last executing test programs: 2.338899762s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001bc0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18010027cf081000000000000000000081"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='ext4_fallocate_exit\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='ext4_fallocate_exit\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000040)) 2.203644223s ago: executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_da_write_pages_extent\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000380)='ext4_da_write_pages_extent\x00', r3}, 0x10) write$cgroup_int(r0, &(0x7f0000000700), 0x12) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 2.065551634s ago: executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x0, 0x0, 0x9, 0x200, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3, 0x4}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x100000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000180), 0x12) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002580)=ANY=[@ANYBLOB="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"/4081], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000055c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f97ce02f933134cda3a43785ba1979608232af6a30f90a9c017652689217c707e90b23f59db8f8fef13288689f34c1ea1575f8cb973bdea2efdda0c250c0453a51e6f09efc91d70770c2d4285bf84bb43b671bc0431de978298842a9ad183d196f9efd85b0686bba1c3016072d56c86b37897479ca83e12947d2fe64a7e4c11c87e30103109035f84e8a37f89026d5833866c343d453905a8490347b16ddec97d16a7f383d88057afcb6b15095eae9cdd3b8721de72567045ab2b8c3b0112a27aa730d40c1f020ea04866f94ce36bd4369ead3af0ac5ecceed6669d2069cf3b797cab4fb1ab6151baa4a0f3f095f8a3ab2ebdd1df79024d3b0"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x147fde, 0x80, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f00000000c0)={r3, &(0x7f0000000180), 0x0}, 0x20) 1.998979734s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000ffd0569a8fb44183deb6c92a38deb5c05bfdd913d1728d5389b8dbd46968d1421df5e5f14860de160916757ac578558823bb8ec123b2b033783d02895ff14fad78265abd7983af21f4bd519f7e8cc5cacff941886e3ef66e1c98c586fbceee774e85c290bc"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{r2}, &(0x7f0000000680), &(0x7f00000006c0)='%+9llu \x00'}, 0x20) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0x6, 0xa, 0x105, 0xffffffffffffffff, 0x4fb6c8f3, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe001811", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000940)='kmem_cache_free\x00', r3}, 0x10) (async) close(0xffffffffffffffff) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x10) (async, rerun: 64) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r5}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x40021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (async, rerun: 32) bpf$MAP_CREATE(0x0, 0x0, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.906919619s ago: executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r1, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f00000003c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_alloc\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r5, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 1.823384181s ago: executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_da_write_pages_extent\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000380)='ext4_da_write_pages_extent\x00', r3}, 0x10) write$cgroup_int(r0, &(0x7f0000000700), 0x12) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 1.704738539s ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x7, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r1}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x0, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000000)={{r2}, &(0x7f0000000040), &(0x7f0000000380)='%pi6 \x00'}, 0x29) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0300000000000000b7085cfc182e17c7bf618c588ae1f28a000000003c45da19ab00007b8af8ff00000000bfa20000000000000702e8fff8ffffffb703000008000000b704000000f6ffff84000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000), 0x248800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000340)='ext4_remove_blocks\x00'}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000080)='ext4_remove_blocks\x00', r5}, 0x40) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.stat\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r6, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 1.638628779s ago: executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x7d5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000407b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r8}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\xff\xd3r\xa3\xc81U\x8ez.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcd\x01t\r=\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') 1.627348251s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000440)='kfree\x00', r3}, 0x10) socketpair(0x2, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='ext4_es_lookup_extent_enter\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='ext4_es_lookup_extent_enter\x00', r8}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x3, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="660a00000000000063110a00000000001800000000000000000000000000000095000000f33a6000"], &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='ext4_ext_handle_unwritten_extents\x00', r5}, 0x9) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='ext4_ext_handle_unwritten_extents\x00', r9}, 0x9) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x40305839, &(0x7f0000000540)={'\x00', @link_local={0x1, 0x80, 0xc2, 0x5}}) 1.523125657s ago: executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 32) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x2, 0xc}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18040000000000000000000000400000850000000800000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='scsi_dispatch_cmd_start\x00', r2}, 0x10) (async) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) (async, rerun: 64) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0xf}) (async, rerun: 64) socketpair(0x1, 0x5, 0x7, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a2, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0xb, 0x42, 0x40}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000001080), 0x20101, r4}, 0x38) 1.484490613s ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xbff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r1}, 0x10) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40086607, 0x20001412) 1.062301928s ago: executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x0, 0x0, 0x9, 0x200, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3, 0x4}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x100000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000180), 0x12) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002580)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cf84ded40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c86e00f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec231fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06de269e97fbb0776bf56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895012f1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f01000080000000004febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d37261774cc5a3bf6b466cb72812da518ff602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d50a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2e9a20000000000000000000000000000000000009a9823fd8fbc5aa165099c5ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1015ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a3174b531f573fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846899c6b23c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33694f40000000000005d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b95bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953f88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a5fe1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8504611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c01446234437b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c64cd14c61322a5ac2d371a95b8ad867ec92d13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e87973d574ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9ea81232fbef665f6212f875b2a00000000000000aceb111b66a500ca52fd8f848088c67ee65dfdcc4c580e9bc18c1699dca07d019bf1bf9dd3da480d6c155d7e60674ce88ab5ae07a9d16e22792d99986b531ab4e592ab5925da779e700cf20309a2137877690dc5c07956fc82d7b3bb46d3138041af18508938c9be4e5d0a98073463a5cff6c146d020743da474cb81677a6f389f0e00c33b70b7f8bab95435c27167f365a29fb09cbf35bf192f6a65616fa2ad9a6c7ca3a3ecd96aaecd993e8badb40e7eb8a22b0015e70c885cd519e28448168c6d914265998bff74ea1b0e651a6cae9419096248a0e41573827ad60fafce6e6540734c1f23f75337d836c31497e8112969a039d65aa297e2b046b5f4d11116a89f9f65693d4dc3e70fbfe0b2044fdb3f87e887d1daae8e38a0c19f668f776e19a02bb2449ee4384f6536879c85d7e41bc0276ee2b125d41ff358323311703ec01d64a573bdeb75bdcc87d01de38365ab9222713d2d1640a742d62fefb5403b2ed9969c32a0841e8c36b0107bb888eb14ac62e6d4bdfaeb9ee7430100bf3825a19d6c8997ce285edf1d277ed703f560460417bfe702af833e83c5b987befb6d1fcf765ab7ea537d9dafb622a1ba8686cb150963b84470364942e90d1cf856cead864f5e38c83b9ed86cc5725a20299ce512b16500"/4081], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000055c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r2}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x147fde, 0x80, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f00000000c0)={r3, &(0x7f0000000180), 0x0}, 0x20) 1.004086226s ago: executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x0, 0x0, 0x9, 0x200, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3, 0x4}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x100000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000180), 0x12) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002580)=ANY=[@ANYBLOB="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"/4081], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000055c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x147fde, 0x80, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f00000000c0)={r3, &(0x7f0000000180), 0x0}, 0x20) 964.129293ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x7, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r1}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x0, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000000)={{r2}, &(0x7f0000000040), &(0x7f0000000380)='%pi6 \x00'}, 0x29) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0300000000000000b7085cfc182e17c7bf618c588ae1f28a000000003c45da19ab00007b8af8ff00000000bfa20000000000000702e8fff8ffffffb703000008000000b704000000f6ffff84000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000), 0x248800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000340)='ext4_remove_blocks\x00'}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000080)='ext4_remove_blocks\x00', r5}, 0x40) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.stat\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r6, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 877.715836ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000f800b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x4}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000ffffff7f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r3}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb01100a04000000050000000000d9ae0cef9989393c0000000000000000000000000000461f4472dc8ef939ab35a8c6cf"], &(0x7f0000000a40)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r4, 0x58, &(0x7f00000001c0)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r1}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r5, 0x0, 0x0}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 862.016088ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000440)='kfree\x00', r3}, 0x10) socketpair(0x2, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='ext4_es_lookup_extent_enter\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='ext4_es_lookup_extent_enter\x00', r8}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x3, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="660a00000000000063110a00000000001800000000000000000000000000000095000000f33a6000"], &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='ext4_ext_handle_unwritten_extents\x00', r5}, 0x9) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='ext4_ext_handle_unwritten_extents\x00', r9}, 0x9) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x40305839, &(0x7f0000000540)={'\x00', @link_local={0x1, 0x80, 0xc2, 0x5}}) 860.529738ms ago: executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r1, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f00000003c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_alloc\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r5, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 724.908889ms ago: executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000080000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='mmap_lock_acquire_returned\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00'}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x58, &(0x7f0000000080)}, 0x10) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000080000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='mmap_lock_acquire_returned\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00'}, 0x10) (async) unlink(&(0x7f0000000140)='./cgroup\x00') (async) 680.120056ms ago: executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x400109d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x3, 0xfff, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r2}, &(0x7f0000000540), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) 611.195336ms ago: executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x401c5820, &(0x7f0000000000)=0x8000) close(r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000003c0)='fib6_table_lookup\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0), 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) 528.423139ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xbff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r2}, 0x10) ioctl$TUNSETOFFLOAD(r1, 0x40086607, 0x0) 415.978166ms ago: executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x3, &(0x7f0000000480)=@framed={{0x18, 0x2}}, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_da_write_pages_extent\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000380)='ext4_da_write_pages_extent\x00', r3}, 0x10) write$cgroup_int(r0, &(0x7f0000000700), 0x12) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 399.896639ms ago: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller0\x00', 0x7101}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_devices(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="1e031800dd5c980128854d"], 0xffdd) 285.756446ms ago: executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x0, 0x0, 0x9, 0x200, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3, 0x4}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x100000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000180), 0x12) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002580)=ANY=[@ANYBLOB="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"/4081], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000055c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x147fde, 0x80, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f00000000c0)={r2, &(0x7f0000000180), 0x0}, 0x20) 159.371615ms ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x10000}, 0x0, 0x40000, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00'}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000040)) 129.99953ms ago: executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller0\x00', 0x7101}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_devices(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="1e031800dd5c980128854d"], 0xffdd) 99.732145ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x7, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r1}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000000)={{r2}, &(0x7f0000000040), &(0x7f0000000380)='%pi6 \x00'}, 0x29) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0300000000000000b7085cfc182e17c7bf618c588ae1f28a000000003c45da19ab00007b8af8ff00000000bfa20000000000000702e8fff8ffffffb703000008000000b704000000f6ffff84000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000), 0x248800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000340)='ext4_remove_blocks\x00'}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000080)='ext4_remove_blocks\x00', r5}, 0x40) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.stat\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r6, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 30.476205ms ago: executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x0, 0x0, 0x9, 0x200, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3, 0x4}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x100000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000180), 0x12) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002580)=ANY=[@ANYBLOB="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"/4081], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000055c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x147fde, 0x80, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f00000000c0)={r3, &(0x7f0000000180), 0x0}, 0x20) 17.418537ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000440)='kfree\x00', r3}, 0x10) socketpair(0x2, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='ext4_es_lookup_extent_enter\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='ext4_es_lookup_extent_enter\x00', r8}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x3, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="660a00000000000063110a00000000001800000000000000000000000000000095000000f33a6000"], &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='ext4_ext_handle_unwritten_extents\x00', r5}, 0x9) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='ext4_ext_handle_unwritten_extents\x00', r9}, 0x9) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x40305839, &(0x7f0000000540)={'\x00', @link_local={0x1, 0x80, 0xc2, 0x5}}) 0s ago: executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r1, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f00000003c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_alloc\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r5, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.66' (ED25519) to the list of known hosts. 2024/06/01 21:49:39 fuzzer started 2024/06/01 21:49:39 dialing manager at 10.128.0.163:30010 [ 20.065586][ T30] audit: type=1400 audit(1717278579.642:66): avc: denied { node_bind } for pid=282 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 20.069146][ T30] audit: type=1400 audit(1717278579.642:67): avc: denied { name_bind } for pid=282 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 20.091855][ T30] audit: type=1400 audit(1717278579.662:68): avc: denied { mounton } for pid=290 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.097995][ T291] cgroup: Unknown subsys name 'net' [ 20.123389][ T291] cgroup: Unknown subsys name 'devices' [ 20.124708][ T30] audit: type=1400 audit(1717278579.662:69): avc: denied { mount } for pid=290 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.153890][ T30] audit: type=1400 audit(1717278579.662:70): avc: denied { integrity } for pid=291 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 20.162822][ T293] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.188715][ T30] audit: type=1400 audit(1717278579.662:71): avc: denied { mounton } for pid=291 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.213558][ T30] audit: type=1400 audit(1717278579.662:72): avc: denied { mount } for pid=291 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.235473][ T30] audit: type=1400 audit(1717278579.692:73): avc: denied { unmount } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.255234][ T30] audit: type=1400 audit(1717278579.702:74): avc: denied { setattr } for pid=294 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.278317][ T30] audit: type=1400 audit(1717278579.762:75): avc: denied { relabelto } for pid=293 comm="mkswap" name="swap-file" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.306793][ T292] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.356108][ T291] cgroup: Unknown subsys name 'hugetlb' [ 20.361567][ T291] cgroup: Unknown subsys name 'rlimit' 2024/06/01 21:49:40 starting 5 executor processes [ 21.033943][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.040911][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.048690][ T306] device bridge_slave_0 entered promiscuous mode [ 21.056425][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.070513][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.078643][ T306] device bridge_slave_1 entered promiscuous mode [ 21.165852][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.172703][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.180054][ T307] device bridge_slave_0 entered promiscuous mode [ 21.187674][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.194656][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.201688][ T307] device bridge_slave_1 entered promiscuous mode [ 21.270132][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.277022][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.284067][ T308] device bridge_slave_0 entered promiscuous mode [ 21.294620][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.301457][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.308701][ T313] device bridge_slave_0 entered promiscuous mode [ 21.316656][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.323489][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.330762][ T313] device bridge_slave_1 entered promiscuous mode [ 21.337206][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.344042][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.351189][ T308] device bridge_slave_1 entered promiscuous mode [ 21.363611][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.370629][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.377652][ T312] device bridge_slave_0 entered promiscuous mode [ 21.395709][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.402553][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.410097][ T312] device bridge_slave_1 entered promiscuous mode [ 21.455466][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.462313][ T306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.469458][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.476252][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.583822][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.590696][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.597792][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.604581][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.615031][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.623049][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.631912][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.639064][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.647760][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.655001][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.689803][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.705352][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.728381][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.738953][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.757485][ T306] device veth0_vlan entered promiscuous mode [ 21.766701][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.780219][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.787458][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.794741][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.802710][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.811569][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.818419][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.825649][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.833574][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.840409][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.847775][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.872196][ T306] device veth1_macvtap entered promiscuous mode [ 21.884519][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.893333][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.903091][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.910981][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.917741][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.924909][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.932800][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.939554][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.946743][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.954499][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.962294][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.970024][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.977991][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.984831][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.991932][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.999857][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.006684][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.013808][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.021731][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.028566][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.035738][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.043647][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.050472][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.057813][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.065405][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.072839][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.084142][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.091986][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.112392][ T313] device veth0_vlan entered promiscuous mode [ 22.122757][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.131174][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.139044][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.146881][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.154787][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.162691][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.170734][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.178694][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.187084][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.194870][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.202604][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.210496][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.218202][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.226429][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.234578][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.242167][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.250071][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.257514][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.267427][ T313] device veth1_macvtap entered promiscuous mode [ 22.278258][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.286182][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.294038][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.301748][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.309839][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.318209][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.326245][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.339405][ T307] device veth0_vlan entered promiscuous mode [ 22.345404][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.353759][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.361937][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.369659][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.380652][ T308] device veth0_vlan entered promiscuous mode [ 22.395341][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.402576][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.409907][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.417526][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.425467][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.433402][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.442939][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.450231][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.463782][ T308] device veth1_macvtap entered promiscuous mode [ 22.486121][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.494061][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.504427][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.511882][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.519988][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.528000][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.536369][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.544577][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.552723][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.561379][ T307] device veth1_macvtap entered promiscuous mode [ 22.570207][ T312] device veth0_vlan entered promiscuous mode [ 22.580725][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.589023][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.597016][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.604935][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.612936][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.645692][ T312] device veth1_macvtap entered promiscuous mode [ 22.657258][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.664733][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.671952][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.681795][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.690513][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.699430][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.711745][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.722641][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.732110][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.749721][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.757813][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.783288][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.801084][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.894315][ T312] syz-executor.2 (312) used greatest stack depth: 20912 bytes left [ 24.054085][ C0] sched: RT throttling activated [ 25.876313][ C0] hrtimer: interrupt took 26933 ns [ 25.933138][ T391] syz-executor.3[391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.933207][ T391] syz-executor.3[391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.007727][ T377] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.030382][ T377] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.049460][ T377] device bridge_slave_0 entered promiscuous mode [ 26.072491][ T377] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.083462][ T377] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.091538][ T377] device bridge_slave_1 entered promiscuous mode [ 26.128553][ T380] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.140990][ T380] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.157224][ T380] device bridge_slave_0 entered promiscuous mode [ 26.201235][ T380] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.209988][ T380] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.218896][ T380] device bridge_slave_1 entered promiscuous mode [ 26.231531][ T404] device pim6reg1 entered promiscuous mode [ 26.331177][ T377] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.338167][ T377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.345255][ T377] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.353651][ T377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.407696][ T10] device bridge_slave_1 left promiscuous mode [ 26.414009][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.423198][ T30] kauditd_printk_skb: 34 callbacks suppressed [ 26.423210][ T30] audit: type=1400 audit(1717278585.992:110): avc: denied { setopt } for pid=405 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.455060][ T10] device bridge_slave_0 left promiscuous mode [ 26.462159][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.474163][ T10] device veth1_macvtap left promiscuous mode [ 26.480078][ T10] device veth0_vlan left promiscuous mode [ 26.589041][ T380] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.595923][ T380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.602990][ T380] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.609811][ T380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.621520][ T30] audit: type=1400 audit(1717278586.192:111): avc: denied { create } for pid=411 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 26.642330][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.651023][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.675373][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.685347][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.692584][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.851728][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.879535][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.984477][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.992272][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.120888][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.184599][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.191452][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.307477][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.381959][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.388838][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.499196][ T377] device veth0_vlan entered promiscuous mode [ 27.544517][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.575993][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.645575][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.719906][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.819234][ T377] device veth1_macvtap entered promiscuous mode [ 27.887802][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.924556][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.926781][ T438] syz-executor.1[438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.932435][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.945921][ T438] syz-executor.1[438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.960313][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.981238][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.991229][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.000925][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.012781][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.022394][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.032523][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.043020][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.059516][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.068404][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.077010][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.084682][ T363] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.104193][ T380] device veth0_vlan entered promiscuous mode [ 28.112033][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.132387][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.148530][ T380] device veth1_macvtap entered promiscuous mode [ 28.172271][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.190949][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.200349][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.214595][ T450] device wg2 entered promiscuous mode [ 28.235834][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.243940][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.277152][ T452] syz-executor.4[452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.277209][ T452] syz-executor.4[452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.289449][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.313978][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.506999][ T471] syz-executor.2[471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.507064][ T471] syz-executor.2[471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.565157][ T473] syz-executor.2[473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.581445][ T473] syz-executor.2[473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.842696][ T30] audit: type=1400 audit(1717278588.412:112): avc: denied { create } for pid=525 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 28.956407][ T30] audit: type=1400 audit(1717278588.422:113): avc: denied { create } for pid=525 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 29.073333][ T10] device bridge_slave_1 left promiscuous mode [ 29.081805][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.101330][ T10] device bridge_slave_0 left promiscuous mode [ 29.119348][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.146922][ T10] device veth1_macvtap left promiscuous mode [ 29.186469][ T10] device veth0_vlan left promiscuous mode [ 29.234009][ T30] audit: type=1400 audit(1717278588.802:114): avc: denied { create } for pid=553 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 32.081147][ T785] bpf_get_probe_write_proto: 12 callbacks suppressed [ 32.081165][ T785] syz-executor.2[785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.095542][ T785] syz-executor.2[785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.135543][ T30] audit: type=1400 audit(1717278591.712:115): avc: denied { create } for pid=791 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 32.753996][ T888] device syzkaller0 entered promiscuous mode [ 33.441550][ T988] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 34.011567][ T30] audit: type=1400 audit(1717278593.582:116): avc: denied { create } for pid=1045 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 34.541207][ T1100] device syzkaller0 entered promiscuous mode [ 34.772355][ T30] audit: type=1400 audit(1717278594.342:117): avc: denied { relabelfrom } for pid=1130 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.804690][ T30] audit: type=1400 audit(1717278594.342:118): avc: denied { relabelto } for pid=1130 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.841476][ T1103] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.852804][ T1103] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.866619][ T1103] device bridge_slave_0 entered promiscuous mode [ 34.884016][ T1103] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.891969][ T1103] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.899672][ T1103] device bridge_slave_1 entered promiscuous mode [ 35.012168][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.021831][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.034165][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.042455][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.050812][ T533] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.057800][ T533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.072599][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 35.080090][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.088303][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.097161][ T533] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.104022][ T533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.111480][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.132926][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.146397][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.166263][ T1103] device veth0_vlan entered promiscuous mode [ 35.179870][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.194896][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.204560][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.244007][ T8] device bridge_slave_1 left promiscuous mode [ 35.250804][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.259240][ T8] device bridge_slave_0 left promiscuous mode [ 35.266109][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.280982][ T8] device veth1_macvtap left promiscuous mode [ 35.290327][ T8] device veth0_vlan left promiscuous mode [ 35.389272][ T1103] device veth1_macvtap entered promiscuous mode [ 35.406743][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 35.426285][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 35.445342][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.362607][ T1279] syz-executor.4[1279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.362680][ T1279] syz-executor.4[1279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.458121][ T1279] syz-executor.4[1279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.503254][ T1279] syz-executor.4[1279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.702635][ T1310] device macsec0 entered promiscuous mode [ 38.045391][ T1378] syz-executor.4[1378] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.045457][ T1378] syz-executor.4[1378] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.064393][ T1379] syz-executor.4[1379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.093017][ T1379] syz-executor.4[1379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.203818][ T1396] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.222288][ T1396] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.620163][ T30] audit: type=1400 audit(1717278598.192:119): avc: denied { write } for pid=1430 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 38.652679][ T1427] device syzkaller0 entered promiscuous mode [ 39.684779][ T1501] device syzkaller0 entered promiscuous mode [ 40.012430][ T1517] device syzkaller0 entered promiscuous mode [ 40.105204][ T1512] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.192883][ T1512] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.258914][ T1512] device bridge_slave_0 entered promiscuous mode [ 40.362774][ T1512] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.397946][ T1512] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.405533][ T1512] device bridge_slave_1 entered promiscuous mode [ 40.862553][ T10] device bridge_slave_1 left promiscuous mode [ 40.883532][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.994348][ T10] device bridge_slave_0 left promiscuous mode [ 41.077303][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.157037][ T10] device veth1_macvtap left promiscuous mode [ 41.565157][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.572457][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.587430][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 41.597805][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.606506][ T533] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.614120][ T533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.622029][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 41.630509][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.639050][ T533] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.645936][ T533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.653520][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 41.678121][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 41.686312][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.698528][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 41.716630][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.732264][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 41.749244][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.769438][ T1512] device veth0_vlan entered promiscuous mode [ 41.784849][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 41.792578][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.820189][ T1512] device veth1_macvtap entered promiscuous mode [ 41.836099][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.843481][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.864423][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 41.872428][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.894416][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 41.920467][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 41.933321][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.997947][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 42.044750][ T533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 42.669770][ T1626] device wg2 entered promiscuous mode [ 42.993847][ T1639] device syzkaller0 entered promiscuous mode [ 43.185811][ T1658] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 43.250323][ T30] audit: type=1400 audit(1717278602.822:120): avc: denied { create } for pid=1661 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 43.345920][ T30] audit: type=1400 audit(1717278602.922:121): avc: denied { create } for pid=1678 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 44.590482][ T1730] device syzkaller0 entered promiscuous mode [ 44.955452][ T1777] device pim6reg1 entered promiscuous mode [ 45.095766][ T1786] device syzkaller0 entered promiscuous mode [ 45.668505][ T1810] €Â: renamed from pim6reg1 [ 46.032491][ T1831] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 46.139299][ T1837] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.344006][ T1839] device syzkaller0 entered promiscuous mode [ 50.277236][ T1888] syz-executor.1[1888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.277547][ T1888] syz-executor.1[1888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.312152][ T30] audit: type=1400 audit(1717278610.882:122): avc: denied { cpu } for pid=1943 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 51.348387][ T1942] device pim6reg1 entered promiscuous mode [ 52.739373][ T2057] syz-executor.0[2057] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.739522][ T2057] syz-executor.0[2057] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.591075][ T2106] device syzkaller0 entered promiscuous mode [ 53.769940][ T2125] device syzkaller0 entered promiscuous mode [ 53.977878][ T2152] device syzkaller0 entered promiscuous mode [ 54.158312][ T2168] device veth1_macvtap left promiscuous mode [ 54.164974][ T2168] device macsec0 left promiscuous mode [ 54.189982][ T2168] device veth1_macvtap entered promiscuous mode [ 54.198096][ T2168] device macsec0 entered promiscuous mode [ 54.311787][ T2182] device erspan0 entered promiscuous mode [ 54.320102][ T30] audit: type=1400 audit(1717278613.892:123): avc: denied { create } for pid=2179 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 54.392431][ T2182] device syzkaller0 entered promiscuous mode [ 54.406460][ T835] syzkaller0: tun_net_xmit 48 [ 54.417195][ T2186] device syzkaller0 entered promiscuous mode [ 54.773601][ T2215] device syzkaller0 entered promiscuous mode [ 54.818500][ T2223] device erspan0 entered promiscuous mode [ 54.842482][ T2223] device syzkaller0 entered promiscuous mode [ 54.849085][ T510] syzkaller0: tun_net_xmit 48 [ 55.419828][ T2249] device syzkaller0 entered promiscuous mode [ 55.618704][ T2254] device syzkaller0 entered promiscuous mode [ 56.517118][ T2288] bond_slave_1: mtu less than device minimum [ 59.530665][ T2417] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 60.777965][ T30] audit: type=1400 audit(1717278620.352:124): avc: denied { create } for pid=2474 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 60.865908][ T30] audit: type=1400 audit(1717278620.442:125): avc: denied { read } for pid=82 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 61.134552][ T2486] syz-executor.3[2486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.134620][ T2486] syz-executor.3[2486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.702511][ T2544] syz-executor.0[2544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.714489][ T2544] syz-executor.0[2544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.748759][ T30] audit: type=1400 audit(1717278621.322:126): avc: denied { create } for pid=2547 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 61.876560][ T30] audit: type=1400 audit(1717278621.452:127): avc: denied { append } for pid=2557 comm="syz-executor.0" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 62.724863][ T2594] syz-executor.3[2594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.724929][ T2594] syz-executor.3[2594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.835195][ T2604] syz-executor.1[2604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.850566][ T2604] syz-executor.1[2604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.877264][ T2606] device pim6reg1 entered promiscuous mode [ 63.685677][ T2652] device pim6reg1 entered promiscuous mode [ 64.330970][ T2696] device veth1_macvtap left promiscuous mode [ 64.638210][ T2726] device syzkaller0 entered promiscuous mode [ 65.093271][ T2743] device veth0_vlan left promiscuous mode [ 65.153326][ T2743] device veth0_vlan entered promiscuous mode [ 65.204505][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 65.213880][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 65.367484][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 65.460604][ T2767] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.467637][ T2767] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.555032][ T2785] syz-executor.0[2785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.555094][ T2785] syz-executor.0[2785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.580081][ T2792] device wg2 left promiscuous mode [ 65.658666][ T2792] device wg2 entered promiscuous mode [ 67.190060][ T2835] device wg2 left promiscuous mode [ 67.305132][ T2839] device wg2 entered promiscuous mode [ 68.137325][ T2907] device wg2 entered promiscuous mode [ 69.281311][ T2965] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 70.005676][ T30] audit: type=1400 audit(1717278629.582:128): avc: denied { create } for pid=2991 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 70.182856][ T30] audit: type=1400 audit(1717278629.752:129): avc: denied { create } for pid=2996 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 71.025547][ T3048] Ÿ: renamed from syzkaller0 [ 72.056268][ T30] audit: type=1400 audit(1717278631.632:130): avc: denied { create } for pid=3098 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 72.182326][ T30] audit: type=1400 audit(1717278631.752:131): avc: denied { write } for pid=3107 comm="syz-executor.4" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 72.532798][ T3120] device syzkaller0 entered promiscuous mode [ 74.575236][ T3206] device syzkaller0 entered promiscuous mode [ 75.514660][ T3276] device syzkaller0 entered promiscuous mode [ 75.630722][ T3293] bpf_get_probe_write_proto: 4 callbacks suppressed [ 75.630741][ T3293] syz-executor.0[3293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.956908][ T3332] device syzkaller0 entered promiscuous mode [ 76.553019][ T3360] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.560053][ T3360] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.664650][ T3360] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 76.715306][ T3359] device bridge_slave_1 left promiscuous mode [ 76.726006][ T3359] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.733553][ T3359] device bridge_slave_0 left promiscuous mode [ 76.762263][ T3359] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.104519][ T3376] device syzkaller0 entered promiscuous mode [ 77.498925][ T3389] tap0: tun_chr_ioctl cmd 1074025677 [ 77.620313][ T3389] tap0: linktype set to 768 [ 77.663011][ T3391] Â: renamed from pim6reg1 [ 78.007230][ T30] audit: type=1400 audit(1717278637.582:132): avc: denied { create } for pid=3406 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 78.133535][ T3423] device veth0_vlan left promiscuous mode [ 78.146581][ T3423] device veth0_vlan entered promiscuous mode [ 78.266717][ T3428] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.281300][ T3428] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.293111][ T3428] device bridge_slave_0 entered promiscuous mode [ 78.304803][ T3428] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.311886][ T3428] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.319624][ T3428] device bridge_slave_1 entered promiscuous mode [ 78.335377][ T306] syz-executor.1 (306) used greatest stack depth: 20624 bytes left [ 78.416320][ T3442] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.423451][ T3442] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.430790][ T3442] device bridge_slave_0 entered promiscuous mode [ 78.445019][ T3442] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.452092][ T3442] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.459559][ T3442] device bridge_slave_1 entered promiscuous mode [ 78.569876][ T515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.577881][ T515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.585520][ T515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.593816][ T515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.603187][ T515] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.611442][ T515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.619918][ T515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.629214][ T515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.638451][ T515] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.646600][ T515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.653856][ T515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.668991][ T8] device bridge_slave_1 left promiscuous mode [ 78.674988][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.682213][ T8] device bridge_slave_0 left promiscuous mode [ 78.688528][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.696322][ T8] device veth1_macvtap left promiscuous mode [ 78.773416][ T3428] device veth0_vlan entered promiscuous mode [ 78.779912][ T834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 78.788533][ T834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 78.796836][ T834] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 78.804132][ T834] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 78.811471][ T834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 78.822422][ T834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.831811][ T3459] device pim6reg1 entered promiscuous mode [ 78.848559][ T3428] device veth1_macvtap entered promiscuous mode [ 78.857186][ T834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 78.880053][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 78.893204][ T515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 78.925600][ T30] audit: type=1400 audit(1717278638.502:133): avc: denied { mounton } for pid=3428 comm="syz-executor.3" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 79.060523][ T3442] device veth0_vlan entered promiscuous mode [ 79.072946][ T3475] device syzkaller0 entered promiscuous mode [ 79.091657][ T510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.106944][ T510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.115532][ T510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.124759][ T510] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.131962][ T510] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.140721][ T510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.152181][ T510] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.161233][ T510] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.170690][ T510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.180294][ T510] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.187149][ T510] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.194630][ T510] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.203409][ T510] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.217124][ T3442] device veth1_macvtap entered promiscuous mode [ 79.227423][ T510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.237514][ T510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 79.287879][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 79.296383][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 79.458678][ T3506] device syzkaller0 entered promiscuous mode [ 79.465106][ T3506] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 79.692210][ T30] audit: type=1400 audit(1717278639.262:134): avc: denied { create } for pid=3535 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 79.724904][ T3543] device pim6reg1 entered promiscuous mode [ 79.756183][ T8] device bridge_slave_1 left promiscuous mode [ 79.762385][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.778543][ T8] device bridge_slave_0 left promiscuous mode [ 79.785932][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.822402][ T8] device veth1_macvtap left promiscuous mode [ 79.832376][ T8] device veth0_vlan left promiscuous mode [ 80.046235][ T30] audit: type=1400 audit(1717278639.622:135): avc: denied { create } for pid=3584 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 80.161496][ T3594] device veth0_vlan left promiscuous mode [ 80.190945][ T3594] device veth0_vlan entered promiscuous mode [ 80.383787][ T3618] EXT4-fs warning (device sda1): __ext4_ioctl:881: Setting inode version is not supported with metadata_csum enabled. [ 81.247552][ T3721] device syzkaller0 entered promiscuous mode [ 81.278040][ T30] audit: type=1400 audit(1717278640.852:136): avc: denied { create } for pid=3724 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 82.604583][ C1] ------------[ cut here ]------------ [ 82.609862][ C1] WARNING: CPU: 1 PID: 3777 at kernel/softirq.c:358 __local_bh_enable_ip+0x6c/0x80 [ 82.618968][ C1] Modules linked in: [ 82.622701][ C1] CPU: 1 PID: 3777 Comm: syz-executor.2 Not tainted 5.15.149-syzkaller-00055-g424f92bcbe8f #0 [ 82.632769][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 82.642672][ C1] RIP: 0010:__local_bh_enable_ip+0x6c/0x80 [ 82.649094][ C1] Code: 66 8b 05 c7 7c c0 7e 66 85 c0 75 22 bf 01 00 00 00 e8 98 42 09 00 65 8b 05 39 86 bf 7e 85 c0 74 02 5d c3 e8 3a 9a bd ff 5d c3 <0f> 0b eb a2 e8 0b 00 00 00 eb d7 66 0f 1f 84 00 00 00 00 00 55 48 [ 82.668529][ C1] RSP: 0018:ffffc900001d0700 EFLAGS: 00010006 [ 82.674424][ C1] RAX: 0000000000010304 RBX: ffff88812915c928 RCX: dffffc0000000000 [ 82.682234][ C1] RDX: 0000000000010304 RSI: 0000000000000201 RDI: ffffffff83fe334b [ 82.690047][ C1] RBP: ffffc900001d0700 R08: dffffc0000000000 R09: ffffed10250ec809 [ 82.697858][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88812915c928 [ 82.705668][ C1] R13: ffff888128764040 R14: 0000000000000000 R15: ffff888128764040 [ 82.713480][ C1] FS: 00007f28d57ff6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 82.722398][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 82.728818][ C1] CR2: 00007ffd70e1e6f8 CR3: 000000012d6ce000 CR4: 00000000003506a0 [ 82.736632][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 82.744437][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 82.752249][ C1] Call Trace: [ 82.755383][ C1] [ 82.758153][ C1] ? show_regs+0x58/0x60 [ 82.762229][ C1] ? __warn+0x160/0x2f0 [ 82.766221][ C1] ? __local_bh_enable_ip+0x6c/0x80 [ 82.771257][ C1] ? report_bug+0x3d9/0x5b0 [ 82.775595][ C1] ? __local_bh_enable_ip+0x6c/0x80 [ 82.780749][ C1] ? handle_bug+0x41/0x70 [ 82.784912][ C1] ? exc_invalid_op+0x1b/0x50 [ 82.789418][ C1] ? asm_exc_invalid_op+0x1b/0x20 [ 82.794369][ C1] ? sock_map_delete_elem+0xcb/0x130 [ 82.799489][ C1] ? __local_bh_enable_ip+0x6c/0x80 [ 82.804530][ C1] _raw_spin_unlock_bh+0x51/0x60 [ 82.809295][ C1] sock_map_delete_elem+0xcb/0x130 [ 82.814244][ C1] bpf_prog_8a405b5ced52e191+0x42/0x4b0 [ 82.819623][ C1] bpf_trace_run2+0xec/0x210 [ 82.824049][ C1] ? asm_exc_int3+0x3a/0x40 [ 82.828390][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 82.833075][ C1] ? __hrtimer_run_queues+0x45c/0xad0 [ 82.838283][ C1] ? enqueue_hrtimer+0x26/0x240 [ 82.842970][ C1] __bpf_trace_hrtimer_start+0x23/0x30 [ 82.848264][ C1] enqueue_hrtimer+0x1e7/0x240 [ 82.852866][ C1] __hrtimer_run_queues+0x478/0xad0 [ 82.857900][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 82.862844][ C1] ? clockevents_program_event+0x236/0x300 [ 82.868487][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 82.874390][ C1] hrtimer_interrupt+0x40c/0xaa0 [ 82.879189][ C1] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 82.884892][ C1] sysvec_apic_timer_interrupt+0x44/0xc0 [ 82.890358][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 82.896174][ C1] RIP: 0010:bpf_prog_free+0x2d/0x150 [ 82.901295][ C1] Code: e5 41 57 41 56 41 54 53 48 89 fb 49 bc 00 00 00 00 00 fc ff df e8 53 8d f1 ff 48 83 c3 38 48 89 d8 48 c1 e8 03 42 80 3c 20 00 <74> 08 48 89 df e8 b9 c4 33 00 48 8b 1b 4c 8d b3 80 00 00 00 4c 89 [ 82.920739][ C1] RSP: 0018:ffffc900001d0c08 EFLAGS: 00000246 [ 82.926638][ C1] RAX: 1ffff9200001b207 RBX: ffffc900000d9038 RCX: ffff8881156c8000 [ 82.934457][ C1] RDX: 0000000000000101 RSI: ffffc900001d0b90 RDI: ffffc900000d9000 [ 82.942261][ C1] RBP: ffffc900001d0c28 R08: 0000000000000002 R09: 000000000000000d [ 82.950074][ C1] R10: ffffc900001d07f0 R11: dffffc0000000001 R12: dffffc0000000000 [ 82.957886][ C1] R13: 0000000000000002 R14: ffff88812780d800 R15: dffffc0000000000 [ 82.965700][ C1] ? bpf_prog_free+0x1d/0x150 [ 82.970343][ C1] __bpf_prog_put_rcu+0xaf/0xc0 [ 82.975027][ C1] ? __bpf_prog_put_noref+0x2c0/0x2c0 [ 82.980231][ C1] rcu_do_batch+0x57a/0xc10 [ 82.984574][ C1] ? local_bh_enable+0x20/0x20 [ 82.989173][ C1] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 82.994814][ C1] ? note_gp_changes+0x159/0x260 [ 82.999588][ C1] ? raw_spin_rq_unlock+0x9/0x10 [ 83.004360][ C1] ? update_blocked_averages+0xfab/0x10d0 [ 83.009919][ C1] rcu_core+0x517/0x1020 [ 83.014004][ C1] ? rcu_cpu_kthread_park+0x90/0x90 [ 83.019031][ C1] rcu_core_si+0x9/0x10 [ 83.023020][ C1] __do_softirq+0x26d/0x5bf [ 83.027363][ C1] __irq_exit_rcu+0x50/0xf0 [ 83.031700][ C1] irq_exit_rcu+0x9/0x10 [ 83.035781][ C1] sysvec_apic_timer_interrupt+0x9a/0xc0 [ 83.041247][ C1] [ 83.044024][ C1] [ 83.046802][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 83.052616][ C1] RIP: 0010:preempt_schedule_irq+0xc2/0x140 [ 83.058436][ C1] Code: 4c 89 e7 e8 00 04 eb fc f6 44 24 21 02 74 0b 0f 0b 48 f7 03 08 00 00 00 74 4d bf 01 00 00 00 e8 44 be 84 fc fb bf 01 00 00 00 e9 e3 ff ff fa bf 01 00 00 00 e8 ce bf 84 fc 65 48 8b 1d 66 03 [ 83.077960][ C1] RSP: 0018:ffffc90000ba7240 EFLAGS: 00000246 [ 83.083879][ C1] RAX: 1ffff11022ad9156 RBX: 1ffff92000174e4c RCX: ffffffff84c92700 [ 83.091681][ C1] RDX: 1ffffffff0e52208 RSI: 0000000000000000 RDI: 0000000000000001 [ 83.099503][ C1] RBP: ffffc90000ba72d8 R08: ffffffff87291040 R09: ffffffff87291048 [ 83.107296][ C1] R10: ffffffff87291058 R11: ffffffff87291050 R12: ffffc90000ba7260 [ 83.115194][ C1] R13: 0000000000000000 R14: dffffc0000000000 R15: 1ffff92000174e48 [ 83.123009][ C1] ? _raw_write_unlock_irq+0x20/0x60 [ 83.128137][ C1] ? __cond_resched+0x20/0x20 [ 83.132642][ C1] irqentry_exit_cond_resched+0x2a/0x30 [ 83.138020][ C1] irqentry_exit+0x30/0x40 [ 83.142273][ C1] sysvec_apic_timer_interrupt+0x55/0xc0 [ 83.147741][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 83.153555][ C1] RIP: 0010:jbd2_journal_put_journal_head+0x335/0x670 [ 83.160152][ C1] Code: 00 0f 85 d9 00 00 00 e8 d9 5b 72 ff 48 8b 3d 32 68 31 05 4c 89 ee e8 5a d0 b3 ff 4c 89 e7 e8 e2 6c cc ff 48 83 c4 30 5b 41 5c <41> 5d 41 5e 41 5f 5d c3 48 c7 c7 e0 3b 6f 85 48 c7 c6 2c 1b f8 85 [ 83.179594][ C1] RSP: 0018:ffffc90000ba73d8 EFLAGS: 00000282 [ 83.185496][ C1] RAX: ffffffff81fdd854 RBX: 0000000000000000 RCX: 0000000000040000 [ 83.193308][ C1] RDX: ffffc90001fe1000 RSI: 000000000003ee01 RDI: 000000000003ee02 [ 83.201118][ C1] RBP: ffffc90000ba73f0 R08: ffffffff81fdd847 R09: ffffed102542ee40 [ 83.208932][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff11021ee5284 [ 83.216741][ C1] R13: ffff88812a118f20 R14: dffffc0000000000 R15: ffff88812a118f2c [ 83.224556][ C1] ? jbd2_journal_put_journal_head+0xd7/0x670 [ 83.230452][ C1] ? jbd2_journal_put_journal_head+0xe4/0x670 [ 83.236361][ C1] jbd2_journal_get_write_access+0x19f/0x2d0 [ 83.242172][ C1] ? __ext4_journal_get_write_access+0x206/0x690 [ 83.248335][ C1] __ext4_journal_get_write_access+0x244/0x690 [ 83.254323][ C1] ? __ext4_journal_ensure_credits+0x470/0x470 [ 83.260313][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 83.265954][ C1] ext4_reserve_inode_write+0x2bd/0x3d0 [ 83.271336][ C1] ? ext4_mark_iloc_dirty+0x3f40/0x3f40 [ 83.276717][ C1] ? ext4_alloc_file_blocks+0xb1c/0xcd0 [ 83.282096][ C1] __ext4_mark_inode_dirty+0x129/0x7a0 [ 83.287391][ C1] ? sb_end_intwrite+0x120/0x120 [ 83.292166][ C1] ? ext4_issue_zeroout+0x250/0x250 [ 83.297200][ C1] ? __ext4_journal_start_sb+0xfa/0x2c0 [ 83.302580][ C1] ext4_alloc_file_blocks+0xb1c/0xcd0 [ 83.307790][ C1] ? trace_ext4_fallocate_enter+0x160/0x160 [ 83.313521][ C1] ext4_fallocate+0x949/0x1f10 [ 83.318118][ C1] ? ext4_ext_truncate+0x240/0x240 [ 83.323063][ C1] ? fsnotify_perm+0x6a/0x5d0 [ 83.327579][ C1] vfs_fallocate+0x492/0x570 [ 83.332003][ C1] do_vfs_ioctl+0x2238/0x2a80 [ 83.336519][ C1] ? __x64_compat_sys_ioctl+0x90/0x90 [ 83.341724][ C1] ? ctx_flexible_sched_in+0xa8/0x100 [ 83.346932][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 83.351963][ C1] ? sched_clock+0x9/0x10 [ 83.356134][ C1] ? ioctl_has_perm+0x1f8/0x560 [ 83.360819][ C1] ? ioctl_has_perm+0x3f5/0x560 [ 83.365505][ C1] ? has_cap_mac_admin+0x3c0/0x3c0 [ 83.370453][ C1] ? native_set_ldt+0x360/0x360 [ 83.375141][ C1] ? _raw_spin_unlock+0x4d/0x70 [ 83.379828][ C1] ? selinux_file_ioctl+0x3cc/0x540 [ 83.384860][ C1] ? selinux_file_alloc_security+0x120/0x120 [ 83.390676][ C1] ? __fget_files+0x31e/0x380 [ 83.395190][ C1] ? security_file_ioctl+0x84/0xb0 [ 83.400134][ C1] __se_sys_ioctl+0x99/0x190 [ 83.404564][ C1] __x64_sys_ioctl+0x7b/0x90 [ 83.408989][ C1] do_syscall_64+0x3d/0xb0 [ 83.413241][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 83.418885][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 83.424612][ C1] RIP: 0033:0x7f28d6a8aee9 [ 83.428868][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 83.448305][ C1] RSP: 002b:00007f28d57ff0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 83.456552][ C1] RAX: ffffffffffffffda RBX: 00007f28d6bc1fa0 RCX: 00007f28d6a8aee9 [ 83.464360][ C1] RDX: 0000000020000040 RSI: 000000004030582a RDI: 0000000000000005 [ 83.472174][ C1] RBP: 00007f28d6ad747f R08: 0000000000000000 R09: 0000000000000000 [ 83.479983][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 83.487795][ C1] R13: 000000000000000b R14: 00007f28d6bc1fa0 R15: 00007ffc3d4d76b8 [ 83.495610][ C1] [ 83.498472][ C1] ---[ end trace 1e3712b81d5ca68a ]--- [ 83.868939][ T3849] syz-executor.4[3849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.869026][ T3849] syz-executor.4[3849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.911081][ T3853] syz-executor.0[3853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.990039][ T3853] syz-executor.0[3853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.179863][ T3867] device syzkaller0 entered promiscuous mode [ 84.298745][ T3887] syz-executor.3[3887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.298786][ T3887] syz-executor.3[3887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.498618][ T3911] syz-executor.3[3911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.685385][ T3911] syz-executor.3[3911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.982715][ T3923] EXT4-fs warning (device sda1): __ext4_ioctl:881: Setting inode version is not supported with metadata_csum enabled. [ 85.245097][ T3931] device wg2 left promiscuous mode [ 85.273638][ T3931] device wg2 entered promiscuous mode [ 85.374268][ T3942] EXT4-fs warning (device sda1): __ext4_ioctl:881: Setting inode version is not supported with metadata_csum enabled. [ 86.571530][ T4007] device syzkaller0 entered promiscuous mode [ 88.671035][ T4156] EXT4-fs warning (device sda1): __ext4_ioctl:881: Setting inode version is not supported with metadata_csum enabled. [ 88.699199][ T30] audit: type=1400 audit(1717278648.272:137): avc: denied { create } for pid=4158 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 88.750008][ T30] audit: type=1400 audit(1717278648.292:138): avc: denied { write } for pid=4158 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 88.796665][ T30] audit: type=1400 audit(1717278648.292:139): avc: denied { setopt } for pid=4158 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 89.190843][ T30] audit: type=1400 audit(1717278648.762:140): avc: denied { create } for pid=4181 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 89.776970][ T30] audit: type=1400 audit(1717278649.352:141): avc: denied { create } for pid=4210 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 90.079025][ T4230] syz-executor.2[4230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.079097][ T4230] syz-executor.2[4230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.223784][ T4240] device syzkaller0 entered promiscuous mode [ 90.520820][ T4261] syz-executor.1[4261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.520885][ T4261] syz-executor.1[4261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.657313][ T30] audit: type=1400 audit(1717278650.232:142): avc: denied { read } for pid=4278 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 90.675520][ T4277] device syzkaller0 entered promiscuous mode [ 90.776881][ T4315] syz-executor.2[4315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.776941][ T4315] syz-executor.2[4315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.067741][ T4366] syz-executor.3[4366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.108196][ T4366] syz-executor.3[4366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.200229][ T4370] device syzkaller0 entered promiscuous mode [ 91.699677][ T4394] device syzkaller0 entered promiscuous mode [ 91.944966][ T4412] device syzkaller0 entered promiscuous mode [ 93.925272][ T4499] geneve1: tun_chr_ioctl cmd 2147767511 [ 94.811394][ T4535] device veth1_macvtap entered promiscuous mode [ 94.819377][ T4535] device macsec0 entered promiscuous mode [ 94.868908][ T4539] syz-executor.2[4539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.869044][ T4539] syz-executor.2[4539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.882332][ T843] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 94.924103][ T4541] geneve1: tun_chr_ioctl cmd 2147767511 [ 94.977237][ T4543] device syzkaller0 entered promiscuous mode [ 95.225351][ T4565] syz-executor.4[4565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.225418][ T4565] syz-executor.4[4565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.322884][ T4578] device syzkaller0 entered promiscuous mode [ 97.351905][ T4630] device syzkaller0 entered promiscuous mode [ 97.582434][ T30] audit: type=1400 audit(1717278657.152:143): avc: denied { create } for pid=4657 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 97.656621][ T4666] device syzkaller0 entered promiscuous mode [ 97.904938][ T30] audit: type=1400 audit(1717278657.472:144): avc: denied { setattr } for pid=4691 comm="syz-executor.4" path="/dev/net/tun" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 97.975321][ T4694] syz-executor.4[4694] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.975392][ T4694] syz-executor.4[4694] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.304731][ T4784] syz-executor.1[4784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.331884][ T4784] syz-executor.1[4784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.930396][ T4822] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 100.098787][ T4842] device syzkaller0 entered promiscuous mode [ 101.245832][ T4884] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.327394][ T4884] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.350591][ T4884] device bridge_slave_0 entered promiscuous mode [ 101.397896][ T4884] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.449136][ T4884] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.480753][ T4884] device bridge_slave_1 entered promiscuous mode [ 101.769080][ T8] device veth1_macvtap left promiscuous mode [ 101.787800][ T8] device veth0_vlan left promiscuous mode [ 102.175350][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.188991][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.234351][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 102.249434][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 102.278466][ T339] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.285359][ T339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.317621][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 102.342750][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 102.366681][ T339] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.373556][ T339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.381412][ T30] audit: type=1400 audit(1717278661.952:145): avc: denied { remove_name } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 102.437399][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 102.456015][ T30] audit: type=1400 audit(1717278661.952:146): avc: denied { rename } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 102.483679][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 102.517859][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 102.542059][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 102.572661][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 102.601922][ T4884] device veth0_vlan entered promiscuous mode [ 102.638034][ T512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 102.657858][ T512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 102.702422][ T512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 102.732310][ T512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 102.768164][ T4884] device veth1_macvtap entered promiscuous mode [ 102.802211][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 102.817300][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 102.855436][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 102.898556][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 102.934567][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 102.944714][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 102.961753][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 103.291039][ T4948] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.300029][ T4948] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.326052][ T4948] device bridge_slave_0 entered promiscuous mode [ 103.408544][ T4948] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.481323][ T4948] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.573757][ T4948] device bridge_slave_1 entered promiscuous mode [ 103.895058][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 103.903723][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 103.924184][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 103.935769][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.951534][ T513] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.958415][ T513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.978936][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 103.994987][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 104.025710][ T513] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.032609][ T513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.076908][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 104.091202][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 104.108303][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 104.147846][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 104.161431][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 104.170684][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 104.180388][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 104.192179][ T8] device bridge_slave_1 left promiscuous mode [ 104.199540][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.207204][ T8] device bridge_slave_0 left promiscuous mode [ 104.213633][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.238654][ T8] device veth1_macvtap left promiscuous mode [ 104.244785][ T8] device veth0_vlan left promiscuous mode [ 104.363525][ T4948] device veth0_vlan entered promiscuous mode [ 104.435134][ T512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 104.442892][ T512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.457663][ T4948] device veth1_macvtap entered promiscuous mode [ 104.464693][ T512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 104.473155][ T512] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.480633][ T512] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.558111][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 104.566396][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 104.574769][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 104.583267][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 104.653665][ T4999] device syzkaller0 entered promiscuous mode [ 105.339527][ T5002] device syzkaller0 entered promiscuous mode [ 105.607556][ T5032] syz-executor.2[5032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.607594][ T5032] syz-executor.2[5032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.717704][ T5037] device pim6reg1 entered promiscuous mode [ 106.957688][ T5081] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.965215][ T5081] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.972573][ T5081] device bridge_slave_0 entered promiscuous mode [ 106.979796][ T5081] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.990584][ T5081] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.003208][ T5081] device bridge_slave_1 entered promiscuous mode [ 107.310692][ T5109] device syzkaller0 entered promiscuous mode [ 107.352454][ T5081] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.359426][ T5081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.366538][ T5081] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.373289][ T5081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.426088][ T339] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.437394][ T339] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.445773][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 107.455317][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.471069][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.479103][ T339] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.486044][ T339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.494461][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.502469][ T339] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.509442][ T339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.532184][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.542671][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.602076][ T5081] device veth0_vlan entered promiscuous mode [ 107.617834][ T843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 107.629981][ T843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.650538][ T843] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.658127][ T843] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 107.667569][ T8] device bridge_slave_1 left promiscuous mode [ 107.679509][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.695482][ T8] device bridge_slave_0 left promiscuous mode [ 107.702105][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.718659][ T8] device veth1_macvtap left promiscuous mode [ 107.727476][ T8] device veth0_vlan left promiscuous mode [ 107.879537][ T5081] device veth1_macvtap entered promiscuous mode [ 107.889231][ T5127] device pim6reg1 entered promiscuous mode [ 107.935268][ T843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 107.943888][ T843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 107.952498][ T843] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 107.967735][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 107.976265][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 107.996482][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 108.005458][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 108.049134][ T5153] device wg2 entered promiscuous mode [ 108.058567][ T5160] EXT4-fs warning (device sda1): __ext4_ioctl:881: Setting inode version is not supported with metadata_csum enabled. [ 108.072427][ T5153] device veth0_vlan left promiscuous mode [ 108.078739][ T5153] device veth0_vlan entered promiscuous mode [ 108.379832][ T5178] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.729563][ T5188] device pim6reg1 entered promiscuous mode [ 108.933617][ T5206] device veth1_macvtap left promiscuous mode [ 108.939868][ T5206] device macsec0 left promiscuous mode [ 108.997838][ T5207] device syzkaller0 entered promiscuous mode [ 109.005722][ T5206] device veth1_macvtap entered promiscuous mode [ 109.011933][ T5206] device macsec0 entered promiscuous mode [ 109.020299][ T5212] device pim6reg1 entered promiscuous mode [ 109.029236][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 109.229603][ T5240] device pim6reg1 entered promiscuous mode [ 109.628666][ T5247] device syzkaller0 entered promiscuous mode [ 109.750289][ T5246] syz-executor.1[5246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.750353][ T5246] syz-executor.1[5246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.762955][ T5247] syz-executor.1[5247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.790187][ T5247] syz-executor.1[5247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.130813][ T5303] syz-executor.1[5303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.468465][ T5274] device syzkaller0 entered promiscuous mode [ 110.603375][ T30] audit: type=1400 audit(1717278670.172:147): avc: denied { create } for pid=5319 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 111.173101][ T5360] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.180096][ T5360] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.196477][ T5369] syz-executor.4[5369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.196576][ T5369] syz-executor.4[5369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.226863][ T5369] syz-executor.4[5369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.251160][ T5369] syz-executor.4[5369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.502805][ T5387] device syzkaller0 entered promiscuous mode [ 112.127162][ T5428] EXT4-fs warning (device sda1): __ext4_ioctl:881: Setting inode version is not supported with metadata_csum enabled. [ 112.265969][ T5432] device syzkaller0 entered promiscuous mode [ 114.225413][ T5508] device syzkaller0 entered promiscuous mode [ 114.267102][ T5510] device syzkaller0 entered promiscuous mode [ 114.460340][ T5515] device syzkaller0 entered promiscuous mode [ 114.483009][ T5516] device syzkaller0 entered promiscuous mode [ 114.556710][ T5515] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 114.857579][ T5544] device syzkaller0 entered promiscuous mode [ 114.922689][ T5547] device syzkaller0 entered promiscuous mode [ 115.349325][ T5575] device syzkaller0 entered promiscuous mode [ 115.388887][ T5577] device syzkaller0 entered promiscuous mode [ 115.702288][ T5586] device syzkaller0 entered promiscuous mode [ 115.978661][ T5620] device syzkaller0 entered promiscuous mode [ 116.288847][ T5658] device syzkaller0 entered promiscuous mode [ 117.022090][ T5678] device syzkaller0 entered promiscuous mode [ 117.175564][ T5688] device syzkaller0 entered promiscuous mode [ 119.576188][ T5823] device syzkaller0 entered promiscuous mode [ 120.586456][ T5851] device syzkaller0 entered promiscuous mode [ 120.781249][ T5864] device syzkaller0 entered promiscuous mode [ 120.831493][ T5866] device syzkaller0 entered promiscuous mode [ 122.032741][ T5911] device syzkaller0 entered promiscuous mode [ 122.383373][ T5968] device syzkaller0 entered promiscuous mode [ 122.979611][ T6067] device syzkaller0 entered promiscuous mode [ 123.247918][ T6109] device syzkaller0 entered promiscuous mode [ 123.515105][ T6142] device vxcan1 entered promiscuous mode [ 123.852289][ T6183] device syzkaller0 entered promiscuous mode [ 123.946885][ T6198] device syzkaller0 entered promiscuous mode [ 124.589264][ T6238] device syzkaller0 entered promiscuous mode [ 124.756620][ T6241] device syzkaller0 entered promiscuous mode [ 125.190961][ T6283] device syzkaller0 entered promiscuous mode [ 125.912151][ T6332] syz-executor.3[6332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.912222][ T6332] syz-executor.3[6332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.373364][ T6354] device syzkaller0 entered promiscuous mode [ 126.749393][ T6368] device syzkaller0 entered promiscuous mode [ 126.769194][ T6368] device bridge_slave_1 left promiscuous mode [ 126.775765][ T6368] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.783716][ T6368] device bridge_slave_0 left promiscuous mode [ 126.789886][ T6368] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.298293][ T6397] device syzkaller0 entered promiscuous mode [ 127.339919][ T6397] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.346936][ T6397] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.358017][ T6397] device bridge_slave_1 left promiscuous mode [ 127.368676][ T6397] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.378461][ T6397] device bridge_slave_0 left promiscuous mode [ 127.384792][ T6397] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.515544][ T6405] syz-executor.4[6405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.515601][ T6405] syz-executor.4[6405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.752242][ T6442] device syzkaller0 entered promiscuous mode [ 129.178559][ T6466] device pim6reg1 entered promiscuous mode [ 129.869888][ T6484] device syzkaller0 entered promiscuous mode [ 130.427557][ T6510] device syzkaller0 entered promiscuous mode [ 130.652488][ T6516] device vxcan1 entered promiscuous mode [ 130.947798][ T6534] device syzkaller0 entered promiscuous mode [ 131.160041][ T6556] device veth1_macvtap left promiscuous mode [ 132.185264][ T6606] device sit0 entered promiscuous mode [ 132.423531][ T6635] device syzkaller0 entered promiscuous mode [ 132.492497][ T6643] device veth0_vlan left promiscuous mode [ 132.511797][ T6643] device veth0_vlan entered promiscuous mode [ 132.675270][ T6663] syz-executor.3[6663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.675339][ T6663] syz-executor.3[6663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.129754][ T6728] device syzkaller0 entered promiscuous mode [ 134.421460][ T6757] geneve1: tun_chr_ioctl cmd 1074025672 [ 134.444139][ T6757] geneve1: ignored: set checksum enabled [ 134.559190][ T6771] syz-executor.4[6771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.559259][ T6771] syz-executor.4[6771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.627614][ T6775] device syzkaller0 entered promiscuous mode [ 134.901185][ T6792] device syzkaller0 entered promiscuous mode [ 135.003090][ T6799] device veth1_macvtap entered promiscuous mode [ 135.030164][ T6799] device macsec0 entered promiscuous mode [ 135.056182][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 135.488958][ T6818] device syzkaller0 entered promiscuous mode [ 135.662469][ T6828] device syzkaller0 entered promiscuous mode [ 135.809624][ T6843] syz-executor.1[6843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.809693][ T6843] syz-executor.1[6843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.238541][ T6868] device syzkaller0 entered promiscuous mode [ 136.378380][ T6875] device syzkaller0 entered promiscuous mode [ 137.005246][ T6899] device syzkaller0 entered promiscuous mode [ 137.035853][ T6902] ------------[ cut here ]------------ [ 137.054126][ T6902] trace type BPF program uses run-time allocation [ 137.062120][ T6902] WARNING: CPU: 0 PID: 6902 at kernel/bpf/verifier.c:11655 check_map_prog_compatibility+0x6f1/0x890 [ 137.073422][ T6902] Modules linked in: [ 137.077526][ T6902] CPU: 0 PID: 6902 Comm: syz-executor.3 Tainted: G W 5.15.149-syzkaller-00055-g424f92bcbe8f #0 [ 137.091509][ T6902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 137.102769][ T6902] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890 [ 137.110213][ T6902] Code: db e9 f9 fc ff ff e8 0e 3a ed ff 31 db e9 ed fc ff ff e8 02 3a ed ff c6 05 0d 7e 80 05 01 48 c7 c7 40 c0 67 85 e8 3f 7b be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff [ 137.132788][ T6902] RSP: 0018:ffffc90000c57348 EFLAGS: 00010246 [ 137.138778][ T6902] RAX: 2a30c7c4f02b0300 RBX: 0000000000000001 RCX: 0000000000040000 [ 137.146902][ T6902] RDX: ffffc90001556000 RSI: 0000000000000923 RDI: 0000000000000924 [ 137.154802][ T6902] RBP: ffffc90000c57390 R08: ffffffff81576125 R09: fffff5200018ad91 [ 137.168685][ T6902] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000005 [ 137.176667][ T6902] R13: ffff888137c36000 R14: ffffc9000010b000 R15: dffffc0000000000 [ 137.184677][ T6902] FS: 00007ff03f6636c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 137.204905][ T6902] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 137.217089][ T6902] CR2: 00007ffe719b4408 CR3: 0000000029e98000 CR4: 00000000003506b0 [ 137.232851][ T6902] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 137.249103][ T6902] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 137.263671][ T6902] Call Trace: [ 137.269038][ T6902] [ 137.274131][ T6902] ? show_regs+0x58/0x60 [ 137.280473][ T6902] ? __warn+0x160/0x2f0 [ 137.297382][ T6902] ? check_map_prog_compatibility+0x6f1/0x890 [ 137.312319][ T6902] ? report_bug+0x3d9/0x5b0 [ 137.323776][ T6902] ? check_map_prog_compatibility+0x6f1/0x890 [ 137.339698][ T6902] ? handle_bug+0x41/0x70 [ 137.348652][ T6902] ? exc_invalid_op+0x1b/0x50 [ 137.370684][ T6902] ? asm_exc_invalid_op+0x1b/0x20 [ 137.378696][ T6902] ? __wake_up_klogd+0xd5/0x110 [ 137.388119][ T6902] ? check_map_prog_compatibility+0x6f1/0x890 [ 137.412975][ T6902] ? check_map_prog_compatibility+0x6f1/0x890 [ 137.423317][ T6902] resolve_pseudo_ldimm64+0x671/0x1240 [ 137.435980][ T6902] ? check_attach_btf_id+0xef0/0xef0 [ 137.446689][ T6902] ? __mark_reg_known+0x1b0/0x1b0 [ 137.456041][ T6902] ? security_capable+0x87/0xb0 [ 137.466755][ T6902] bpf_check+0x3174/0x12bf0 [ 137.476863][ T6902] ? 0xffffffffa002c000 [ 137.483087][ T6902] ? is_bpf_text_address+0x172/0x190 [ 137.493737][ T6902] ? stack_trace_save+0x1c0/0x1c0 [ 137.504152][ T6902] ? __kernel_text_address+0x9b/0x110 [ 137.526781][ T6902] ? unwind_get_return_address+0x4d/0x90 [ 137.542076][ T6902] ? bpf_get_btf_vmlinux+0x60/0x60 [ 137.559317][ T6902] ? arch_stack_walk+0xf3/0x140 [ 137.575026][ T6902] ? stack_trace_save+0x113/0x1c0 [ 137.635496][ T6902] ? stack_trace_snprint+0xf0/0xf0 [ 137.653030][ T6902] ? stack_trace_snprint+0xf0/0xf0 [ 137.665123][ T6902] ? __stack_depot_save+0x34/0x470 [ 137.682470][ T6902] ? ____kasan_kmalloc+0xed/0x110 [ 137.711235][ T6902] ? ____kasan_kmalloc+0xdb/0x110 [ 137.735468][ T6902] ? __kasan_kmalloc+0x9/0x10 [ 137.761586][ T6902] ? kmem_cache_alloc_trace+0x115/0x210 [ 137.772124][ T6930] device syzkaller0 entered promiscuous mode [ 137.823115][ T6902] ? selinux_bpf_prog_alloc+0x51/0x140 [ 137.872443][ T6902] ? security_bpf_prog_alloc+0x62/0x90 [ 137.938274][ T6902] ? bpf_prog_load+0x9ee/0x1b50 [ 138.056160][ T6902] ? __sys_bpf+0x4bc/0x760 [ 138.122964][ T6902] ? __x64_sys_bpf+0x7c/0x90 [ 138.193779][ T6902] ? do_syscall_64+0x3d/0xb0 [ 138.219613][ T6902] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 138.253073][ T6902] ? __kasan_kmalloc+0x9/0x10 [ 138.257807][ T6902] ? memset+0x35/0x40 [ 138.261686][ T6902] ? bpf_obj_name_cpy+0x196/0x1e0 [ 138.266556][ T6902] bpf_prog_load+0x12ac/0x1b50 [ 138.271129][ T6902] ? map_freeze+0x370/0x370 [ 138.275527][ T6902] ? selinux_bpf+0xcb/0x100 [ 138.279907][ T6902] ? security_bpf+0x82/0xb0 [ 138.288124][ T6902] __sys_bpf+0x4bc/0x760 [ 138.306313][ T6902] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 138.311534][ T6902] ? __kasan_check_read+0x11/0x20 [ 138.319657][ T6902] __x64_sys_bpf+0x7c/0x90 [ 138.327350][ T6902] do_syscall_64+0x3d/0xb0 [ 138.340619][ T6902] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 138.358460][ T6902] RIP: 0033:0x7ff0408eeee9 [ 138.362719][ T6902] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 138.383085][ T6902] RSP: 002b:00007ff03f6630c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 138.394389][ T6902] RAX: ffffffffffffffda RBX: 00007ff040a25fa0 RCX: 00007ff0408eeee9 [ 138.402719][ T6902] RDX: 0000000000000080 RSI: 0000000020000580 RDI: 0000000000000005 [ 138.412294][ T6902] RBP: 00007ff04093b47f R08: 0000000000000000 R09: 0000000000000000 [ 138.436053][ T6936] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.446324][ T6902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 138.447398][ T6936] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.476078][ T6936] device bridge_slave_0 entered promiscuous mode [ 138.514136][ T6902] R13: 000000000000000b R14: 00007ff040a25fa0 R15: 00007ffd70e1e538 [ 138.524104][ T6902] [ 138.524471][ T6936] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.551676][ T6902] ---[ end trace 1e3712b81d5ca68b ]--- [ 138.560438][ T6936] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.572328][ T6936] device bridge_slave_1 entered promiscuous mode [ 138.774914][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.783181][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.826581][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.841593][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.861645][ T339] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.868524][ T339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.890516][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.907980][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.924116][ T339] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.930988][ T339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.952821][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.968801][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.984921][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.000976][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.032133][ T528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.051379][ T528] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 139.061461][ T528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 139.071543][ T6936] device veth0_vlan entered promiscuous mode [ 139.081035][ T10] device veth1_macvtap left promiscuous mode [ 139.087279][ T10] device veth0_vlan left promiscuous mode [ 139.199242][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 139.208676][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.223587][ T6936] device veth1_macvtap entered promiscuous mode [ 139.241767][ T6970] syz-executor.4[6970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.241832][ T6970] syz-executor.4[6970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.254952][ T528] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 139.289235][ T6970] syz-executor.4[6970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.289319][ T6970] syz-executor.4[6970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.302503][ T528] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 139.333565][ T528] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 139.346253][ T528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 139.366092][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 139.383039][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 139.418310][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 139.436311][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.389203][ T7077] syz-executor.0[7077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.389276][ T7077] syz-executor.0[7077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.035741][ T7108] device syzkaller0 entered promiscuous mode [ 144.806914][ T7146] device syzkaller0 entered promiscuous mode [ 144.838691][ T7150] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 144.863138][ T7148] device syzkaller0 entered promiscuous mode [ 145.172119][ T7184] device syzkaller0 entered promiscuous mode [ 145.250361][ T7190] device syzkaller0 entered promiscuous mode [ 145.305685][ T7192] device vxcan1 entered promiscuous mode [ 145.649111][ T7221] device syzkaller0 entered promiscuous mode [ 145.669708][ T7228] syz-executor.1[7228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.669767][ T7228] syz-executor.1[7228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.990316][ T7262] device syzkaller0 entered promiscuous mode [ 146.071062][ T7268] device syzkaller0 entered promiscuous mode [ 146.545137][ T7294] device syzkaller0 entered promiscuous mode [ 146.567088][ T7296] device wg2 left promiscuous mode [ 147.054225][ T30] audit: type=1400 audit(1717278706.632:148): avc: denied { create } for pid=7334 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 147.119720][ T7339] device pim6reg1 entered promiscuous mode [ 147.373078][ T30] audit: type=1400 audit(1717278706.942:149): avc: denied { tracepoint } for pid=7347 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 149.197500][ T7458] device pim6reg1 entered promiscuous mode [ 149.372676][ T7465] device syzkaller0 entered promiscuous mode [ 149.580226][ T7481] device syzkaller0 entered promiscuous mode [ 149.608000][ T7485] device pim6reg1 entered promiscuous mode [ 149.657671][ T7488] device syzkaller0 entered promiscuous mode [ 149.706117][ T7493] device syzkaller0 entered promiscuous mode [ 150.029297][ T7512] device syzkaller0 entered promiscuous mode [ 150.517398][ T7521] device syzkaller0 entered promiscuous mode [ 150.760226][ T7528] device syzkaller0 entered promiscuous mode [ 150.859440][ T7543] device syzkaller0 entered promiscuous mode [ 150.907346][ T7545] device syzkaller0 entered promiscuous mode [ 150.997371][ T7549] device syzkaller0 entered promiscuous mode [ 151.539427][ T7578] device veth1_macvtap left promiscuous mode [ 151.558851][ T7578] device macsec0 left promiscuous mode [ 151.610658][ T7580] device syzkaller0 entered promiscuous mode [ 151.623985][ T7578] device veth1_macvtap entered promiscuous mode [ 151.632390][ T7578] device macsec0 entered promiscuous mode [ 151.776464][ T7585] device syzkaller0 entered promiscuous mode [ 151.993510][ T7591] device syzkaller0 entered promiscuous mode [ 152.148876][ T7608] device syzkaller0 entered promiscuous mode [ 152.567370][ T7634] device veth1_macvtap left promiscuous mode [ 152.590578][ T7634] device macsec0 left promiscuous mode [ 152.642596][ T7634] device veth1_macvtap entered promiscuous mode [ 152.671108][ T7634] device macsec0 entered promiscuous mode [ 153.217675][ T7653] device wg2 left promiscuous mode [ 153.306880][ T7653] device wg2 entered promiscuous mode [ 153.482186][ T7667] device veth1_macvtap left promiscuous mode [ 153.561974][ T7667] device veth1_macvtap entered promiscuous mode [ 153.587242][ T7667] device macsec0 entered promiscuous mode [ 153.726572][ T7680] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 153.842459][ T7688] device wg2 left promiscuous mode [ 153.871289][ T7688] device wg2 entered promiscuous mode [ 153.969323][ T7701] device veth1_macvtap left promiscuous mode [ 153.979806][ T7701] device macsec0 left promiscuous mode [ 153.994416][ T7701] device veth1_macvtap entered promiscuous mode [ 154.001112][ T7701] device macsec0 entered promiscuous mode [ 154.179708][ T7711] device syzkaller0 entered promiscuous mode [ 155.657643][ T7738] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.669143][ T7738] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.683311][ T7738] device bridge_slave_0 entered promiscuous mode [ 155.699567][ T7738] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.713416][ T7738] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.727684][ T7738] device bridge_slave_1 entered promiscuous mode [ 155.867083][ T7738] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.873966][ T7738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.881069][ T7738] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.887958][ T7738] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.927162][ T10] device veth1_macvtap left promiscuous mode [ 156.187751][ T7738] device veth0_vlan entered promiscuous mode [ 156.227311][ T7738] device veth1_macvtap entered promiscuous mode [ 156.726875][ T7749] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 157.329921][ T7749] syz-executor.0[7749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.329989][ T7749] syz-executor.0[7749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.414580][ T680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.433458][ T680] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.441527][ T680] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.457997][ T680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 158.466316][ T680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 158.474772][ T680] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.482639][ T680] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.490644][ T680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 158.501736][ T680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.509925][ T680] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.520514][ T680] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.527792][ T680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 158.582756][ T7754] bridge0: port 3(veth0) entered blocking state [ 158.588932][ T7754] bridge0: port 3(veth0) entered disabled state [ 158.596381][ T7754] device veth0 entered promiscuous mode [ 159.185445][ T7807] device syzkaller0 entered promiscuous mode [ 159.198996][ T7809] device veth0_vlan left promiscuous mode [ 159.205146][ T7809] device veth0_vlan entered promiscuous mode [ 159.418559][ T7830] device syzkaller0 entered promiscuous mode [ 159.446043][ T7829] device syzkaller0 entered promiscuous mode [ 159.446556][ T7834] syz-executor.1[7834] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.451931][ T7834] syz-executor.1[7834] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.456627][ T7833] syz-executor.1[7833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.475034][ T7829] device veth1_macvtap left promiscuous mode [ 159.495278][ T7829] device macsec0 left promiscuous mode [ 159.504545][ T7833] syz-executor.1[7833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.506431][ T7832] device veth0_vlan left promiscuous mode [ 159.526174][ T7832] device veth0_vlan entered promiscuous mode [ 159.546480][ T509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.555554][ T509] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 159.564723][ T509] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.603339][ T7844] device syzkaller0 entered promiscuous mode [ 159.630248][ T7826] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.641484][ T7826] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.648874][ T7826] device bridge_slave_0 entered promiscuous mode [ 159.655824][ T7826] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.662778][ T7826] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.670825][ T7826] device bridge_slave_1 entered promiscuous mode [ 159.823268][ T30] audit: type=1400 audit(1717278719.392:150): avc: denied { create } for pid=7863 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 159.859673][ T7826] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.866566][ T7826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.873653][ T7826] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.880725][ T7826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.004616][ T6753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.019783][ T6753] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.043031][ T6753] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.077141][ T6753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.094371][ T6753] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.101805][ T6753] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.122459][ T6753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.142129][ T6753] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.149008][ T6753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.171260][ T6753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 160.187880][ T6753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 160.251565][ T7873] device syzkaller0 entered promiscuous mode [ 160.282834][ T6742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 160.296077][ T6742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 160.318566][ T6742] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 160.337910][ T6742] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 160.345486][ T7826] device veth0_vlan entered promiscuous mode [ 160.377157][ T7826] device veth1_macvtap entered promiscuous mode [ 160.384296][ T6742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 160.397183][ T6742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 160.424154][ T509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 160.472575][ T7879] device syzkaller0 entered promiscuous mode [ 160.614834][ T10] device veth0 left promiscuous mode [ 160.620301][ T10] bridge0: port 3(veth0) entered disabled state [ 160.643767][ T10] device bridge_slave_1 left promiscuous mode [ 160.657035][ T30] audit: type=1400 audit(1717278720.232:151): avc: denied { create } for pid=7898 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 160.683954][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.701801][ T10] device bridge_slave_0 left promiscuous mode [ 160.716515][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.725345][ T10] device veth1_macvtap left promiscuous mode [ 161.040576][ T7914] device syzkaller0 entered promiscuous mode [ 161.131009][ T7931] device syzkaller0 entered promiscuous mode [ 161.243846][ T7939] device syzkaller0 entered promiscuous mode [ 161.391238][ T7976] device pim6reg1 entered promiscuous mode [ 161.562327][ T7980] device syzkaller0 entered promiscuous mode [ 161.622153][ T7987] device syzkaller0 entered promiscuous mode [ 161.923948][ T8021] device syzkaller0 entered promiscuous mode [ 162.010320][ T8035] device syzkaller0 entered promiscuous mode [ 162.048573][ T8041] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 162.208975][ T8065] device syzkaller0 entered promiscuous mode [ 162.395348][ T8091] device syzkaller0 entered promiscuous mode [ 162.540791][ T8112] device syzkaller0 entered promiscuous mode [ 162.752500][ T8140] device syzkaller0 entered promiscuous mode [ 162.917027][ T8160] device syzkaller0 entered promiscuous mode [ 162.959420][ T8162] device syzkaller0 entered promiscuous mode [ 163.310880][ T8193] device syzkaller0 entered promiscuous mode [ 163.330902][ T8195] Â: renamed from pim6reg1 [ 163.377561][ T8197] device syzkaller0 entered promiscuous mode [ 163.393979][ T8202] device wg2 entered promiscuous mode [ 163.537992][ T8211] device syzkaller0 entered promiscuous mode [ 163.553488][ T8216] syz-executor.2[8216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.553558][ T8216] syz-executor.2[8216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.824384][ T8235] device syzkaller0 entered promiscuous mode [ 164.003513][ T8239] device syzkaller0 entered promiscuous mode [ 164.227741][ T8250] device syzkaller0 entered promiscuous mode [ 164.355941][ T8262] device syzkaller0 entered promiscuous mode [ 164.461124][ T8269] device syzkaller0 entered promiscuous mode [ 165.444355][ T8304] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 165.503727][ T8316] device syzkaller0 entered promiscuous mode [ 165.776790][ T8325] device syzkaller0 entered promiscuous mode [ 166.646488][ T8364] device syzkaller0 entered promiscuous mode [ 167.277978][ T8405] device syzkaller0 entered promiscuous mode [ 167.482884][ T8416] device syzkaller0 entered promiscuous mode [ 167.647281][ T8435] device syzkaller0 entered promiscuous mode [ 168.007927][ T8464] device syzkaller0 entered promiscuous mode [ 168.045350][ T8466] device syzkaller0 entered promiscuous mode [ 168.064117][ T8468] device syzkaller0 entered promiscuous mode [ 168.390296][ T8495] device syzkaller0 entered promiscuous mode [ 168.436182][ T8499] device syzkaller0 entered promiscuous mode [ 168.567247][ T8506] device syzkaller0 entered promiscuous mode [ 168.655936][ T8515] device syzkaller0 entered promiscuous mode [ 168.881612][ T8542] device syzkaller0 entered promiscuous mode [ 168.906196][ T8540] device syzkaller0 entered promiscuous mode [ 169.132619][ T8582] device syzkaller0 entered promiscuous mode [ 169.166160][ T8583] device syzkaller0 entered promiscuous mode [ 169.192368][ T8587] device syzkaller0 entered promiscuous mode [ 169.216573][ T8589] device syzkaller0 entered promiscuous mode [ 169.455094][ T8623] device syzkaller0 entered promiscuous mode [ 169.490548][ T8621] device syzkaller0 entered promiscuous mode [ 169.518321][ T8625] device syzkaller0 entered promiscuous mode [ 169.658252][ T8632] device syzkaller0 entered promiscuous mode [ 169.813447][ T8660] device syzkaller0 entered promiscuous mode [ 169.848354][ T8662] device syzkaller0 entered promiscuous mode [ 169.882100][ T8664] device syzkaller0 entered promiscuous mode [ 169.981049][ T8675] device veth1_macvtap left promiscuous mode [ 170.029133][ T8675] device macsec0 left promiscuous mode [ 170.247011][ T8686] device syzkaller0 entered promiscuous mode [ 170.965383][ T8744] device syzkaller0 entered promiscuous mode [ 171.029101][ T8750] device syzkaller0 entered promiscuous mode [ 171.225202][ T8779] device syzkaller0 entered promiscuous mode [ 171.321139][ T8789] device syzkaller0 entered promiscuous mode [ 171.875738][ T8821] device pim6reg1 entered promiscuous mode [ 173.094816][ T8943] device syzkaller0 entered promiscuous mode [ 174.106805][ T9025] geneve1: tun_chr_ioctl cmd 1074025681 [ 174.199779][ T9031] device syzkaller0 entered promiscuous mode [ 174.406581][ T9041] syz-executor.4[9041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.406648][ T9041] syz-executor.4[9041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.609144][ T9049] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 174.920377][ T9083] device syzkaller0 entered promiscuous mode [ 174.999728][ T9090] rose0: tun_chr_ioctl cmd 1074025677 [ 175.025165][ T9090] rose0: linktype set to 804 [ 175.054294][ T9090] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.061237][ T9090] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.514272][ T9128] device syzkaller0 entered promiscuous mode [ 176.014713][ T377] syz-executor.4 (377) used greatest stack depth: 19808 bytes left [ 176.036218][ T9152] geneve1: tun_chr_ioctl cmd 1074025680 [ 176.157278][ T9157] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.165285][ T9157] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.173241][ T9157] device bridge_slave_0 entered promiscuous mode [ 176.180326][ T9157] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.187325][ T9157] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.195814][ T9157] device bridge_slave_1 entered promiscuous mode [ 176.226134][ T9166] device syzkaller0 entered promiscuous mode [ 176.291652][ T9157] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.298527][ T9157] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.305780][ T9157] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.315718][ T9157] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.350161][ T846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.358157][ T846] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.368255][ T846] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.378155][ T508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.395051][ T508] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.401925][ T508] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.425504][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.434096][ T518] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.441074][ T518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.448360][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.456683][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.481728][ T9157] device veth0_vlan entered promiscuous mode [ 176.497248][ T843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.505685][ T843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.513501][ T843] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.521289][ T843] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.550689][ T9157] device veth1_macvtap entered promiscuous mode [ 176.559993][ T843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.571539][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 176.583761][ T843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 176.648477][ T9196] device syzkaller0 entered promiscuous mode [ 176.699455][ T9202] device syzkaller0 entered promiscuous mode [ 176.736153][ T45] device bridge_slave_1 left promiscuous mode [ 176.742226][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.749721][ T45] device bridge_slave_0 left promiscuous mode [ 176.756035][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.766283][ T45] device veth0_vlan left promiscuous mode [ 177.037798][ T9234] device syzkaller0 entered promiscuous mode [ 177.100977][ T9242] device syzkaller0 entered promiscuous mode [ 177.288090][ T9269] device veth0_vlan left promiscuous mode [ 177.296984][ T9269] device veth0_vlan entered promiscuous mode [ 177.369054][ T9284] device syzkaller0 entered promiscuous mode [ 177.496408][ T9308] device pim6reg1 entered promiscuous mode [ 177.594342][ T9323] device syzkaller0 entered promiscuous mode [ 177.734399][ T9351] syz-executor.3[9351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.734465][ T9351] syz-executor.3[9351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.801992][ T9358] device syzkaller0 entered promiscuous mode [ 177.836875][ T9359] device syzkaller0 entered promiscuous mode [ 177.871014][ T9364] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 178.037989][ T9386] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 178.066697][ T9388] device syzkaller0 entered promiscuous mode [ 178.098462][ T9392] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 178.126720][ T9390] device syzkaller0 entered promiscuous mode [ 178.187963][ T9400] device syzkaller0 entered promiscuous mode [ 178.215877][ T9404] device syzkaller0 entered promiscuous mode [ 178.271594][ T9409] device veth0_vlan left promiscuous mode [ 178.278063][ T9409] device veth0_vlan entered promiscuous mode [ 178.340794][ T9432] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 178.364393][ T30] audit: type=1400 audit(1717278737.932:152): avc: denied { create } for pid=9431 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 178.559806][ T9472] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 178.612637][ T9476] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 178.627028][ T9479] device syzkaller0 entered promiscuous mode [ 178.783944][ T9496] device syzkaller0 entered promiscuous mode [ 178.865269][ T9514] device syzkaller0 entered promiscuous mode [ 178.891704][ T9518] device syzkaller0 entered promiscuous mode [ 179.612525][ T9547] device syzkaller0 entered promiscuous mode [ 179.693974][ T9549] device syzkaller0 entered promiscuous mode [ 180.020303][ T9584] device syzkaller0 entered promiscuous mode [ 180.087729][ T9594] device syzkaller0 entered promiscuous mode [ 180.288930][ T9628] device syzkaller0 entered promiscuous mode [ 180.358513][ T9632] device pim6reg1 entered promiscuous mode [ 180.863338][ T9679] device syzkaller0 entered promiscuous mode [ 181.303270][ T9734] device syzkaller0 entered promiscuous mode [ 181.564910][ T9750] syz-executor.0[9750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.564978][ T9750] syz-executor.0[9750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.923093][ T9768] device syzkaller0 entered promiscuous mode [ 182.359202][ T9797] device pim6reg1 entered promiscuous mode [ 182.393554][ T9808] device syzkaller0 entered promiscuous mode [ 182.608117][ T9835] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 1 (only 8 groups) [ 182.658596][ T9841] device syzkaller0 entered promiscuous mode [ 182.697623][ T9837] device pim6reg1 entered promiscuous mode [ 182.926941][ T9875] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 183.137645][ T9886] device pim6reg1 entered promiscuous mode [ 183.160490][ T9897] device syzkaller0 entered promiscuous mode [ 183.251879][ T9911] syz-executor.1[9911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.251939][ T9911] syz-executor.1[9911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.527575][ T9944] device syzkaller0 entered promiscuous mode [ 183.625806][ T9962] device syzkaller0 entered promiscuous mode [ 184.223551][T10004] device syzkaller0 entered promiscuous mode [ 184.274121][T10008] syz-executor.4[10008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.274187][T10008] syz-executor.4[10008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.281754][T10006] device syzkaller0 entered promiscuous mode [ 184.465620][T10031] syz-executor.0[10031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.465681][T10031] syz-executor.0[10031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.530334][T10039] device syzkaller0 entered promiscuous mode [ 184.792232][T10089] device syzkaller0 entered promiscuous mode [ 185.092911][T10138] device syzkaller0 entered promiscuous mode [ 185.295952][T10151] device syzkaller0 entered promiscuous mode [ 185.312935][T10143] tun1: tun_chr_ioctl cmd 2148553947 [ 185.539808][T10175] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 185.588445][T10167] device syzkaller0 entered promiscuous mode [ 185.607542][T10179] device pim6reg1 entered promiscuous mode [ 185.852494][T10193] device syzkaller0 entered promiscuous mode [ 185.878203][T10196] device syzkaller0 entered promiscuous mode [ 186.035344][T10227] syz-executor.2[10227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.035517][T10227] syz-executor.2[10227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.092262][T10228] tun1: tun_chr_ioctl cmd 2148553947 [ 186.180268][T10236] device syzkaller0 entered promiscuous mode [ 186.222300][T10240] device syzkaller0 entered promiscuous mode [ 186.496584][T10285] device syzkaller0 entered promiscuous mode [ 186.569514][T10290] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.576497][T10290] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.583850][T10290] device bridge_slave_0 entered promiscuous mode [ 186.596742][T10290] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.606522][T10290] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.617457][T10290] device bridge_slave_1 entered promiscuous mode [ 186.638843][T10301] bpf_get_probe_write_proto: 2 callbacks suppressed [ 186.638857][T10301] syz-executor.4[10301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.651914][T10301] syz-executor.4[10301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.745200][T10290] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.763596][T10290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.770740][T10290] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.777950][T10290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.996003][T10315] tun1: tun_chr_ioctl cmd 2148553947 [ 187.016508][ T839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.026251][ T839] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.042488][ T839] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.066571][ T839] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.080181][ T839] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.089253][ T839] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.142027][ T839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 187.163183][ T839] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.176262][ T839] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.205083][T10290] device veth0_vlan entered promiscuous mode [ 187.218467][ T843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.228015][T10337] syz-executor.3[10337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.228086][T10337] syz-executor.3[10337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.247587][T10290] device veth1_macvtap entered promiscuous mode [ 187.278840][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 187.290063][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 187.298737][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 187.326850][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 187.338741][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 187.546846][ T45] device bridge_slave_1 left promiscuous mode [ 187.553957][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.578697][ T45] device bridge_slave_0 left promiscuous mode [ 187.592422][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.617488][ T45] device veth0_vlan left promiscuous mode [ 187.654738][T10362] syz-executor.3[10362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.654809][T10362] syz-executor.3[10362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.933017][T10399] syz-executor.3[10399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.980155][T10399] syz-executor.3[10399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.005810][T10388] tun1: tun_chr_ioctl cmd 2148553947 [ 188.258517][T10434] syz-executor.2[10434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.258630][T10434] syz-executor.2[10434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.574465][T10467] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 188.962529][T10517] device wg2 left promiscuous mode [ 189.012714][T10517] device wg2 entered promiscuous mode [ 189.122734][T10531] device pim6reg1 entered promiscuous mode [ 189.320467][T10543] device wg2 entered promiscuous mode [ 190.115779][T10573] device wg2 entered promiscuous mode [ 190.220791][T10572] device pim6reg1 entered promiscuous mode [ 190.684251][T10593] device syzkaller0 entered promiscuous mode [ 190.904290][ C0] softirq: huh, entered softirq 9 RCU ffffffff815cb340 with preempt_count 00000103, exited with 00000102? [ 190.918984][ T527] BUG: workqueue leaked lock or atomic: kworker/0:52/0x00000001/527 [ 190.918984][ T527] last function: bpf_prog_free_deferred [ 190.935203][ T527] CPU: 0 PID: 527 Comm: kworker/0:52 Tainted: G W 5.15.149-syzkaller-00055-g424f92bcbe8f #0 [ 190.947331][ T527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 190.959412][ T527] Workqueue: events bpf_prog_free_deferred [ 190.965057][ T527] Call Trace: [ 190.968163][ T527] [ 190.973624][ T527] dump_stack_lvl+0x151/0x1b7 [ 190.978326][ T527] ? io_uring_drop_tctx_refs+0x190/0x190 [ 190.984747][ T527] ? bpf_prog_free_deferred+0x61e/0x730 [ 190.993494][ T527] dump_stack+0x15/0x17 [ 190.998456][ T527] process_one_work+0x8d8/0xc10 [ 191.003358][ T527] worker_thread+0xad5/0x12a0 [ 191.008104][ T527] kthread+0x421/0x510 [ 191.012013][ T527] ? worker_clr_flags+0x180/0x180 [ 191.016992][ T527] ? kthread_blkcg+0xd0/0xd0 [ 191.022157][ T527] ret_from_fork+0x1f/0x30 [ 191.027118][ T527] [ 191.030704][ T527] BUG: workqueue leaked lock or atomic: kworker/0:52/0x00000001/527 [ 191.030704][ T527] last function: bpf_prog_free_deferred [ 191.044746][ T527] CPU: 0 PID: 527 Comm: kworker/0:52 Tainted: G W 5.15.149-syzkaller-00055-g424f92bcbe8f #0 [ 191.062126][ T527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 191.076206][ T527] Workqueue: events bpf_prog_free_deferred [ 191.082429][ T527] Call Trace: [ 191.086250][ T527] [ 191.089154][ T527] dump_stack_lvl+0x151/0x1b7 [ 191.094066][ T527] ? io_uring_drop_tctx_refs+0x190/0x190 [ 191.099663][ T527] ? bpf_prog_free_deferred+0x61e/0x730 [ 191.105057][ T527] dump_stack+0x15/0x17 [ 191.109030][ T527] process_one_work+0x8d8/0xc10 [ 191.113736][ T527] worker_thread+0xad5/0x12a0 [ 191.118239][ T527] kthread+0x421/0x510 [ 191.122134][ T527] ? worker_clr_flags+0x180/0x180 [ 191.127102][ T527] ? kthread_blkcg+0xd0/0xd0 [ 191.132572][ T527] ret_from_fork+0x1f/0x30 [ 191.138502][ T527] [ 191.141546][ T527] BUG: workqueue leaked lock or atomic: kworker/0:52/0x00000001/527 [ 191.141546][ T527] last function: process_srcu [ 191.160731][ T527] CPU: 0 PID: 527 Comm: kworker/0:52 Tainted: G W 5.15.149-syzkaller-00055-g424f92bcbe8f #0 [ 191.172202][ T527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 191.183402][ T527] Workqueue: rcu_gp process_srcu [ 191.190347][ T527] Call Trace: [ 191.195982][ T527] [ 191.198907][ T527] dump_stack_lvl+0x151/0x1b7 [ 191.203506][ T527] ? io_uring_drop_tctx_refs+0x190/0x190 [ 191.209062][ T527] dump_stack+0x15/0x17 [ 191.213048][ T527] process_one_work+0x8d8/0xc10 [ 191.217743][ T527] worker_thread+0xad5/0x12a0 [ 191.222258][ T527] kthread+0x421/0x510 [ 191.226156][ T527] ? worker_clr_flags+0x180/0x180 [ 191.231016][ T527] ? kthread_blkcg+0xd0/0xd0 [ 191.235445][ T527] ret_from_fork+0x1f/0x30 [ 191.239700][ T527] [ 191.242683][ T527] BUG: workqueue leaked lock or atomic: kworker/0:52/0x00000001/527 [ 191.242683][ T527] last function: bpf_map_free_deferred [ 191.256414][ T527] CPU: 0 PID: 527 Comm: kworker/0:52 Tainted: G W 5.15.149-syzkaller-00055-g424f92bcbe8f #0 [ 191.267582][ T527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 191.277477][ T527] Workqueue: events bpf_map_free_deferred [ 191.283030][ T527] Call Trace: [ 191.286154][ T527] [ 191.288934][ T527] dump_stack_lvl+0x151/0x1b7 [ 191.293446][ T527] ? io_uring_drop_tctx_refs+0x190/0x190 [ 191.298915][ T527] ? queue_stack_map_free+0x15/0x20 [ 191.303952][ T527] ? bpf_map_free_deferred+0x10d/0x1e0 [ 191.309249][ T527] dump_stack+0x15/0x17 [ 191.313495][ T527] process_one_work+0x8d8/0xc10 [ 191.318184][ T527] worker_thread+0xad5/0x12a0 [ 191.322700][ T527] kthread+0x421/0x510 [ 191.326600][ T527] ? worker_clr_flags+0x180/0x180 [ 191.331459][ T527] ? kthread_blkcg+0xd0/0xd0 [ 191.335889][ T527] ret_from_fork+0x1f/0x30 [ 191.340228][ T527] [ 191.343344][ T527] BUG: workqueue leaked lock or atomic: kworker/0:52/0x00000001/527 [ 191.343344][ T527] last function: wg_packet_tx_worker [ 191.356866][ T527] CPU: 0 PID: 527 Comm: kworker/0:52 Tainted: G W 5.15.149-syzkaller-00055-g424f92bcbe8f #0 [ 191.368036][ T527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 191.377933][ T527] Workqueue: wg-crypt-wg1 wg_packet_tx_worker [ 191.383831][ T527] Call Trace: [ 191.386959][ T527] [ 191.389734][ T527] dump_stack_lvl+0x151/0x1b7 [ 191.394248][ T527] ? io_uring_drop_tctx_refs+0x190/0x190 [ 191.399713][ T527] ? wg_packet_tx_worker+0x514/0x530 2024/06/01 21:52:30 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 191.404836][ T527] dump_stack+0x15/0x17 [ 191.408938][ T527] process_one_work+0x8d8/0xc10 [ 191.413612][ T527] worker_thread+0xad5/0x12a0 [ 191.418121][ T527] kthread+0x421/0x510 [ 191.422019][ T527] ? worker_clr_flags+0x180/0x180 [ 191.426884][ T527] ? kthread_blkcg+0xd0/0xd0 [ 191.431305][ T527] ret_from_fork+0x1f/0x30 [ 191.435562][ T527] [ 191.438717][ T527] BUG: workqueue leaked lock or atomic: kworker/0:52/0x00000001/527 [ 191.438717][ T527] last function: srcu_invoke_callbacks [ 191.452366][ T527] CPU: 0 PID: 527 Comm: kworker/0:52 Tainted: G W 5.15.149-syzkaller-00055-g424f92bcbe8f #0 [ 191.463553][ T527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 191.473976][ T527] Workqueue: rcu_gp srcu_invoke_callbacks [ 191.479519][ T527] Call Trace: [ 191.482642][ T527] [ 191.485418][ T527] dump_stack_lvl+0x151/0x1b7 [ 191.489933][ T527] ? io_uring_drop_tctx_refs+0x190/0x190 [ 191.495400][ T527] ? __kasan_check_read+0x11/0x20 [ 191.500257][ T527] ? read_word_at_a_time+0x12/0x20 [ 191.505210][ T527] ? strscpy+0x9c/0x260 [ 191.509197][ T527] dump_stack+0x15/0x17 [ 191.513189][ T527] process_one_work+0x8d8/0xc10 [ 191.517880][ T527] worker_thread+0xad5/0x12a0 [ 191.522396][ T527] kthread+0x421/0x510 [ 191.526295][ T527] ? worker_clr_flags+0x180/0x180 [ 191.531156][ T527] ? kthread_blkcg+0xd0/0xd0 [ 191.535583][ T527] ret_from_fork+0x1f/0x30 [ 191.539840][ T527] [ 191.542765][ T527] BUG: workqueue leaked lock or atomic: kworker/0:52/0x00000001/527 [ 191.542765][ T527] last function: wg_packet_encrypt_worker [ 191.556519][ T527] CPU: 0 PID: 527 Comm: kworker/0:52 Tainted: G W 5.15.149-syzkaller-00055-g424f92bcbe8f #0 [ 191.567697][ T527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 191.577598][ T527] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 191.583930][ T527] Call Trace: [ 191.587053][ T527] [ 191.589840][ T527] dump_stack_lvl+0x151/0x1b7 [ 191.594343][ T527] ? io_uring_drop_tctx_refs+0x190/0x190 [ 191.599812][ T527] ? __kasan_check_write+0x14/0x20 [ 191.604758][ T527] dump_stack+0x15/0x17 [ 191.608749][ T527] process_one_work+0x8d8/0xc10 [ 191.613437][ T527] worker_thread+0xad5/0x12a0 [ 191.617957][ T527] kthread+0x421/0x510 [ 191.621854][ T527] ? worker_clr_flags+0x180/0x180 [ 191.626719][ T527] ? kthread_blkcg+0xd0/0xd0 [ 191.631151][ T527] ret_from_fork+0x1f/0x30 [ 191.635398][ T527] [ 191.638436][ T527] BUG: workqueue leaked lock or atomic: kworker/0:52/0x00000001/527 [ 191.638436][ T527] last function: wg_packet_decrypt_worker [ 191.652339][ T527] CPU: 0 PID: 527 Comm: kworker/0:52 Tainted: G W 5.15.149-syzkaller-00055-g424f92bcbe8f #0 [ 191.663589][ T527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 191.673486][ T527] Workqueue: wg-crypt-wg2 wg_packet_decrypt_worker [ 191.679827][ T527] Call Trace: [ 191.682945][ T527] [ 191.685809][ T527] dump_stack_lvl+0x151/0x1b7 [ 191.690323][ T527] ? io_uring_drop_tctx_refs+0x190/0x190 [ 191.695786][ T527] ? __kasan_check_write+0x14/0x20 [ 191.700744][ T527] dump_stack+0x15/0x17 [ 191.704730][ T527] process_one_work+0x8d8/0xc10 [ 191.709537][ T527] worker_thread+0xad5/0x12a0 [ 191.714046][ T527] kthread+0x421/0x510 [ 191.717947][ T527] ? worker_clr_flags+0x180/0x180 [ 191.722810][ T527] ? kthread_blkcg+0xd0/0xd0 [ 191.727238][ T527] ret_from_fork+0x1f/0x30 [ 191.731815][ T527] [ 191.734791][ T527] BUG: scheduling while atomic: kworker/0:52/527/0x00000002 [ 191.741869][ T527] Modules linked in: [ 191.745628][ T527] Preemption disabled at: [ 191.745637][ T527] [] free_unref_page+0x1ac/0x750 [ 191.756124][ T527] CPU: 0 PID: 527 Comm: kworker/0:52 Tainted: G W 5.15.149-syzkaller-00055-g424f92bcbe8f #0 [ 191.767297][ T527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 191.777195][ T527] Workqueue: 0x0 (wg-crypt-wg2) [ 191.782052][ T527] Call Trace: [ 191.785176][ T527] [ 191.787961][ T527] dump_stack_lvl+0x151/0x1b7 [ 191.792471][ T527] ? free_unref_page+0x1ac/0x750 [ 191.797240][ T527] ? free_unref_page+0x1ac/0x750 [ 191.802044][ T527] ? io_uring_drop_tctx_refs+0x190/0x190 [ 191.807791][ T527] ? free_unref_page+0x1ac/0x750 [ 191.812646][ T527] dump_stack+0x15/0x17 [ 191.816624][ T527] __schedule_bug+0x195/0x260 [ 191.821230][ T527] ? dump_stack_lvl+0x167/0x1b7 [ 191.825911][ T527] ? dump_stack_lvl+0x17c/0x1b7 [ 191.830597][ T527] ? ttwu_queue_wakelist+0x510/0x510 [ 191.835718][ T527] ? dump_stack_lvl+0x186/0x1b7 [ 191.840438][ T527] __schedule+0xd19/0x1590 [ 191.844661][ T527] ? pwq_dec_nr_in_flight+0x191/0x3d0 [ 191.849869][ T527] ? __sched_text_start+0x8/0x8 [ 191.854552][ T527] ? process_one_work+0x82f/0xc10 [ 191.859411][ T527] ? kthread_data+0x53/0xc0 [ 191.863752][ T527] ? wq_worker_sleeping+0x63/0x200 [ 191.868701][ T527] schedule+0x11f/0x1e0 [ 191.872722][ T527] worker_thread+0xf7f/0x12a0 [ 191.877240][ T527] kthread+0x421/0x510 [ 191.881209][ T527] ? worker_clr_flags+0x180/0x180 [ 191.886063][ T527] ? kthread_blkcg+0xd0/0xd0 [ 191.890490][ T527] ret_from_fork+0x1f/0x30 [ 191.894744][ T527] [ 191.904992][T10609] device wg2 entered promiscuous