last executing test programs: 1.291562701s ago: executing program 0: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x10, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000032500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000850000000f000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="18010000210000c90000000000000000850000007b000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000200000000000000000085000000070000001801000020646c2500000000002020607b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x15, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000100850000000100000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000008c0)='sys_enter\x00', r7}, 0x10) mkdir(0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r3}, &(0x7f00000003c0), &(0x7f0000000400)=r2}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x15, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000100850000000100000018110000", @ANYRES32=r4], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180300002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000c80)='kmem_cache_free\x00', r11}, 0x10) sendmsg$tipc(r10, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) close(r9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00', r8}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 1.287643481s ago: executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000800)={{r2}, &(0x7f0000000780), &(0x7f00000007c0)='%pB \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000004c0)='7', 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/78, 0x4e}], 0x1}, 0x0) 1.190275597s ago: executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) 987.720688ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=0x0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='jbd2_handle_stats\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_service_bytes_recursive\x00', 0x26e1, 0x2e) 903.796101ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x58}}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe6e, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7321, 0x7}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) 853.491739ms ago: executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.idle_time\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x0, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='ext4_fc_track_inode\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='ext4_fc_track_inode\x00', r3}, 0x10) write$cgroup_int(r5, &(0x7f00000000c0), 0x12) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r6}, &(0x7f0000000080), &(0x7f0000000200)='%-010d \x00'}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f00000005c0)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000001c00)='ext4_es_insert_delayed_block\x00'}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000080)='ext4_es_insert_delayed_block\x00', r9}, 0x10) write$cgroup_subtree(r0, &(0x7f00000009c0)=ANY=[], 0xda00) 810.823345ms ago: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r4, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}], 0x1}, 0x0) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000380)="3e52f92982fb945a1b082af50e1c54b464935b5050c97e110b6416f2f32187fcdf", 0x21}], 0x1}, 0x0) 686.808074ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b700000000000000"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x2d) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000001080)='>', 0x1}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) 554.787135ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b70300000000002085000000720000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_es_find_extent_range_exit\x00', r0}, 0x10) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) 509.383922ms ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, 0x0, 0x3260c) 458.4902ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_da_write_pages_extent\x00', r1}, 0x10) write$cgroup_type(r2, &(0x7f0000000000), 0x9) 447.039312ms ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=@framed={{}, [@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffd}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x51) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0x1, 0x0, r1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)=r1}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r3, &(0x7f0000000d40), 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x1c, &(0x7f00000003c0)=@framed={{}, [@ringbuf_query, @snprintf, @printk={@lli}]}, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000180), 0x12) write$cgroup_pid(r7, &(0x7f0000000340), 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r9, &(0x7f0000000000), 0x248800) 377.186912ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x8, 0x3, 0x9}, 0x48) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002002007b1af8ff00000000bf"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x2, 0x2, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x200000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='ext4_writepages\x00', r7}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='ext4_writepages\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r9, &(0x7f0000000980), 0x12) write$cgroup_devices(r2, &(0x7f00000003c0)={'a', ' *:* ', 'wm\x00'}, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r5}, &(0x7f0000000040), &(0x7f0000000140)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000b9976ad2cc6916d8000000001f95e5bb", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r11, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd4d}], 0x1}, 0x0) write$cgroup_devices(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="61202a2072289d585945fb5e3853a9496041c6806068b8f74f4dd007776d0061c46cfb873bba30e6f7717255047ce68001d4d4eeacde433c37d47c0207db"], 0xa) write$cgroup_subtree(r3, 0x0, 0x32600) 361.743194ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r2}, &(0x7f0000000a00), &(0x7f0000000a40)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r2}, 0x0, &(0x7f00000008c0)=r1}, 0x20) 275.362518ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x10) bpf$MAP_CREATE(0x9, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) 262.70813ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x8, 0x10001, 0x9, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='ext4_writepages\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r6, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x2, &(0x7f0000000680)={0x3, 0x3, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_type(r4, &(0x7f0000000180), 0x2009) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r1}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x27}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x11}, 0x90) 258.87466ms ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}], 0x1}, 0x0) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000380)="3e52f92982fb945a1b082af50e1c54b464935b5050c97e110b6416f2f32187fcdf", 0x21}], 0x1}, 0x0) 236.237634ms ago: executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) close(r0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'bond0\x00', 0x1000}) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000140)=r2}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)=':$\x00') bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r4, &(0x7f0000000240)="f9056f765280f5e485c7ba163edc3a9f2a5022b268beef7d5898c06dcf4c3949481f566b52530ece85fd2b75e8b30e91bdaea7a65a34050869742ba2fe1bcd"}, 0x20) r5 = openat$cgroup_ro(r0, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) write$cgroup_devices(r5, &(0x7f0000000300)={'b', ' *:* ', 'rw\x00'}, 0x9) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000000380)=r1) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f00000003c0)=0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', r0, 0x4000, r0}, 0x18) r6 = getpid() r7 = gettid() r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0x0, 0x5}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000780)={r0, 0xffffffffffffffff}, 0x4) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$unix(r1, &(0x7f0000000900)={&(0x7f0000000480)=@abs={0x8eb86c693deea9c4, 0x0, 0x4e23}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000500)="90d04430741bdd28a87135eebac661e3e379b48afd93025a218b6bb134d3645dc7c9e36595c5120873642883d97e668a0fc491511bb70dc4617ba7d3da0c", 0x3e}, {&(0x7f0000000540)="c0837aa81f123c74c0b582c1e466ff9ff80b015b86eea6455d8dc5fc895ef9e0d373989ab1b7f29c76e3bfba379a32ab13b3c4e91b63b5e773629241b29027c91aa43497fb4fcfd283513e8300aa96034bd67ad2e8e732c6477983c96e6abbbf6a49415882a87ea4811c61a257820ace9fc07353d494c5b00a8521b78e0813411e72f3298e33e3eed09ba1cfc2240f170486837568fb1628ee3c897c54b1f6dd1b429cdea81c850a4d81b86c2634f93d7e32ccc14e9674f150fb41567edaf1f17e6ff7", 0xc3}, {&(0x7f0000000640)="ae3ad82e42379c14a1f07c3c35c6948db44a6505f2514b2599693dfeaa504759a3c7ccae0be546fab2ee02c7b0d9bb363b44ccdcdbc68b922282c6ea2cfea62a6e1d283d8dedcfcd1fc5e2d19c211b254ecae3e5d09778facd79c64d9e128326b677be5888f090e901", 0x69}, {&(0x7f00000006c0)="231bc414f2dd1f310ec23d67fdc770d95bdc983bd165d29d34", 0x19}], 0x4, &(0x7f0000000800)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x2c, 0x1, 0x1, [r2, r0, r8, r1, r9, r3, r0]}}, @rights={{0x30, 0x1, 0x1, [r0, r1, r4, r5, r4, r1, r0, r3]}}, @rights={{0x20, 0x1, 0x1, [r2, r0, r5, r10]}}, @rights={{0x20, 0x1, 0x1, [r1, r3, r5, r0]}}], 0x100, 0x50}, 0x8010) r11 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000940), 0x40042, 0x0) getpid() r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000980)=0xffffffffffffffff, 0x4) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x5, 0x3284, r2, 0x9, '\x00', 0x0, r12, 0x4, 0x0, 0x3, 0x2}, 0x48) r14 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a40)='./cgroup/syz1\x00', 0x200002, 0x0) r15 = openat$cgroup_ro(r14, &(0x7f0000000a80)='cpuset.effective_mems\x00', 0x0, 0x0) r16 = openat$cgroup_ro(r14, &(0x7f0000000ac0)='pids.events\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000b00)='hwmon_attr_show_string\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x13, 0xc, &(0x7f0000000b80)=@raw=[@map_fd={0x18, 0xb, 0x1, 0x0, r1}, @exit, @alu={0x7, 0x0, 0x2, 0x6, 0x7, 0xffffffffffffffff, 0x4}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xa63d}}], &(0x7f0000000c00)='syzkaller\x00', 0x7ff, 0xe8, &(0x7f0000000c40)=""/232, 0x41100, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000d40)={0x4, 0x6, 0x80, 0x5f}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000001240)=[r4, r3, r5, r11, r4, r16, r15, 0xffffffffffffffff, r8, r13], &(0x7f0000001280)=[{0x5, 0x4, 0x1, 0x8}, {0x0, 0x3, 0x6}, {0x3, 0x1ff, 0x3}, {0x5, 0x3, 0x6, 0x6}], 0x10, 0x5}, 0x90) 222.028496ms ago: executing program 2: perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0xa, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 202.885269ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) getpid() bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="1805000000000000000000000000e044ae0f0b78f17600b7080000000000007b8af8ff00040000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000", @ANYRES32, @ANYRES64=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x99, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000001c0)='irq_handler_entry\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000020000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'vxcan1\x00', 0xf101}) write$cgroup_devices(r3, &(0x7f0000000180)=ANY=[], 0xffdd) 190.501101ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x0, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001900000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 187.106181ms ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x58}}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe6e, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7321, 0x7}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) 174.414083ms ago: executing program 3: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000007e18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) socketpair(0xa, 0x3, 0xff, &(0x7f0000000000)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='timer_start\x00', r2}, 0x10) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) 142.120648ms ago: executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000002c7b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x42, &(0x7f0000000900), 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r5}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x34100) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000650018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000014000000b7030000000000808500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r10}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x240008b0) recvmsg$unix(r11, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000ec0)=@base={0x0, 0x81, 0x4, 0xfffffffc, 0x180, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x8000, 0x3, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x20, 0x5, &(0x7f00000010c0)=ANY=[@ANYBLOB="18000000fcffffff000000000002000018260000950713753b58852cf3837bfaf1f9e4d3988ed26ddf3728da77bd8f47859f02", @ANYRES32, @ANYBLOB="00000000ffff00009500000000000000"], &(0x7f0000000e00)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000f40)=[r12, r13, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000f80)=[{0x0, 0x4, 0xf, 0xc}, {0x2, 0x5, 0x8, 0xc}, {0x1, 0x3, 0x10, 0x9}, {0x2, 0x3, 0x1, 0x2}, {0x5, 0x4, 0x2}, {0x5, 0x1, 0x4, 0x2}, {0x1, 0x5, 0x5, 0x4}], 0x10, 0x7}, 0x90) sendmsg$inet(r7, &(0x7f0000000800)={&(0x7f00000003c0)={0x2, 0x4e23, @rand_addr=0x24010102}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000600)="8c09827db8e2d48e37dbd148026606472aa44d491ac7a44722e76238fb7340bfce0347809afa23698f23aab53e2addb60f94474e8e6cec40ff4f6a08e21d17b11d506f36ef36ee68f57454cfd17963188ce1748e4e94d3ed81950c76c5a4beb0828e91ce56597c4c9767baaab665ef1848ddf2441c", 0x75}, {&(0x7f0000000680)="56849476424a23fc94ce8f59be361e770276029d68593cae215a7281eb73a691003289c746c816e9587df538730e104609773021767becfbd7c44662f552eaa038f48c87371f2d0eeaffb5bf94dd035118201d83d0d5b87675046e4669aa5248c7d54c944833dd3d81f290c501eaecf1844556df30b06d2d8a4686cb538f7f974d598f47df362972a7fad8fc6c4f4624a699b2024ff65e9d6127e73b3d85ec32f4b0f5a80bd7ea30f98bade0c4b411ab639caec93309c43715bc036c3d705c079b63f50a4cc2bd3d8a622e4368d3ea500b976ac30d62edc126cf02da702255089f017ff68c4718ade0be2e", 0xeb}, {&(0x7f0000000940)="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", 0x1000}], 0x3, &(0x7f0000000840)=[@ip_retopts={{0x48, 0x0, 0x7, {[@timestamp_addr={0x44, 0xc, 0xa8, 0x1, 0xb, [{@loopback, 0x8}]}, @noop, @timestamp_prespec={0x44, 0x14, 0x1e, 0x3, 0x1, [{@remote, 0x2}, {@dev={0xac, 0x14, 0x14, 0x37}, 0x400}]}, @timestamp={0x44, 0x14, 0x54, 0x0, 0x6, [0x1f, 0x9, 0x3, 0x6]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x40}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @broadcast}}}], 0x80}, 0x24044094) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9) write$cgroup_int(r8, &(0x7f0000000200), 0x43400) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) 133.94056ms ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r2}, &(0x7f0000000a00), &(0x7f0000000a40)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r2}, 0x0, &(0x7f00000008c0)=r1}, 0x20) 122.057331ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='ext4_allocate_inode\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) 106.030544ms ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r2 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x6, 0x46, 0x0, 0x5, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x1}, 0x8544, 0x7, 0x80000000, 0x7, 0x1777, 0xfff, 0x7, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xb, r1, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000280)=']^\\(}\xb6\x00') (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0), 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000000), 0x400000) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0xfffffffc}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x81}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @exit]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x34, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001d80)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000003c0)='kmem_cache_free\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x20001, 0x0, 0x1}, 0x1d) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r11, 0x0, 0x0}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r12}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) 87.208567ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="b400000000000000791048000000000071004000000000009500000000000000db74589d4b38cc306ac390649f72dea0e50e2317db042855d6c74ff3493c7e31e3f6c643155a8e2e01d50bc3347475750472719cc516fa14b769e7f385ba72c60242263c05ddab05e37efe81b8bffc35cdf2ac0d93263ff755d611c4cca1684b1470af6a83366aa430ad2d700b186da622d6fba70000000000000000000000000200"/173], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_ext_remove_space\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x78}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250}, 0x23) 75.902599ms ago: executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0xfffffdef) 0s ago: executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}], 0x1}, 0x0) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000380)="3e52f92982fb945a1b082af50e1c54b464935b5050c97e110b6416f2f32187fcdf", 0x21}], 0x1}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.155' (ED25519) to the list of known hosts. 2024/06/01 12:50:25 fuzzer started 2024/06/01 12:50:25 dialing manager at 10.128.0.163:30010 [ 20.422742][ T30] audit: type=1400 audit(1717246225.936:66): avc: denied { node_bind } for pid=283 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 20.443152][ T30] audit: type=1400 audit(1717246225.936:67): avc: denied { name_bind } for pid=283 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 20.486295][ T30] audit: type=1400 audit(1717246226.006:68): avc: denied { integrity } for pid=292 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 20.512180][ T292] cgroup: Unknown subsys name 'net' [ 20.516483][ T30] audit: type=1400 audit(1717246226.026:69): avc: denied { mounton } for pid=292 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.539982][ T292] cgroup: Unknown subsys name 'devices' [ 20.544920][ T294] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.546365][ T30] audit: type=1400 audit(1717246226.026:70): avc: denied { mount } for pid=292 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.573412][ T293] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.575883][ T30] audit: type=1400 audit(1717246226.026:71): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.608890][ T30] audit: type=1400 audit(1717246226.026:72): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.631925][ T30] audit: type=1400 audit(1717246226.036:73): avc: denied { unmount } for pid=292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.651496][ T30] audit: type=1400 audit(1717246226.046:74): avc: denied { setattr } for pid=299 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.674414][ T30] audit: type=1400 audit(1717246226.076:75): avc: denied { relabelto } for pid=294 comm="mkswap" name="swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.797159][ T292] cgroup: Unknown subsys name 'hugetlb' [ 20.802612][ T292] cgroup: Unknown subsys name 'rlimit' 2024/06/01 12:50:26 starting 5 executor processes [ 21.427730][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.434758][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.442171][ T307] device bridge_slave_0 entered promiscuous mode [ 21.448966][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.455840][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.462899][ T307] device bridge_slave_1 entered promiscuous mode [ 21.504572][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.511813][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.519024][ T308] device bridge_slave_0 entered promiscuous mode [ 21.534328][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.541210][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.548400][ T309] device bridge_slave_0 entered promiscuous mode [ 21.554771][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.561695][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.568808][ T308] device bridge_slave_1 entered promiscuous mode [ 21.584659][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.591505][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.598675][ T309] device bridge_slave_1 entered promiscuous mode [ 21.671722][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.678605][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.685854][ T311] device bridge_slave_0 entered promiscuous mode [ 21.704337][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.711192][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.718351][ T311] device bridge_slave_1 entered promiscuous mode [ 21.724613][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.731454][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.738640][ T313] device bridge_slave_0 entered promiscuous mode [ 21.745184][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.752095][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.759193][ T313] device bridge_slave_1 entered promiscuous mode [ 21.851526][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.858376][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.865488][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.872246][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.911415][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.918270][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.925355][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.932255][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.944362][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.951213][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.958396][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.965222][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.973537][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.980374][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.987482][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.994251][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.035254][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.042370][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.050092][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.057289][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.064251][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.071332][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.078563][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.085948][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.093116][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.108617][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.116525][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.123243][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.130465][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.138419][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.145230][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.152903][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.160617][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.189311][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.197149][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.204293][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.212253][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.220216][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.227047][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.234150][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.242061][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.248894][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.256053][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.263973][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.270826][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.277943][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.285825][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.292645][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.299858][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.307640][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.327895][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.343335][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.351092][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.359072][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.365912][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.373046][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.381245][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.388089][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.395254][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.418512][ T308] device veth0_vlan entered promiscuous mode [ 22.426141][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.442300][ T308] device veth1_macvtap entered promiscuous mode [ 22.454461][ T307] device veth0_vlan entered promiscuous mode [ 22.461228][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.468730][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.476538][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.484191][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.491950][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.499660][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.507436][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.514560][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.521711][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.529599][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.537644][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.544932][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.552926][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.560836][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.567663][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.574769][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.582815][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.590713][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.597466][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.604581][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.612707][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.620742][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.628495][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.636293][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.643728][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.651004][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.671637][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.679640][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.687773][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.695945][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.706472][ T307] device veth1_macvtap entered promiscuous mode [ 22.717297][ T313] device veth0_vlan entered promiscuous mode [ 22.727491][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.735456][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.743724][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.751195][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.759287][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.767307][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.775030][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.782708][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.790322][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.798158][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.805373][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.816777][ T309] device veth0_vlan entered promiscuous mode [ 22.828860][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.837432][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.849944][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.865756][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.873775][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.895781][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.903649][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.911900][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.925917][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.933148][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.950450][ T313] device veth1_macvtap entered promiscuous mode [ 22.957524][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.966040][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.974170][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.982321][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.991156][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.001913][ T309] device veth1_macvtap entered promiscuous mode [ 23.020304][ T311] device veth0_vlan entered promiscuous mode [ 23.031032][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.045955][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.053818][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.065776][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.073364][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.096308][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.103524][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.162656][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.170698][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.179409][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.188040][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.197615][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.205911][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.221195][ T311] device veth1_macvtap entered promiscuous mode [ 23.225630][ C0] hrtimer: interrupt took 27040 ns [ 23.233103][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.242704][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.251035][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.259528][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.284551][ T339] device pim6reg1 entered promiscuous mode [ 23.293946][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.303257][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.312435][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.320915][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.371421][ T345] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 23.437538][ T347] device pim6reg1 entered promiscuous mode [ 25.965946][ T386] device syzkaller0 entered promiscuous mode [ 27.285338][ T422] device pim6reg1 entered promiscuous mode [ 27.776963][ T432] device syzkaller0 entered promiscuous mode [ 34.136629][ T30] kauditd_printk_skb: 27 callbacks suppressed [ 34.136644][ T30] audit: type=1400 audit(1717246239.656:103): avc: denied { cpu } for pid=550 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 34.347019][ T540] syz-executor.2 (540) used greatest stack depth: 21784 bytes left [ 34.425549][ T30] audit: type=1400 audit(1717246239.756:104): avc: denied { create } for pid=550 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 34.457744][ T30] audit: type=1400 audit(1717246239.786:105): avc: denied { setopt } for pid=550 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 36.406463][ T590] device pim6reg1 entered promiscuous mode [ 36.541497][ T582] syz-executor.2 (582) used greatest stack depth: 21528 bytes left [ 43.501227][ T718] device pim6reg1 entered promiscuous mode [ 47.439044][ T795] device syzkaller0 entered promiscuous mode [ 48.800159][ T801] syz-executor.0 (801) used greatest stack depth: 21424 bytes left [ 49.118177][ T825] device syzkaller0 entered promiscuous mode [ 49.328378][ T832] device pim6reg1 entered promiscuous mode [ 50.092307][ T855] device pim6reg1 entered promiscuous mode [ 54.998238][ T946] device pim6reg1 entered promiscuous mode [ 56.042601][ T960] device syzkaller0 entered promiscuous mode [ 57.488612][ T969] syz-executor.2 (969) used greatest stack depth: 21080 bytes left [ 58.297631][ T1000] device syzkaller0 entered promiscuous mode [ 58.402087][ T1006] device syzkaller0 entered promiscuous mode [ 59.923508][ T1036] device syzkaller0 entered promiscuous mode [ 60.455793][ T1049] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.462829][ T1049] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.644079][ T1049] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.650958][ T1049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.658070][ T1049] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.664820][ T1049] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.815653][ T1049] device bridge0 entered promiscuous mode [ 61.545864][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.689115][ T30] audit: type=1400 audit(1717246267.196:106): avc: denied { write } for pid=1076 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 62.209745][ T30] audit: type=1400 audit(1717246267.726:107): avc: denied { read } for pid=1085 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 63.827209][ T1140] syz-executor.3[1140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.827264][ T1140] syz-executor.3[1140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.865122][ T1129] device syzkaller0 entered promiscuous mode [ 63.972633][ T30] audit: type=1400 audit(1717246269.486:108): avc: denied { read } for pid=1159 comm="syz-executor.2" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 64.172147][ T30] audit: type=1400 audit(1717246269.486:109): avc: denied { open } for pid=1159 comm="syz-executor.2" path="/dev/ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 64.205937][ T30] audit: type=1400 audit(1717246269.486:110): avc: denied { ioctl } for pid=1159 comm="syz-executor.2" path="/dev/ppp" dev="devtmpfs" ino=134 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 65.257832][ T1192] device syzkaller0 entered promiscuous mode [ 65.590734][ T30] audit: type=1400 audit(1717246271.106:111): avc: denied { create } for pid=1209 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 66.740189][ T1238] device syzkaller0 entered promiscuous mode [ 67.335653][ T1260] device syzkaller0 entered promiscuous mode [ 69.322224][ T1327] syz-executor.1[1327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.453896][ T1377] syz-executor.3[1377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.525770][ T1437] syz-executor.2[1437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.875778][ T1455] device pim6reg1 entered promiscuous mode [ 74.848656][ T1490] device pim6reg1 entered promiscuous mode [ 75.258736][ T1507] syz-executor.2[1507] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.258806][ T1507] syz-executor.2[1507] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.672102][ T1530] device syzkaller0 entered promiscuous mode [ 78.103967][ T1577] device syzkaller0 entered promiscuous mode [ 81.534984][ T30] audit: type=1400 audit(1717246287.046:112): avc: denied { write } for pid=1687 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 81.927731][ T1713] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 82.117781][ T30] audit: type=1400 audit(1717246287.636:113): avc: denied { attach_queue } for pid=1728 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 82.163388][ T1733] device syzkaller0 entered promiscuous mode [ 82.229744][ T1750] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 83.451087][ T1785] device syzkaller0 entered promiscuous mode [ 83.615018][ T1796] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 83.695756][ T30] audit: type=1400 audit(1717246289.216:114): avc: denied { write } for pid=1798 comm="syz-executor.3" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 84.617115][ T1827] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 84.874151][ T1830] device syzkaller0 entered promiscuous mode [ 86.618484][ T1870] device syzkaller0 entered promiscuous mode [ 88.158900][ T1908] device veth1_macvtap left promiscuous mode [ 88.305903][ T1908] device veth1_macvtap entered promiscuous mode [ 88.450454][ T1908] device macsec0 entered promiscuous mode [ 93.830335][ T30] audit: type=1400 audit(1717246299.346:115): avc: denied { create } for pid=2017 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 94.742578][ T2043] device syzkaller0 entered promiscuous mode [ 96.877418][ T2082] device syzkaller0 entered promiscuous mode [ 96.973727][ T30] audit: type=1400 audit(1717246302.486:116): avc: denied { create } for pid=2087 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 98.498796][ T2122] device syzkaller0 entered promiscuous mode [ 99.262588][ T2151] syz-executor.0[2151] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.262650][ T2151] syz-executor.0[2151] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.365418][ T2167] device syzkaller0 entered promiscuous mode [ 101.712462][ T30] audit: type=1400 audit(1717246307.226:117): avc: denied { relabelfrom } for pid=2191 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 101.982445][ T30] audit: type=1400 audit(1717246307.246:118): avc: denied { relabelto } for pid=2191 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 109.031094][ T2367] syz-executor.4[2367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.031160][ T2367] syz-executor.4[2367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.295257][ T30] audit: type=1400 audit(1717246318.806:119): avc: denied { create } for pid=2462 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 114.841081][ T2495] device syzkaller0 entered promiscuous mode [ 115.777034][ T2516] device syzkaller0 entered promiscuous mode [ 116.218563][ T2530] device syzkaller0 entered promiscuous mode [ 117.814056][ T2561] device syzkaller0 entered promiscuous mode [ 125.494979][ T2739] syz-executor.3[2739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.495050][ T2739] syz-executor.3[2739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.665726][ T2743] syz-executor.3[2743] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.678170][ T2743] syz-executor.3[2743] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.958696][ T2758] syz-executor.4 (2758) used greatest stack depth: 20760 bytes left [ 126.981323][ T2775] syz-executor.0[2775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.981386][ T2775] syz-executor.0[2775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.996551][ T2775] syz-executor.0[2775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.170935][ T2775] syz-executor.0[2775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.438331][ T2813] device syzkaller0 entered promiscuous mode [ 129.006174][ T2831] device syzkaller0 entered promiscuous mode [ 130.531489][ T2863] syz-executor.2[2863] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.531553][ T2863] syz-executor.2[2863] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.667775][ T2869] syz-executor.2[2869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.715226][ T2865] device syzkaller0 entered promiscuous mode [ 130.985091][ T2869] syz-executor.2[2869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.578421][ T2895] syz-executor.0[2895] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.627983][ T2900] syz-executor.0[2900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.717430][ T2900] syz-executor.0[2900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.771149][ T2899] device syzkaller0 entered promiscuous mode [ 131.867217][ T2895] syz-executor.0[2895] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.437689][ T2928] syz-executor.4[2928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.449272][ T2928] syz-executor.4[2928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.303726][ T2952] device syzkaller0 entered promiscuous mode [ 134.605642][ T2998] device syzkaller0 entered promiscuous mode [ 135.556488][ T3031] bpf_get_probe_write_proto: 10 callbacks suppressed [ 135.556505][ T3031] syz-executor.2[3031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.606558][ T3031] syz-executor.2[3031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.642701][ T3031] syz-executor.2[3031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.673289][ T3031] syz-executor.2[3031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.911393][ T3045] device syzkaller0 entered promiscuous mode [ 136.450373][ T3068] syz-executor.2[3068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.450445][ T3068] syz-executor.2[3068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.647993][ T3068] syz-executor.2[3068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.710605][ T3068] syz-executor.2[3068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.311224][ T3088] device syzkaller0 entered promiscuous mode [ 137.672663][ T3105] syz-executor.1[3105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.672731][ T3105] syz-executor.1[3105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.498856][ T3126] device syzkaller0 entered promiscuous mode [ 139.994989][ T3172] device syzkaller0 entered promiscuous mode [ 141.232074][ T3202] bpf_get_probe_write_proto: 10 callbacks suppressed [ 141.232091][ T3202] syz-executor.2[3202] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.337383][ T3202] syz-executor.2[3202] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.337562][ T3207] syz-executor.2[3207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.366740][ T3207] syz-executor.2[3207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.453461][ T3213] device syzkaller0 entered promiscuous mode [ 142.729644][ T3248] syz-executor.4[3248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.729710][ T3248] syz-executor.4[3248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.917891][ T3252] syz-executor.4[3252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.939114][ T3252] syz-executor.4[3252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.976694][ T3251] device syzkaller0 entered promiscuous mode [ 144.546815][ T3296] device syzkaller0 entered promiscuous mode [ 146.344155][ T3339] device syzkaller0 entered promiscuous mode [ 146.674654][ T3356] syz-executor.2[3356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.674712][ T3356] syz-executor.2[3356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.786112][ T3356] syz-executor.2[3356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.955746][ T3356] syz-executor.2[3356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.701135][ T3375] device syzkaller0 entered promiscuous mode [ 152.430060][ T3469] device syzkaller0 entered promiscuous mode [ 154.046687][ T3504] device syzkaller0 entered promiscuous mode [ 154.627363][ T3531] syz-executor.2[3531] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.627429][ T3531] syz-executor.2[3531] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.799652][ T3531] syz-executor.2[3531] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.045567][ T3531] syz-executor.2[3531] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.263124][ T3630] device syzkaller0 entered promiscuous mode [ 159.778640][ T3661] device syzkaller0 entered promiscuous mode [ 161.816895][ T3700] device syzkaller0 entered promiscuous mode [ 168.214150][ T3837] device syzkaller0 entered promiscuous mode [ 170.251742][ T3881] device syzkaller0 entered promiscuous mode [ 173.267669][ T3951] device syzkaller0 entered promiscuous mode [ 175.986501][ T4024] device syzkaller0 entered promiscuous mode [ 178.744757][ T4082] device syzkaller0 entered promiscuous mode [ 179.753801][ T45] device bridge_slave_1 left promiscuous mode [ 179.764558][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.895443][ T45] device bridge_slave_0 left promiscuous mode [ 179.914613][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.013659][ T45] device veth1_macvtap left promiscuous mode [ 180.125708][ T45] device veth0_vlan left promiscuous mode [ 180.952333][ T4093] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.991911][ T4093] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.013119][ T4093] device bridge_slave_0 entered promiscuous mode [ 181.043570][ T4093] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.095741][ T4093] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.200689][ T4093] device bridge_slave_1 entered promiscuous mode [ 182.528700][ T1494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.544503][ T1494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.680311][ T1494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.831331][ T1494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.881121][ T1494] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.888007][ T1494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.940420][ T1494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.001606][ T1494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.131742][ T1494] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.138625][ T1494] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.262988][ T1494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.292985][ T1494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.308411][ T1494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.318175][ T1494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.330959][ T4093] device veth0_vlan entered promiscuous mode [ 183.351797][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.409313][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 183.467610][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 183.526490][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 183.579050][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.653304][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.667611][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.760753][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 183.892821][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 184.022410][ T4093] device veth1_macvtap entered promiscuous mode [ 184.116910][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 184.136963][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 184.212552][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 184.266746][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 184.317117][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 184.465251][ T4190] device syzkaller0 entered promiscuous mode [ 186.700390][ T4243] device syzkaller0 entered promiscuous mode [ 187.262447][ T4255] device syzkaller0 entered promiscuous mode [ 190.005941][ T4330] device syzkaller0 entered promiscuous mode [ 192.618956][ T4405] device syzkaller0 entered promiscuous mode [ 194.360149][ T4467] device syzkaller0 entered promiscuous mode [ 195.714731][ T4543] syz-executor.4[4543] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.714789][ T4543] syz-executor.4[4543] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.387110][ T4558] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.405574][ T4558] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.506387][ T4558] device bridge_slave_1 left promiscuous mode [ 196.559230][ T4558] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.625244][ T4558] device bridge_slave_0 left promiscuous mode [ 196.766342][ T4558] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.432569][ T4601] bridge0: port 3(macsec0) entered blocking state [ 197.521993][ T4601] bridge0: port 3(macsec0) entered disabled state [ 197.587310][ T4601] device macsec0 entered promiscuous mode [ 197.674776][ T4601] bridge0: port 3(macsec0) entered blocking state [ 197.681071][ T4601] bridge0: port 3(macsec0) entered forwarding state [ 197.940201][ T4605] device veth1_macvtap left promiscuous mode [ 197.990027][ T4605] bridge0: port 3(macsec0) entered disabled state [ 198.292051][ T4640] device veth0_vlan left promiscuous mode [ 198.315714][ T4640] device veth0_vlan entered promiscuous mode [ 198.472679][ T4665] bridge0: port 3(macsec0) entered blocking state [ 198.523324][ T4665] bridge0: port 3(macsec0) entered disabled state [ 198.599239][ T4665] device macsec0 entered promiscuous mode [ 198.662353][ T4665] bridge0: port 3(macsec0) entered blocking state [ 198.668639][ T4665] bridge0: port 3(macsec0) entered forwarding state [ 198.741756][ T4671] device veth1_macvtap left promiscuous mode [ 198.824805][ T4671] bridge0: port 3(macsec0) entered disabled state [ 198.935331][ T4665] device veth1_macvtap entered promiscuous mode [ 199.071032][ T4665] bridge0: port 3(macsec0) entered blocking state [ 199.077310][ T4665] bridge0: port 3(macsec0) entered forwarding state [ 199.367711][ T4698] device veth0_vlan left promiscuous mode [ 199.401985][ T4698] device veth0_vlan entered promiscuous mode [ 200.917897][ T30] audit: type=1400 audit(1717246406.436:120): avc: denied { create } for pid=4789 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 205.557200][ T5012] syz-executor.1[5012] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.557264][ T5012] syz-executor.1[5012] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.566732][ T5008] syz-executor.1[5008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.652427][ T5015] syz-executor.0[5015] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.716641][ T5013] syz-executor.4[5013] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.818707][ T5011] syz-executor.0[5011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.833665][ T5014] syz-executor.4[5014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.837624][ T5013] syz-executor.4[5013] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.845215][ T5008] syz-executor.1[5008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.985573][ T5014] syz-executor.4[5014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.542865][ T5106] device syzkaller0 entered promiscuous mode [ 211.030975][ T5183] device syzkaller0 entered promiscuous mode [ 211.442496][ T30] audit: type=1400 audit(1717246416.956:121): avc: denied { create } for pid=5198 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 212.498221][ T5236] device sit0 entered promiscuous mode [ 213.676070][ T5283] device sit0 entered promiscuous mode [ 214.834651][ T5310] EXT4-fs warning (device sda1): __ext4_ioctl:881: Setting inode version is not supported with metadata_csum enabled. [ 215.242331][ T5326] device sit0 left promiscuous mode [ 215.384854][ T5329] device sit0 entered promiscuous mode [ 217.426097][ T30] audit: type=1400 audit(1717246422.946:122): avc: denied { create } for pid=5406 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 217.588816][ T5404] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.606574][ T5404] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.618419][ T5404] device bridge_slave_0 entered promiscuous mode [ 217.633757][ T5404] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.647174][ T5404] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.667019][ T5404] device bridge_slave_1 entered promiscuous mode [ 217.687202][ T5443] bpf_get_probe_write_proto: 16 callbacks suppressed [ 217.687215][ T5443] syz-executor.2[5443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.734636][ T5442] syz-executor.2[5442] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.781694][ T5443] syz-executor.2[5443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.887633][ T10] bridge0: port 3(macsec0) entered disabled state [ 217.943100][ T10] device bridge_slave_1 left promiscuous mode [ 217.966829][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.993879][ T10] device bridge_slave_0 left promiscuous mode [ 218.016184][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.043836][ T10] device veth1_macvtap left promiscuous mode [ 218.081720][ T10] device veth0_vlan left promiscuous mode [ 218.547814][ T5404] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.554676][ T5404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.561814][ T5404] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.568586][ T5404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.846924][ T1487] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.886946][ T1487] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.972258][ T4371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.981829][ T4371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.007096][ T4371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.019114][ T4371] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.032538][ T4371] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.039421][ T4371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.050617][ T4371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.060474][ T4371] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.069307][ T4371] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.076192][ T4371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.086248][ T4371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.094226][ T4371] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.102301][ T4371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.110381][ T4371] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.159631][ T5478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 219.179316][ T5478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.194404][ T5404] device veth0_vlan entered promiscuous mode [ 219.206518][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.214517][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.233753][ T5404] device veth1_macvtap entered promiscuous mode [ 219.275586][ T5479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.283156][ T5479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.291673][ T5479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 219.299996][ T5479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.308582][ T5479] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 219.383487][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.422302][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 219.526165][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 219.588582][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 221.276762][ T5570] syz-executor.0[5570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.276828][ T5570] syz-executor.0[5570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.412553][ T5599] device syzkaller0 entered promiscuous mode [ 223.738821][ T5635] device syzkaller0 entered promiscuous mode [ 224.948165][ T5679] device syzkaller0 entered promiscuous mode [ 226.316821][ T5724] device syzkaller0 entered promiscuous mode [ 226.339652][ T5733] syz-executor.4[5733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.339720][ T5733] syz-executor.4[5733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.706670][ T30] audit: type=1400 audit(1717246432.226:123): avc: denied { create } for pid=5743 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 227.067621][ T30] audit: type=1400 audit(1717246432.486:124): avc: denied { read } for pid=82 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 227.270060][ T5754] device pim6reg1 entered promiscuous mode [ 227.313282][ T30] audit: type=1400 audit(1717246432.826:125): avc: denied { create } for pid=5755 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 228.466903][ T5801] syz-executor.4[5801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.467515][ T5801] syz-executor.4[5801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.272543][ T5864] syz-executor.3[5864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.307188][ T5864] syz-executor.3[5864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.735375][ T5887] device veth1_macvtap left promiscuous mode [ 231.178226][ T5935] device syzkaller0 entered promiscuous mode [ 231.333697][ T5937] device syzkaller0 entered promiscuous mode [ 231.504618][ T5948] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.511594][ T5948] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.518993][ T5948] device bridge0 left promiscuous mode [ 231.527348][ T5948] device bridge_slave_1 left promiscuous mode [ 231.533432][ T5948] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.541082][ T5948] device bridge_slave_0 left promiscuous mode [ 231.547632][ T5948] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.758529][ T5959] device veth1_macvtap left promiscuous mode [ 231.991776][ T5988] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.998813][ T5988] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.030834][ T5988] device bridge_slave_1 left promiscuous mode [ 232.038452][ T5988] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.052947][ T5988] device bridge_slave_0 left promiscuous mode [ 232.078467][ T5988] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.268100][ T6004] device vlan0 entered promiscuous mode [ 232.711613][ T6032] device veth1_macvtap left promiscuous mode [ 232.897225][ T6041] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.904226][ T6041] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.128715][ T30] audit: type=1400 audit(1717246438.646:126): avc: denied { remove_name } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 233.177923][ T6050] device syzkaller0 entered promiscuous mode [ 233.232296][ T30] audit: type=1400 audit(1717246438.646:127): avc: denied { rename } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 237.768769][ T6191] syz-executor.2[6191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.768836][ T6191] syz-executor.2[6191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.833880][ T6200] syz-executor.0[6200] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.899393][ T6200] syz-executor.0[6200] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.721086][ T6250] device pim6reg1 entered promiscuous mode [ 238.793090][ T6264] device wg2 entered promiscuous mode [ 240.433616][ T6337] device pim6reg1 entered promiscuous mode [ 240.526415][ T6365] device sit0 entered promiscuous mode [ 240.638423][ T6373] ------------[ cut here ]------------ [ 240.643706][ T6373] trace type BPF program uses run-time allocation [ 240.665900][ T6373] WARNING: CPU: 0 PID: 6373 at kernel/bpf/verifier.c:11655 check_map_prog_compatibility+0x6f1/0x890 [ 240.679136][ T6373] Modules linked in: [ 240.682918][ T6373] CPU: 0 PID: 6373 Comm: syz-executor.4 Not tainted 5.15.149-syzkaller-00055-g424f92bcbe8f #0 [ 240.693253][ T6373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 240.703489][ T6373] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890 [ 240.726152][ T6373] Code: db e9 f9 fc ff ff e8 0e 3a ed ff 31 db e9 ed fc ff ff e8 02 3a ed ff c6 05 0d 7e 80 05 01 48 c7 c7 40 c0 67 85 e8 3f 7b be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff [ 240.806316][ T6373] RSP: 0018:ffffc900012bf348 EFLAGS: 00010246 [ 240.849592][ T6373] RAX: 4ace193d51cd0400 RBX: 0000000000000001 RCX: 0000000000040000 [ 240.881362][ T6373] RDX: ffffc90002124000 RSI: 0000000000000971 RDI: 0000000000000972 [ 240.965944][ T6373] RBP: ffffc900012bf390 R08: ffffffff81576125 R09: ffffed103ee065e8 [ 240.992291][ T6373] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 241.023670][ T6373] R13: ffff88810a748000 R14: ffffc900000c9000 R15: dffffc0000000000 [ 241.036107][ T6373] FS: 00007f196ae7b6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 241.108116][ T6373] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 241.179313][ T6373] CR2: fffffffffffffffd CR3: 0000000127356000 CR4: 00000000003506a0 [ 241.205702][ T6373] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 241.228576][ T6373] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 241.238390][ T6373] Call Trace: [ 241.270310][ T6373] [ 241.288834][ T6373] ? show_regs+0x58/0x60 [ 241.299577][ T6373] ? __warn+0x160/0x2f0 [ 241.310131][ T6373] ? check_map_prog_compatibility+0x6f1/0x890 [ 241.326118][ T6373] ? report_bug+0x3d9/0x5b0 [ 241.338267][ T6373] ? check_map_prog_compatibility+0x6f1/0x890 [ 241.357247][ T6373] ? handle_bug+0x41/0x70 [ 241.368171][ T6373] ? exc_invalid_op+0x1b/0x50 [ 241.380418][ T6399] device pim6reg1 entered promiscuous mode [ 241.386480][ T6373] ? asm_exc_invalid_op+0x1b/0x20 [ 241.391427][ T6373] ? __wake_up_klogd+0xd5/0x110 [ 241.409542][ T6373] ? check_map_prog_compatibility+0x6f1/0x890 [ 241.438369][ T6373] ? check_map_prog_compatibility+0x6f1/0x890 [ 241.450924][ T6373] resolve_pseudo_ldimm64+0x671/0x1240 [ 241.460612][ T6373] ? check_attach_btf_id+0xef0/0xef0 [ 241.472969][ T6373] ? __mark_reg_known+0x1b0/0x1b0 [ 241.485565][ T6373] ? security_capable+0x87/0xb0 [ 241.501203][ T6373] bpf_check+0x3174/0x12bf0 [ 241.505717][ T6373] ? is_bpf_text_address+0x172/0x190 [ 241.510925][ T6373] ? stack_trace_save+0x1c0/0x1c0 [ 241.515826][ T6373] ? __kernel_text_address+0x9b/0x110 [ 241.521101][ T6373] ? unwind_get_return_address+0x4d/0x90 [ 241.526611][ T6373] ? bpf_get_btf_vmlinux+0x60/0x60 [ 241.538491][ T6410] device sit0 entered promiscuous mode [ 241.549497][ T6373] ? arch_stack_walk+0xf3/0x140 [ 241.554230][ T6373] ? stack_trace_save+0x113/0x1c0 [ 241.567194][ T6373] ? stack_trace_snprint+0xf0/0xf0 [ 241.577337][ T6373] ? stack_trace_snprint+0xf0/0xf0 [ 241.582369][ T6373] ? __stack_depot_save+0x34/0x470 [ 241.599349][ T6414] syz-executor.0[6414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.599401][ T6414] syz-executor.0[6414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.613482][ T6373] ? ____kasan_kmalloc+0xed/0x110 [ 241.632340][ T6373] ? ____kasan_kmalloc+0xdb/0x110 [ 241.637704][ T6373] ? __kasan_kmalloc+0x9/0x10 [ 241.642293][ T6373] ? kmem_cache_alloc_trace+0x115/0x210 [ 241.648008][ T6373] ? selinux_bpf_prog_alloc+0x51/0x140 [ 241.653360][ T6373] ? security_bpf_prog_alloc+0x62/0x90 [ 241.658894][ T6373] ? bpf_prog_load+0x9ee/0x1b50 [ 241.663621][ T6373] ? __sys_bpf+0x4bc/0x760 [ 241.671605][ T6373] ? __x64_sys_bpf+0x7c/0x90 [ 241.688129][ T6373] ? do_syscall_64+0x3d/0xb0 [ 241.697014][ T6373] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 241.712756][ T6373] ? __kasan_kmalloc+0x9/0x10 [ 241.722636][ T6373] ? memset+0x35/0x40 [ 241.726667][ T6373] ? bpf_obj_name_cpy+0x196/0x1e0 [ 241.733640][ T6408] device pim6reg1 entered promiscuous mode [ 241.757422][ T6373] bpf_prog_load+0x12ac/0x1b50 [ 241.762980][ T6373] ? map_freeze+0x370/0x370 [ 241.767641][ T6373] ? selinux_bpf+0xcb/0x100 [ 241.777285][ T6373] ? security_bpf+0x82/0xb0 [ 241.781824][ T6373] __sys_bpf+0x4bc/0x760 [ 241.791387][ T6373] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 241.801402][ T6373] ? __kasan_check_read+0x11/0x20 [ 241.817083][ T6373] __x64_sys_bpf+0x7c/0x90 [ 241.821418][ T6373] do_syscall_64+0x3d/0xb0 [ 241.825697][ T6373] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 241.831466][ T6373] RIP: 0033:0x7f196c106ee9 [ 241.835754][ T6373] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 241.855833][ T6373] RSP: 002b:00007f196ae7b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 241.871343][ T6373] RAX: ffffffffffffffda RBX: 00007f196c23dfa0 RCX: 00007f196c106ee9 [ 241.880150][ T6373] RDX: 0000000000000036 RSI: 0000000020000440 RDI: 0000000000000005 [ 241.896002][ T6373] RBP: 00007f196c15347f R08: 0000000000000000 R09: 0000000000000000 [ 241.911498][ T6373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 241.922172][ T6373] R13: 000000000000000b R14: 00007f196c23dfa0 R15: 00007ffcdded3598 [ 241.949682][ T6373] [ 241.952921][ T6373] ---[ end trace 7aa88d63fb108696 ]--- [ 242.144767][ T6440] device pim6reg1 entered promiscuous mode [ 242.236860][ T6452] device sit0 left promiscuous mode [ 242.265151][ T6452] device sit0 entered promiscuous mode [ 242.435178][ T6468] device sit0 left promiscuous mode [ 242.582943][ T6474] device pim6reg1 entered promiscuous mode [ 243.287510][ T6535] geneve1: tun_chr_ioctl cmd 10 [ 243.990478][ T6546] device pim6reg1 entered promiscuous mode [ 245.499491][ T6635] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 248.116346][ T30] audit: type=1400 audit(1717246453.636:128): avc: denied { create } for pid=6765 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 249.193029][ T6829] device macsec0 left promiscuous mode [ 249.207232][ T6829] bridge0: port 3(macsec0) entered disabled state [ 249.243293][ T6829] device bridge_slave_1 left promiscuous mode [ 249.266795][ T6829] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.285721][ T6829] device bridge_slave_0 left promiscuous mode [ 249.292988][ T6829] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.291589][ T30] audit: type=1400 audit(1717246455.806:129): avc: denied { create } for pid=6884 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 251.401202][ T6945] device syzkaller0 entered promiscuous mode [ 251.419792][ T6962] device wg2 entered promiscuous mode [ 252.853354][ T7009] device syzkaller0 entered promiscuous mode [ 254.068863][ T7057] device syzkaller0 entered promiscuous mode [ 258.263564][ T7324] device wg2 left promiscuous mode [ 259.346775][ T7382] device wg2 left promiscuous mode [ 262.027099][ T7513] syz-executor.0[7513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.027200][ T7513] syz-executor.0[7513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.992287][ T7542] syz-executor.1[7542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.055581][ T7542] syz-executor.1[7542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.875775][ T7580] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.901453][ T7580] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.926320][ T7580] device bridge_slave_0 entered promiscuous mode [ 263.941723][ T7580] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.948951][ T7580] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.956268][ T7580] device bridge_slave_1 entered promiscuous mode [ 264.089768][ T814] device veth1_macvtap left promiscuous mode [ 264.099500][ T814] device veth0_vlan left promiscuous mode [ 264.758017][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 264.765279][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 264.865774][ T6687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 264.873886][ T6687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 264.967107][ T6687] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.973984][ T6687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.111589][ T6687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 265.187657][ T6687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.268844][ T6687] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.275728][ T6687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.340941][ T6687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 265.405012][ T6687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 265.473724][ T6687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 265.542003][ T6687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 265.644836][ T6692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 265.661939][ T6692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 265.726588][ T6692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 265.750255][ T6692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 265.760300][ T6692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 265.769176][ T7580] device veth0_vlan entered promiscuous mode [ 265.797900][ T5483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 265.805967][ T5483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 265.821476][ T7580] device veth1_macvtap entered promiscuous mode [ 265.830710][ T6689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 265.839201][ T6689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 265.847358][ T6689] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 265.884702][ T5483] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 265.896365][ T5483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 265.907307][ T5483] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 265.927569][ T5483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 265.944592][ T30] audit: type=1400 audit(1717246471.456:130): avc: denied { mounton } for pid=7580 comm="syz-executor.2" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 266.984958][ T30] audit: type=1400 audit(1717246472.496:131): avc: denied { create } for pid=7725 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 268.681220][ T7827] device pim6reg1 entered promiscuous mode [ 270.336302][ T7893] device syzkaller0 entered promiscuous mode [ 271.322905][ T7923] device wg2 entered promiscuous mode [ 271.448551][ T7928] device wg2 entered promiscuous mode [ 273.623523][ T8033] device bridge_slave_0 entered promiscuous mode [ 274.138816][ T8062] device bridge_slave_0 entered promiscuous mode [ 274.351155][ T30] audit: type=1400 audit(1717246479.866:132): avc: denied { create } for pid=8066 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 277.986139][ T8232] device syzkaller0 entered promiscuous mode [ 280.651527][ T8323] device syzkaller0 entered promiscuous mode [ 281.547981][ T8359] device wg2 left promiscuous mode [ 288.014699][ T8612] device wg2 entered promiscuous mode [ 288.723602][ T8642] device wg2 left promiscuous mode [ 288.792029][ T8642] device wg2 entered promiscuous mode [ 289.504729][ T8678] device wg2 left promiscuous mode [ 289.617557][ T8678] device wg2 entered promiscuous mode [ 290.655808][ T30] audit: type=1400 audit(1717246496.166:133): avc: denied { ioctl } for pid=8721 comm="syz-executor.4" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 292.560374][ T8793] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.679883][ T8793] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.754692][ T8793] device bridge_slave_0 entered promiscuous mode [ 292.848681][ T8793] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.939209][ T8793] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.993153][ T8793] device bridge_slave_1 entered promiscuous mode [ 293.183388][ T45] device veth0_vlan left promiscuous mode [ 294.394683][ T7313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 294.402932][ T7313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.429385][ T951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 294.438859][ T951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.482083][ T951] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.489045][ T951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.538286][ T30] audit: type=1400 audit(1717246500.056:134): avc: denied { create } for pid=8861 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 294.604475][ T951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 294.672072][ T951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 294.732310][ T951] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.739191][ T951] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.836767][ T951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 294.886930][ T951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 294.928364][ T8793] device veth0_vlan entered promiscuous mode [ 294.940693][ T8793] device veth1_macvtap entered promiscuous mode [ 294.963614][ T7313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 294.987704][ T7313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 295.020686][ T7313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 295.028538][ T7313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 295.035896][ T7313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 295.043224][ T7313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 295.051665][ T7313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 295.063098][ T7313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 295.071539][ T7313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 295.324693][ T8897] device syzkaller0 entered promiscuous mode [ 298.575973][ C1] softirq: huh, entered softirq 3 NET_RX ffffffff83e8c880 with preempt_count 00000103, exited with 00000102? [ 298.587417][ T8793] BUG: scheduling while atomic: syz-executor.1/8793/0x00000002 [ 298.594850][ T8793] Modules linked in: [ 298.598483][ T8793] Preemption disabled at: [ 298.598491][ T8793] [] is_module_text_address+0x1a/0x140 [ 298.609518][ T8793] CPU: 1 PID: 8793 Comm: syz-executor.1 Tainted: G W 5.15.149-syzkaller-00055-g424f92bcbe8f #0 [ 298.620938][ T8793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 298.630833][ T8793] Call Trace: [ 298.633956][ T8793] [ 298.636733][ T8793] dump_stack_lvl+0x151/0x1b7 [ 298.641246][ T8793] ? is_module_text_address+0x1a/0x140 [ 298.646539][ T8793] ? is_module_text_address+0x1a/0x140 [ 298.651832][ T8793] ? io_uring_drop_tctx_refs+0x190/0x190 [ 298.657306][ T8793] ? is_module_text_address+0x1a/0x140 [ 298.662595][ T8793] dump_stack+0x15/0x17 [ 298.666590][ T8793] __schedule_bug+0x195/0x260 [ 298.671103][ T8793] ? vfs_submount+0xb0/0xb0 [ 298.675442][ T8793] ? ttwu_queue_wakelist+0x510/0x510 [ 298.680563][ T8793] __schedule+0xd19/0x1590 [ 298.684814][ T8793] ? __sched_text_start+0x8/0x8 [ 298.689500][ T8793] ? user_path_at_empty+0x14e/0x1a0 [ 298.694535][ T8793] schedule+0x11f/0x1e0 [ 298.698529][ T8793] exit_to_user_mode_loop+0x4d/0xe0 [ 298.703562][ T8793] exit_to_user_mode_prepare+0x5a/0xa0 [ 298.708855][ T8793] syscall_exit_to_user_mode+0x26/0x160 [ 298.714237][ T8793] do_syscall_64+0x49/0xb0 [ 298.718488][ T8793] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 298.724129][ T8793] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 298.729858][ T8793] RIP: 0033:0x7f2997166217 [ 298.734113][ T8793] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8 [ 298.753553][ T8793] RSP: 002b:00007ffc5c77fc88 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 298.761806][ T8793] RAX: ffffffffffffffea RBX: 0000000000000000 RCX: 00007f2997166217 2024/06/01 12:55:04 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 298.769609][ T8793] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffc5c77fd40 [ 298.777421][ T8793] RBP: 00007ffc5c77fd40 R08: 0000000000000000 R09: 0000000000000000 [ 298.785232][ T8793] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffc5c780e00 [ 298.793052][ T8793] R13: 00007f29971b0336 R14: 0000000000048e0f R15: 0000000000000008 [ 298.800860][ T8793]