconds..