last executing test programs: 1.366694988s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001480)={&(0x7f0000000040)='ext4_da_release_space\x00', r1}, 0x10) write$cgroup_int(r0, &(0x7f0000000240), 0x12) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 1.29282605s ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00'}) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.220135611s ago: executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff000, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) 958.423991ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 946.437153ms ago: executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="18080000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000000000085000000a5000000850000000800000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) sendmsg$unix(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 909.498569ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x45}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001540)={{r5}, &(0x7f00000014c0), &(0x7f0000001500)=r4}, 0x20) 869.739265ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r0, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r1, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f00000004c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) close(r5) 798.744976ms ago: executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)=""/183, 0xb7}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='ext4_sync_file_exit\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r5, &(0x7f0000000980), 0x12) 790.433718ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000200000000000000000818110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fb"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x70) 715.899749ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000050018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 674.863446ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x1fffffffffffffef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='mm_page_alloc\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940), 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200001400f400b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x2d) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0), &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x0, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f00000004c0), 0x8, 0xc3, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000200000000000000000000040000000300000000010000060400000000219ae30000000000000000000036abf3ec4e74f804073cd633f7370f7639e83539f027b7f50a1d1f6fb34e7e4754727d319a53874ef074542f1842df41655ffbcdf0b111268b66624c6b769c1ec355bf05fbb182f4efc8e5759dbf7339f74438cfedd933510dbff811d3d41225932e74aa13e229dd7aa9d93f821cf7a722e20f63b71082ae20f0d92123a150ab0420e1ac73d57919096639f839d12e8513556b02f70e"], 0xffffffffffffffff, 0x3e, 0x0, 0x2}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) 466.017538ms ago: executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="18080000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000000000085000000a5000000850000000800000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) sendmsg$unix(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 433.260863ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x45}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001540)={{r5}, &(0x7f00000014c0), &(0x7f0000001500)=r4}, 0x20) 426.660054ms ago: executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={@map=0x1, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 392.786629ms ago: executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x25]}}, &(0x7f0000000400)=""/251, 0x31, 0xfb, 0x1}, 0x20) 380.826861ms ago: executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000060000000000000000000000850000009e00000095"], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_da_write_pages_extent\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000380)='ext4_da_write_pages_extent\x00', r1}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r4, &(0x7f0000000980), 0x12) 370.462243ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r1}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 344.819327ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8421, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xe, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 318.240051ms ago: executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x20, 0x80000000, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x2, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0xd8, 0x4, 0x1, 0x0, r0}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r1, &(0x7f0000000300), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001b00)={r1, &(0x7f0000001a40), 0x0}, 0x3f) 246.553302ms ago: executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000100060000000077f2ab26850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='kfree\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x15, 0x2, &(0x7f0000000100)=@raw=[@ldst={0x1, 0x3, 0x3, 0x0, 0x1}, @jmp={0x5, 0x0, 0x9}], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x28}, 0x80) 227.787505ms ago: executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="18080000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000000000085000000a5000000850000000800000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) sendmsg$unix(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 200.747959ms ago: executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000000040)={0x0, 0x0}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000072000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 158.066376ms ago: executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)=ANY=[], 0x58}, 0x0) sendmsg$inet(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r2, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x0) close(r1) 73.447028ms ago: executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) close(r0) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) 70.570029ms ago: executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x25]}}, &(0x7f0000000400)=""/251, 0x31, 0xfb, 0x1}, 0x20) 58.561031ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x45}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001540)={{r5}, &(0x7f00000014c0), &(0x7f0000001500)=r4}, 0x20) 43.888864ms ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 9.587929ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r1}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 7.746989ms ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x940e, 0x1, 0x4}, 0x48) 0s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000340)='ext4_remove_blocks\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.stat\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.135' (ED25519) to the list of known hosts. 2024/06/15 14:14:17 fuzzer started 2024/06/15 14:14:17 dialing manager at 10.128.0.163:30010 [ 21.579276][ T30] audit: type=1400 audit(1718460857.700:66): avc: denied { node_bind } for pid=283 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 21.600687][ T30] audit: type=1400 audit(1718460857.700:67): avc: denied { name_bind } for pid=283 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 21.640130][ T30] audit: type=1400 audit(1718460857.760:68): avc: denied { setattr } for pid=293 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.650131][ T292] cgroup: Unknown subsys name 'net' [ 21.667797][ T30] audit: type=1400 audit(1718460857.770:69): avc: denied { integrity } for pid=292 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 21.690694][ T292] cgroup: Unknown subsys name 'devices' [ 21.695278][ T30] audit: type=1400 audit(1718460857.770:70): avc: denied { mounton } for pid=292 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.721445][ T30] audit: type=1400 audit(1718460857.770:71): avc: denied { mount } for pid=292 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.725978][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.744117][ T30] audit: type=1400 audit(1718460857.800:72): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.776593][ T30] audit: type=1400 audit(1718460857.800:73): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.795066][ T295] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.799689][ T30] audit: type=1400 audit(1718460857.800:74): avc: denied { unmount } for pid=292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.827699][ T30] audit: type=1400 audit(1718460857.880:75): avc: denied { relabelto } for pid=299 comm="mkswap" name="swap-file" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.892291][ T292] cgroup: Unknown subsys name 'hugetlb' [ 21.897742][ T292] cgroup: Unknown subsys name 'rlimit' 2024/06/15 14:14:18 starting 5 executor processes [ 22.315031][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.321931][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.329019][ T313] device bridge_slave_0 entered promiscuous mode [ 22.337017][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.344219][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.351361][ T313] device bridge_slave_1 entered promiscuous mode [ 22.400519][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.407375][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.414729][ T312] device bridge_slave_0 entered promiscuous mode [ 22.421283][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.428135][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.435455][ T311] device bridge_slave_0 entered promiscuous mode [ 22.451009][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.457975][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.465225][ T312] device bridge_slave_1 entered promiscuous mode [ 22.471585][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.478423][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.485779][ T311] device bridge_slave_1 entered promiscuous mode [ 22.531139][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.537993][ T314] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.545284][ T314] device bridge_slave_0 entered promiscuous mode [ 22.560803][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.567643][ T314] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.575032][ T314] device bridge_slave_1 entered promiscuous mode [ 22.646676][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.654142][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.661368][ T308] device bridge_slave_0 entered promiscuous mode [ 22.678227][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.685720][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.693165][ T308] device bridge_slave_1 entered promiscuous mode [ 22.743621][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.750721][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.757913][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.764728][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.803978][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.810853][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.817927][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.824757][ T314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.850836][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.858046][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.865881][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.873401][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.881213][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.888421][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.895943][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.904065][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.912016][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.918948][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.926613][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.940541][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.948060][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.956244][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.963211][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.970434][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.978439][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.985414][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.003254][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.011461][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.019346][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.026173][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.060171][ T312] device veth0_vlan entered promiscuous mode [ 23.069265][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.077401][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.085736][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.093872][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.101199][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.108516][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.116333][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.124330][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.132238][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.140348][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.147183][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.154417][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.162342][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.169159][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.194143][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.202202][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.209910][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.229252][ T312] device veth1_macvtap entered promiscuous mode [ 23.238869][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.248139][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.256556][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.270196][ T313] device veth0_vlan entered promiscuous mode [ 23.284684][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.292775][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.300776][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.311205][ T314] device veth0_vlan entered promiscuous mode [ 23.321618][ T314] device veth1_macvtap entered promiscuous mode [ 23.337289][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.345018][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.352741][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.360096][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.368247][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.375546][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.383999][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.392329][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.400701][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.407537][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.414804][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.422861][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.430053][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.437656][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.455934][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.465407][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.473641][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.483301][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.491846][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.499707][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.507601][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.515726][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.523585][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.531687][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.547973][ T313] device veth1_macvtap entered promiscuous mode [ 23.560574][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.568595][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.576323][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.595575][ T308] device veth0_vlan entered promiscuous mode [ 23.609015][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.618053][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.627095][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.635724][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.644209][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.653664][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.662746][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.671051][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.679005][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.687895][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.696737][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.704065][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.711704][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.720643][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.728722][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.735592][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.749522][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.756938][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.764609][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.786767][ T308] device veth1_macvtap entered promiscuous mode [ 23.806288][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.821183][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.829423][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.872821][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.882100][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.892584][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.908693][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.921172][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.929534][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.938075][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.947075][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.955580][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.964234][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.999144][ T344] device syzkaller0 entered promiscuous mode [ 24.009151][ T311] device veth0_vlan entered promiscuous mode [ 24.029517][ T26] syzkaller0: tun_net_xmit 48 [ 24.037290][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.045515][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.055567][ T339] syzkaller0: create flow: hash 2144133229 index 0 [ 24.063010][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.070236][ C0] hrtimer: interrupt took 26786 ns [ 24.070993][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.088977][ T311] device veth1_macvtap entered promiscuous mode [ 24.185543][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.207390][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.221003][ T339] syzkaller0 (unregistered): delete flow: hash 2144133229 index 0 [ 24.282112][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.334219][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.394316][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.449966][ T355] syz-executor.1[355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.450030][ T355] syz-executor.1[355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.468819][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.556122][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.939138][ T364] device pim6reg1 entered promiscuous mode [ 25.243921][ T385] device syzkaller0 entered promiscuous mode [ 25.463882][ T406] device sit0 entered promiscuous mode [ 25.521415][ T404] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.770044][ T430] syz-executor.3[430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.770657][ T430] syz-executor.3[430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.793272][ T423] device syzkaller0 entered promiscuous mode [ 26.240496][ T440] syzkaller0: create flow: hash 2144133229 index 0 [ 26.352514][ T436] device syzkaller0 entered promiscuous mode [ 26.417818][ T333] syzkaller0: tun_net_xmit 48 [ 26.546074][ T443] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.780671][ T436] syzkaller0 (unregistered): delete flow: hash 2144133229 index 0 [ 27.295822][ T468] device syzkaller0 entered promiscuous mode [ 27.664112][ T480] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.696671][ T482] syz-executor.3[482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.696777][ T482] syz-executor.3[482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.035005][ T487] syzkaller0: create flow: hash 2144133229 index 0 [ 28.234095][ T485] device syzkaller0 entered promiscuous mode [ 28.537792][ T498] device pim6reg1 entered promiscuous mode [ 28.570533][ T490] syzkaller0 (unregistered): delete flow: hash 2144133229 index 0 [ 29.425200][ T535] device syzkaller0 entered promiscuous mode [ 29.465479][ T536] syzkaller0: create flow: hash 2144133229 index 0 [ 29.489711][ T39] syzkaller0: tun_net_xmit 48 [ 29.598062][ T539] syz-executor.4[539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.598129][ T539] syz-executor.4[539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.671232][ T535] syzkaller0 (unregistered): delete flow: hash 2144133229 index 0 [ 29.763662][ T545] device pim6reg1 entered promiscuous mode [ 29.903151][ T553] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.475489][ T575] syzkaller0: create flow: hash 2144133229 index 0 [ 30.477739][ T574] device syzkaller0 entered promiscuous mode [ 30.623297][ T39] syzkaller0: tun_net_xmit 48 [ 30.639871][ T578] device pim6reg1 entered promiscuous mode [ 30.930452][ T574] syzkaller0 (unregistered): delete flow: hash 2144133229 index 0 [ 31.235491][ T607] syz-executor.4[607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.235559][ T607] syz-executor.4[607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.341798][ T610] device pim6reg1 entered promiscuous mode [ 31.610413][ T620] syzkaller0: create flow: hash 2144133229 index 0 [ 31.634704][ T617] device syzkaller0 entered promiscuous mode [ 31.705741][ T39] syzkaller0: tun_net_xmit 48 [ 31.840311][ T621] syzkaller0 (unregistered): delete flow: hash 2144133229 index 0 [ 32.129782][ T627] device sit0 entered promiscuous mode [ 32.617874][ T645] device syzkaller0 entered promiscuous mode [ 32.624752][ T315] syzkaller0: tun_net_xmit 48 [ 32.656231][ T645] syzkaller0: create flow: hash 2144133229 index 0 [ 32.725462][ T645] syzkaller0 (unregistered): delete flow: hash 2144133229 index 0 [ 32.728128][ T657] syz-executor.3[657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.743083][ T657] syz-executor.3[657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.796503][ T661] device sit0 left promiscuous mode [ 32.966516][ T665] device sit0 entered promiscuous mode [ 33.934312][ T690] device sit0 left promiscuous mode [ 34.062173][ T688] device syzkaller0 entered promiscuous mode [ 34.103214][ T697] device sit0 entered promiscuous mode [ 34.203539][ T704] syz-executor.2[704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.203601][ T704] syz-executor.2[704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.215533][ T688] syzkaller0: create flow: hash 2144133229 index 0 [ 34.446495][ T20] syzkaller0: tun_net_xmit 48 [ 34.630549][ T696] syzkaller0 (unregistered): delete flow: hash 2144133229 index 0 [ 35.205701][ T736] device sit0 entered promiscuous mode [ 35.877183][ T758] syz-executor.0[758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.885457][ T758] syz-executor.0[758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.219905][ T769] device sit0 entered promiscuous mode [ 37.206281][ T816] device sit0 left promiscuous mode [ 37.340923][ T818] device sit0 entered promiscuous mode [ 37.791393][ T830] syz-executor.3[830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.791460][ T830] syz-executor.3[830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.524045][ T864] device sit0 left promiscuous mode [ 38.654382][ T865] device sit0 entered promiscuous mode [ 39.262061][ T903] device sit0 left promiscuous mode [ 39.452763][ T907] device sit0 entered promiscuous mode [ 40.190866][ T948] device sit0 left promiscuous mode [ 40.349079][ T955] device sit0 entered promiscuous mode [ 41.158073][ T1001] device sit0 entered promiscuous mode [ 41.892869][ T1053] device sit0 left promiscuous mode [ 41.990965][ T1053] device sit0 entered promiscuous mode [ 42.440261][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 42.440276][ T30] audit: type=1400 audit(1718460878.560:111): avc: denied { read } for pid=1083 comm="syz-executor.1" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 42.495432][ T30] audit: type=1400 audit(1718460878.560:112): avc: denied { open } for pid=1083 comm="syz-executor.1" path="/dev/ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 42.519799][ T30] audit: type=1400 audit(1718460878.560:113): avc: denied { ioctl } for pid=1083 comm="syz-executor.1" path="/dev/ppp" dev="devtmpfs" ino=134 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 42.587882][ T1095] device veth1_macvtap left promiscuous mode [ 42.605111][ T1095] device veth1_macvtap entered promiscuous mode [ 42.612626][ T1095] device macsec0 entered promiscuous mode [ 42.620019][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 42.752252][ T1119] device sit0 left promiscuous mode [ 42.855595][ T1122] device sit0 entered promiscuous mode [ 43.231187][ T1133] device veth1_macvtap left promiscuous mode [ 43.237018][ T1133] device macsec0 left promiscuous mode [ 43.322189][ T1133] device veth1_macvtap entered promiscuous mode [ 43.368793][ T1133] device macsec0 entered promiscuous mode [ 43.572338][ T1163] device sit0 left promiscuous mode [ 43.657028][ T1163] device sit0 entered promiscuous mode [ 43.854420][ T1180] device veth1_macvtap left promiscuous mode [ 43.897144][ T1184] device veth1_macvtap entered promiscuous mode [ 43.903367][ T1184] device macsec0 entered promiscuous mode [ 44.154794][ T1216] device sit0 left promiscuous mode [ 44.167687][ T1212] device veth1_macvtap left promiscuous mode [ 44.184214][ T1219] device veth1_macvtap entered promiscuous mode [ 44.221195][ T1219] device macsec0 entered promiscuous mode [ 44.247202][ T1216] device sit0 entered promiscuous mode [ 44.455975][ T30] audit: type=1400 audit(1718460880.580:114): avc: denied { create } for pid=1235 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 44.482012][ T30] audit: type=1400 audit(1718460880.600:115): avc: denied { cpu } for pid=1235 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 44.583383][ T1258] device veth1_macvtap left promiscuous mode [ 44.616129][ T1258] device veth1_macvtap entered promiscuous mode [ 44.623763][ T1258] device macsec0 entered promiscuous mode [ 44.648539][ T1263] device sit0 left promiscuous mode [ 44.713948][ T1263] device sit0 entered promiscuous mode [ 45.103982][ T1292] device veth1_macvtap left promiscuous mode [ 45.156933][ T1292] device macsec0 left promiscuous mode [ 45.181825][ T1299] device veth1_macvtap entered promiscuous mode [ 45.241828][ T1299] device macsec0 entered promiscuous mode [ 45.389832][ T1314] device sit0 left promiscuous mode [ 45.534436][ T1314] device sit0 entered promiscuous mode [ 46.009285][ T1371] device sit0 left promiscuous mode [ 46.061665][ T1372] device sit0 entered promiscuous mode [ 46.615600][ T1405] device sit0 left promiscuous mode [ 46.718567][ T1408] device sit0 entered promiscuous mode [ 47.489182][ T1450] device sit0 left promiscuous mode [ 47.641011][ T1450] device sit0 entered promiscuous mode [ 51.218473][ T312] syz-executor.1 (312) used greatest stack depth: 20912 bytes left [ 51.432285][ T1579] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.520433][ T1579] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.527703][ T1579] device bridge_slave_0 entered promiscuous mode [ 51.778329][ T1579] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.884887][ T1579] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.034712][ T1579] device bridge_slave_1 entered promiscuous mode [ 53.037287][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.065038][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.145734][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.231470][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.300336][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.307324][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.360468][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.385414][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.394973][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.401853][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.421023][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.436150][ T8] device bridge_slave_1 left promiscuous mode [ 53.442515][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.455575][ T8] device bridge_slave_0 left promiscuous mode [ 53.461909][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.469842][ T8] device veth1_macvtap left promiscuous mode [ 53.522488][ T1652] ------------[ cut here ]------------ [ 53.529496][ T1652] trace type BPF program uses run-time allocation [ 53.536638][ T1652] WARNING: CPU: 0 PID: 1652 at kernel/bpf/verifier.c:11656 check_map_prog_compatibility+0x6f1/0x890 [ 53.547657][ T1652] Modules linked in: [ 53.559504][ T1652] CPU: 0 PID: 1652 Comm: syz-executor.4 Not tainted 5.15.149-syzkaller-00165-g85445b5a2107 #0 [ 53.570594][ T1652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 53.580909][ T1652] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890 [ 53.587437][ T1652] Code: db e9 f9 fc ff ff e8 fe 39 ed ff 31 db e9 ed fc ff ff e8 f2 39 ed ff c6 05 7d 7e 80 05 01 48 c7 c7 00 bf 67 85 e8 0f 7b be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff [ 53.608326][ T1652] RSP: 0018:ffffc90000b87348 EFLAGS: 00010246 [ 53.615281][ T1652] RAX: fd90c5fc97c73d00 RBX: 0000000000000001 RCX: 0000000000040000 [ 53.625068][ T1652] RDX: ffffc90000f1b000 RSI: 0000000000000920 RDI: 0000000000000921 [ 53.674345][ T1652] RBP: ffffc90000b87390 R08: ffffffff81576225 R09: ffffed103ee065e8 [ 53.682823][ T1652] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 53.691361][ T1652] R13: ffff8881061e0800 R14: ffffc900000f9000 R15: dffffc0000000000 [ 53.704396][ T1652] FS: 00007f7de11266c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 53.758417][ T1652] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.768701][ T1652] CR2: 0000000020043000 CR3: 000000012e295000 CR4: 00000000003506b0 [ 53.890400][ T1652] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 53.941361][ T1652] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 54.050543][ T1652] Call Trace: [ 54.053767][ T1652] [ 54.056504][ T1652] ? show_regs+0x58/0x60 [ 54.106054][ T1652] ? __warn+0x160/0x2f0 [ 54.130432][ T1652] ? check_map_prog_compatibility+0x6f1/0x890 [ 54.155148][ T1652] ? report_bug+0x3d9/0x5b0 [ 54.197235][ T1652] ? check_map_prog_compatibility+0x6f1/0x890 [ 54.252691][ T1652] ? handle_bug+0x41/0x70 [ 54.297147][ T1652] ? exc_invalid_op+0x1b/0x50 [ 54.332432][ T1652] ? asm_exc_invalid_op+0x1b/0x20 [ 54.337663][ T1652] ? __wake_up_klogd+0xd5/0x110 [ 54.342674][ T1652] ? check_map_prog_compatibility+0x6f1/0x890 [ 54.348677][ T1652] ? check_map_prog_compatibility+0x6f1/0x890 [ 54.355996][ T1652] resolve_pseudo_ldimm64+0x671/0x1240 [ 54.372421][ T1652] ? check_attach_btf_id+0xef0/0xef0 [ 54.377641][ T1652] ? __mark_reg_known+0x1b0/0x1b0 [ 54.389418][ T1652] ? security_capable+0x87/0xb0 [ 54.450740][ T1652] bpf_check+0x3174/0x12bf0 [ 54.480609][ T1652] ? is_bpf_text_address+0x172/0x190 [ 54.516064][ T1652] ? stack_trace_save+0x1c0/0x1c0 [ 54.555371][ T1652] ? __kernel_text_address+0x9b/0x110 [ 54.610739][ T1652] ? unwind_get_return_address+0x4d/0x90 [ 54.635230][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 54.640304][ T1652] ? bpf_get_btf_vmlinux+0x60/0x60 [ 54.648110][ T1652] ? arch_stack_walk+0xf3/0x140 [ 54.661359][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.690417][ T1652] ? stack_trace_save+0x113/0x1c0 [ 54.720281][ T1652] ? stack_trace_snprint+0xf0/0xf0 [ 54.730283][ T1652] ? stack_trace_snprint+0xf0/0xf0 [ 54.730767][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 54.735226][ T1652] ? __stack_depot_save+0x34/0x470 [ 54.759049][ T1652] ? ____kasan_kmalloc+0xed/0x110 [ 54.764106][ T1652] ? ____kasan_kmalloc+0xdb/0x110 [ 54.769066][ T1652] ? __kasan_kmalloc+0x9/0x10 [ 54.773531][ T1652] ? kmem_cache_alloc_trace+0x115/0x210 [ 54.792243][ T1652] ? selinux_bpf_prog_alloc+0x51/0x140 [ 54.797552][ T1652] ? security_bpf_prog_alloc+0x62/0x90 [ 54.807560][ T1652] ? bpf_prog_load+0x9ee/0x1b50 [ 54.824961][ T1652] ? __sys_bpf+0x4bc/0x760 [ 54.830695][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.838291][ T1652] ? __x64_sys_bpf+0x7c/0x90 [ 54.845367][ T1652] ? do_syscall_64+0x3d/0xb0 [ 54.849977][ T1652] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 54.858019][ T1652] ? __kasan_kmalloc+0x9/0x10 [ 54.862808][ T1652] ? memset+0x35/0x40 [ 54.866649][ T1652] ? bpf_obj_name_cpy+0x196/0x1e0 [ 54.871798][ T1652] bpf_prog_load+0x12ac/0x1b50 [ 54.876486][ T1652] ? map_freeze+0x370/0x370 [ 54.876637][ T1579] device veth0_vlan entered promiscuous mode [ 54.881829][ T1652] ? selinux_bpf+0xcb/0x100 [ 54.891125][ T1652] ? security_bpf+0x82/0xb0 [ 54.895497][ T1652] __sys_bpf+0x4bc/0x760 [ 54.899569][ T1652] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 54.905403][ T1652] ? __kasan_check_read+0x11/0x20 [ 54.910541][ T1652] __x64_sys_bpf+0x7c/0x90 [ 54.914918][ T1652] do_syscall_64+0x3d/0xb0 [ 54.919233][ T1652] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 54.929439][ T1652] RIP: 0033:0x7f7de1dabea9 [ 54.933992][ T1652] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 54.984563][ T1652] RSP: 002b:00007f7de11260c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 55.004938][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 55.030595][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 55.038297][ T1652] RAX: ffffffffffffffda RBX: 00007f7de1ee2f80 RCX: 00007f7de1dabea9 [ 55.038864][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 55.062511][ T1652] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 55.130501][ T1652] RBP: 00007f7de1e1aff4 R08: 0000000000000000 R09: 0000000000000000 [ 55.206256][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 55.215380][ T1652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 55.255130][ T1652] R13: 000000000000000b R14: 00007f7de1ee2f80 R15: 00007ffde1c67078 [ 55.284964][ T1652] [ 55.288757][ T1652] ---[ end trace 8b3ba32213bec619 ]--- [ 55.300391][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 55.308099][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.319658][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 55.328182][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 55.351932][ T1579] device veth1_macvtap entered promiscuous mode [ 55.436707][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 55.451709][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 55.495353][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 55.556668][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 55.613690][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 57.461113][ T30] audit: type=1400 audit(1718460893.590:116): avc: denied { create } for pid=1773 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 68.944121][ T30] audit: type=1400 audit(1718460905.070:117): avc: denied { create } for pid=2250 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 70.137563][ T2330] syz-executor.1[2330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.137625][ T2330] syz-executor.1[2330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.434903][ T2346] tap0: tun_chr_ioctl cmd 1074025677 [ 70.465892][ T2346] tap0: linktype set to 768 [ 70.662573][ T2363] syz-executor.2[2363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.662640][ T2363] syz-executor.2[2363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.964845][ T2382] tap0: tun_chr_ioctl cmd 1074025677 [ 71.085544][ T2382] tap0: linktype set to 768 [ 71.287007][ T2403] syz-executor.4[2403] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.288182][ T2403] syz-executor.4[2403] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.693877][ T30] audit: type=1400 audit(1718460907.820:118): avc: denied { write } for pid=2438 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 72.274047][ T2491] syz-executor.3[2491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.274087][ T2491] syz-executor.3[2491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.280739][ T311] syz-executor.4 (311) used greatest stack depth: 20880 bytes left [ 72.473444][ T2499] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.485472][ T2499] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.506360][ T2499] device bridge_slave_0 entered promiscuous mode [ 72.529081][ T2499] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.539854][ T2499] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.547807][ T2499] device bridge_slave_1 entered promiscuous mode [ 72.696069][ T2499] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.702969][ T2499] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.710038][ T2499] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.716862][ T2499] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.813380][ T2538] syz-executor.1[2538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.813444][ T2538] syz-executor.1[2538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.832401][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.890981][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.898690][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.906091][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.947403][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.955815][ T956] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.962707][ T956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.982274][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.990541][ T956] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.997407][ T956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.005162][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 73.013600][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 73.083854][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 73.122050][ T2499] device veth0_vlan entered promiscuous mode [ 73.131942][ T8] device bridge_slave_1 left promiscuous mode [ 73.157894][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.180998][ T2561] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 73.192399][ T8] device bridge_slave_0 left promiscuous mode [ 73.198598][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.206333][ T8] device veth1_macvtap left promiscuous mode [ 73.626778][ T2589] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 73.701134][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.720414][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.786568][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.852857][ T2499] device veth1_macvtap entered promiscuous mode [ 73.898143][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 73.918337][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 73.983426][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 74.057449][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 74.077990][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 74.177676][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 74.259019][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 75.708560][ T30] audit: type=1400 audit(1718460911.830:119): avc: denied { ioctl } for pid=2691 comm="syz-executor.0" path="socket:[22037]" dev="sockfs" ino=22037 ioctlcmd=0x8929 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 76.848734][ T2760] device pim6reg1 entered promiscuous mode [ 77.774349][ T2815] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 8192 (only 8 groups) [ 77.834746][ T2813] device syzkaller0 entered promiscuous mode [ 78.037792][ T2834] geneve1: tun_chr_ioctl cmd 1074025684 [ 78.316741][ T2853] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 78.782977][ T2898] device veth1_macvtap left promiscuous mode [ 78.797000][ T2898] device macsec0 left promiscuous mode [ 78.861121][ T2904] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 78.875602][ T2898] device veth1_macvtap entered promiscuous mode [ 78.882548][ T2898] device macsec0 entered promiscuous mode [ 78.933713][ T2911] geneve1: tun_chr_ioctl cmd 1074025684 [ 78.952123][ T2917] syz-executor.2[2917] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.952191][ T2917] syz-executor.2[2917] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.002495][ T2924] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 79.163885][ T2932] device syzkaller0 entered promiscuous mode [ 79.176771][ T2941] device veth1_macvtap left promiscuous mode [ 79.199753][ T2943] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 79.233003][ T2941] device veth1_macvtap entered promiscuous mode [ 79.239179][ T2941] device macsec0 entered promiscuous mode [ 79.697813][ T2972] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 80.058960][ T2981] syz-executor.4[2981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.059030][ T2981] syz-executor.4[2981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.078901][ T2979] device syzkaller0 entered promiscuous mode [ 80.115078][ T2981] : renamed from veth0_vlan [ 81.933784][ T3041] device syzkaller0 entered promiscuous mode [ 81.954849][ T3055] syz-executor.2[3055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.954917][ T3055] syz-executor.2[3055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.088717][ T3055] syz-executor.2[3055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.234538][ T3055] syz-executor.2[3055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.923204][ T313] syz-executor.0 (313) used greatest stack depth: 19488 bytes left [ 82.978401][ T3088] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.016135][ T3088] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.031657][ T3088] device bridge_slave_0 entered promiscuous mode [ 83.048350][ T3088] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.057947][ T3088] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.065521][ T3088] device bridge_slave_1 entered promiscuous mode [ 83.256569][ T3088] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.263491][ T3088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.270588][ T3088] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.277430][ T3088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.431316][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.439685][ T30] audit: type=1400 audit(1718460919.550:120): avc: denied { write } for pid=3137 comm="syz-executor.2" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 83.440460][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.503757][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.538575][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.553318][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.560239][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.588737][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.598753][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.627092][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 83.648884][ T3088] device veth0_vlan entered promiscuous mode [ 83.661231][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 83.670178][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.697102][ T3088] device veth1_macvtap entered promiscuous mode [ 83.747133][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.756798][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 83.786131][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 83.805949][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 83.821440][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 83.866066][ T8] device bridge_slave_1 left promiscuous mode [ 83.875278][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.897088][ T8] device bridge_slave_0 left promiscuous mode [ 83.925737][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.935781][ T3159] syz-executor.4[3159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.935846][ T3159] syz-executor.4[3159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.956293][ T8] device veth1_macvtap left promiscuous mode [ 84.003032][ T3159] syz-executor.4[3159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.003093][ T3159] syz-executor.4[3159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.124826][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 84.201281][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 84.210529][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 84.218697][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 84.607611][ T3195] syz-executor.3[3195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.607679][ T3195] syz-executor.3[3195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.691287][ T3195] syz-executor.3[3195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.816942][ T3195] syz-executor.3[3195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.865325][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.996999][ T3306] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.117121][ T3306] device bridge_slave_0 entered promiscuous mode [ 87.219523][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.307422][ T3306] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.369587][ T3306] device bridge_slave_1 entered promiscuous mode [ 87.874726][ T8] device bridge_slave_1 left promiscuous mode [ 87.904406][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.911926][ T8] device bridge_slave_0 left promiscuous mode [ 87.917923][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.926506][ T8] device veth1_macvtap left promiscuous mode [ 88.617955][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.631978][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.682769][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.727648][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.790071][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.796990][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.836471][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.855249][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.870127][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.877056][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.893544][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 88.912364][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 88.928958][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 88.946182][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 88.962957][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.030750][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 89.081918][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 89.133159][ T3306] device veth0_vlan entered promiscuous mode [ 89.144844][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 89.194516][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 89.265523][ T3306] device veth1_macvtap entered promiscuous mode [ 89.318296][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 89.333632][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 89.396592][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 89.454222][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 89.504002][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 89.602901][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 89.630801][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 89.710459][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 89.718729][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 91.918982][ T3544] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.949890][ T3544] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.957464][ T3544] device bridge_slave_0 entered promiscuous mode [ 91.971640][ T3544] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.978576][ T3544] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.999215][ T3544] device bridge_slave_1 entered promiscuous mode [ 92.124180][ T45] device bridge_slave_1 left promiscuous mode [ 92.137184][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.183022][ T45] device bridge_slave_0 left promiscuous mode [ 92.189006][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.215390][ T45] device veth1_macvtap left promiscuous mode [ 92.697861][ T3544] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.704936][ T3544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.712027][ T3544] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.718966][ T3544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.745086][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.763537][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.884814][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.910997][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 93.000536][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 93.017436][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 93.056519][ T1815] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.063429][ T1815] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.113135][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 93.123506][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 93.137962][ T1815] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.144866][ T1815] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.152585][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.160604][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.168635][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.176930][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.203203][ T3544] device veth0_vlan entered promiscuous mode [ 93.239103][ T30] audit: type=1400 audit(1718460929.360:121): avc: denied { create } for pid=3631 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 93.296828][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 93.315118][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 93.357681][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 93.406561][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.497789][ T3544] device veth1_macvtap entered promiscuous mode [ 93.537426][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.553452][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 93.579795][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 93.615493][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 93.649869][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 93.682134][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 93.693654][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 93.711279][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 93.719408][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 95.170015][ T3764] device syzkaller0 entered promiscuous mode [ 95.636015][ T3783] syz-executor.3[3783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.636079][ T3783] syz-executor.3[3783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.037780][ T3807] syz-executor.3[3807] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.063052][ T3807] syz-executor.3[3807] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.674430][ T3947] syz-executor.4[3947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.790696][ T3947] syz-executor.4[3947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.726975][ T3999] device vxcan1 entered promiscuous mode [ 100.062460][ T4007] syz-executor.2[4007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.062526][ T4007] syz-executor.2[4007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.720143][ T4042] syz-executor.0[4042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.779062][ T4042] syz-executor.0[4042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.924912][ T4077] syz-executor.4[4077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.947015][ T4077] syz-executor.4[4077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.353759][ T4095] device syzkaller0 entered promiscuous mode [ 105.181117][ T4241] device syzkaller0 entered promiscuous mode [ 106.220792][ T4278] device syzkaller0 entered promiscuous mode [ 107.081258][ T4336] device pim6reg1 entered promiscuous mode [ 107.450365][ T4376] device pim6reg1 entered promiscuous mode [ 107.712176][ T4408] device pim6reg1 entered promiscuous mode [ 110.530356][ T4534] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.543694][ T4534] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.560627][ T4534] device bridge_slave_0 entered promiscuous mode [ 110.570078][ T4534] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.577435][ T4534] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.584901][ T4534] device bridge_slave_1 entered promiscuous mode [ 110.619645][ T4552] device sit0 entered promiscuous mode [ 110.840810][ T4534] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.847698][ T4534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.854799][ T4534] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.861579][ T4534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.921605][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.938748][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.016558][ T8] device bridge_slave_1 left promiscuous mode [ 111.022591][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.030029][ T8] device bridge_slave_0 left promiscuous mode [ 111.036411][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.044660][ T8] device veth1_macvtap left promiscuous mode [ 111.196589][ T4581] device syzkaller0 entered promiscuous mode [ 111.279413][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.287771][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.303576][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.315625][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.326755][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.333638][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.341196][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.349404][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.357773][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.364639][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.392165][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 111.406575][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.415208][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 111.433344][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 111.449790][ T4534] device veth0_vlan entered promiscuous mode [ 111.481118][ T1663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 111.506145][ T1663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 111.517524][ T1663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 111.527093][ T1663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.545479][ T4534] device veth1_macvtap entered promiscuous mode [ 111.612206][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 111.624925][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 111.656123][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 111.668912][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 111.677961][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 111.685882][ T4590] device sit0 left promiscuous mode [ 111.720459][ T4597] device sit0 entered promiscuous mode [ 111.758994][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 111.774552][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 111.784062][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 111.792625][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 111.864260][ T4609] device syzkaller0 entered promiscuous mode [ 112.570907][ T4622] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.644454][ T4622] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.655523][ T4622] device bridge_slave_0 entered promiscuous mode [ 112.670047][ T4642] device sit0 entered promiscuous mode [ 112.684649][ T4622] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.691989][ T4622] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.699336][ T4622] device bridge_slave_1 entered promiscuous mode [ 112.768072][ T45] device bridge_slave_1 left promiscuous mode [ 112.784426][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.796012][ T45] device bridge_slave_0 left promiscuous mode [ 112.812276][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.822301][ T45] device veth1_macvtap left promiscuous mode [ 112.832538][ T45] device veth0_vlan left promiscuous mode [ 112.988712][ T4671] device sit0 entered promiscuous mode [ 113.073940][ T4622] device veth0_vlan entered promiscuous mode [ 113.088664][ T4622] device veth1_macvtap entered promiscuous mode [ 113.105904][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 113.114728][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.146126][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.255876][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.264353][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.271216][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.278641][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.287258][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.295435][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.302419][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.310302][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 113.318685][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 113.327060][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 113.335307][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.400472][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 113.408703][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 113.566126][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 113.610674][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.618550][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 113.688764][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 113.771113][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 113.778638][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 113.841728][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 113.866630][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 113.875285][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.900645][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 113.908183][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.915868][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.091402][ T4690] device veth0_vlan left promiscuous mode [ 114.120130][ T4690] device veth0_vlan entered promiscuous mode [ 114.188431][ T4699] device syzkaller0 entered promiscuous mode [ 114.596935][ T4706] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.646058][ T4706] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.722563][ T4706] device bridge_slave_0 entered promiscuous mode [ 114.788160][ T4706] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.866820][ T4706] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.929337][ T4706] device bridge_slave_1 entered promiscuous mode [ 115.198633][ T45] device bridge_slave_1 left promiscuous mode [ 115.206018][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.213802][ T30] audit: type=1400 audit(1718460951.340:122): avc: denied { remove_name } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 115.285340][ T45] device bridge_slave_0 left promiscuous mode [ 115.339098][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.369730][ T30] audit: type=1400 audit(1718460951.340:123): avc: denied { rename } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 115.430416][ T45] device veth1_macvtap left promiscuous mode [ 115.436264][ T45] device veth0_vlan left promiscuous mode [ 115.931335][ T4741] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.008324][ T4741] O3ãc¤±: renamed from bridge_slave_0 [ 116.035269][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 116.043074][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 116.060903][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 116.069387][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 116.077537][ T1815] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.084404][ T1815] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.126828][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 116.181762][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 116.192910][ T1815] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.199803][ T1815] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.208073][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 116.216350][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 116.236474][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 116.256053][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 116.269254][ T4706] device veth0_vlan entered promiscuous mode [ 116.294052][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 116.302342][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 116.316677][ T4706] device veth1_macvtap entered promiscuous mode [ 116.325710][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 116.338218][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 116.435089][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 116.491690][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 116.557120][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 116.618307][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 116.638067][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 116.682958][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 116.692260][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 117.454351][ T4775] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.509131][ T4775] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.550657][ T4775] device bridge_slave_0 entered promiscuous mode [ 117.589610][ T4775] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.719450][ T4775] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.801940][ T4775] device bridge_slave_1 entered promiscuous mode [ 118.014330][ T4775] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.021224][ T4775] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.028315][ T4775] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.035116][ T4775] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.048892][ T30] audit: type=1400 audit(1718460954.170:124): avc: denied { create } for pid=4793 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 118.175888][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 118.184572][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.193073][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.241102][ T1375] device bridge_slave_1 left promiscuous mode [ 118.247426][ T1375] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.305587][ T1375] device bridge_slave_0 left promiscuous mode [ 118.332269][ T1375] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.352082][ T1375] device veth1_macvtap left promiscuous mode [ 118.357942][ T1375] device veth0_vlan left promiscuous mode [ 118.406982][ T30] audit: type=1400 audit(1718460954.530:125): avc: denied { create } for pid=4816 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 118.533513][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 118.541730][ T1815] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.548590][ T1815] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.556284][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 118.564963][ T1815] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.572037][ T1815] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.579684][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 118.587639][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 118.615061][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 118.624778][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 118.637417][ T4775] device veth0_vlan entered promiscuous mode [ 120.040192][ C0] sched: RT throttling activated [ 120.060534][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 120.068285][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.053844][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 121.061423][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 121.076529][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 121.115056][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 121.142463][ T4775] device veth1_macvtap entered promiscuous mode [ 121.168929][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 121.207694][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 121.219255][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 121.253089][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 128.775825][ T5033] device syzkaller0 entered promiscuous mode [ 129.586914][ T5062] device syzkaller0 entered promiscuous mode [ 131.793758][ T45] device bridge_slave_1 left promiscuous mode [ 131.799731][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.884257][ T45] device bridge_slave_0 left promiscuous mode [ 131.923469][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.955189][ T45] device veth1_macvtap left promiscuous mode [ 131.961113][ T45] device veth0_vlan left promiscuous mode [ 132.315711][ T5134] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.330442][ T5134] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.338660][ T5134] device bridge_slave_0 entered promiscuous mode [ 132.377585][ T5134] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.398692][ T5134] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.406573][ T5134] device bridge_slave_1 entered promiscuous mode [ 134.374491][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.389579][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.397824][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.417258][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.425633][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.432517][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.468153][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.523416][ T5226] device vxcan1 entered promiscuous mode [ 134.556834][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.568431][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.591539][ T1181] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.598426][ T1181] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.643193][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 134.654517][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.676491][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 134.685115][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.730322][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 134.746490][ T5134] device veth0_vlan entered promiscuous mode [ 134.812976][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.832330][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.892277][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.953117][ T5134] device veth1_macvtap entered promiscuous mode [ 135.024433][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 135.070796][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 135.177440][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.196418][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.204755][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 135.598546][ T5276] device pim6reg1 entered promiscuous mode [ 135.653249][ T5274] device syzkaller0 entered promiscuous mode [ 136.090447][ T5309] device pim6reg1 entered promiscuous mode [ 136.829949][ T5350] device pim6reg1 entered promiscuous mode [ 136.965899][ T5361] device veth1_macvtap left promiscuous mode [ 137.318150][ T5379] device pim6reg1 entered promiscuous mode [ 137.470977][ T5381] device syzkaller0 entered promiscuous mode [ 138.105797][ T5411] device pim6reg1 entered promiscuous mode [ 138.377084][ T5419] device syzkaller0 entered promiscuous mode [ 138.926909][ T5450] device vxcan1 entered promiscuous mode [ 138.940594][ T30] audit: type=1400 audit(1718460975.070:126): avc: denied { read } for pid=82 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 140.029174][ T30] audit: type=1400 audit(1718460976.150:127): avc: denied { create } for pid=5567 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 140.092201][ T5562] device syzkaller0 entered promiscuous mode [ 140.165703][ T5574] device syzkaller0 entered promiscuous mode [ 140.589915][ T5604] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 141.378812][ T5652] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 141.941715][ T5675] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 141.992083][ T30] audit: type=1400 audit(1718460978.120:128): avc: denied { read } for pid=5687 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 142.049724][ T30] audit: type=1400 audit(1718460978.170:129): avc: denied { write } for pid=5687 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 142.142753][ T30] audit: type=1400 audit(1718460978.270:130): avc: denied { setopt } for pid=5704 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 142.689142][ T5745] device veth1_macvtap left promiscuous mode [ 142.855326][ T5751] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 144.063433][ T5806] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 144.131523][ T5804] device syzkaller0 entered promiscuous mode [ 144.931215][ T5842] device syzkaller0 entered promiscuous mode [ 145.706832][ T5876] device syzkaller0 entered promiscuous mode [ 145.931318][ T5895] syz-executor.2[5895] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.931390][ T5895] syz-executor.2[5895] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.787730][ T6041] device veth1_macvtap left promiscuous mode [ 149.872933][ T6045] device syzkaller0 entered promiscuous mode [ 152.235453][ T6132] device syzkaller0 entered promiscuous mode [ 152.710913][ T6173] device wg2 entered promiscuous mode [ 152.918698][ T6189] device syzkaller0 entered promiscuous mode [ 153.216245][ T6201] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.252519][ T6201] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.301019][ T6201] device bridge_slave_0 entered promiscuous mode [ 153.318634][ T6201] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.325546][ T6201] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.340635][ T6201] device bridge_slave_1 entered promiscuous mode [ 153.449386][ T6217] device wg2 entered promiscuous mode [ 153.671458][ T8] device bridge_slave_1 left promiscuous mode [ 153.677447][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.738923][ T8] device bridge_slave_0 left promiscuous mode [ 153.814181][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.904482][ T8] device veth1_macvtap left promiscuous mode [ 153.980420][ T8] device veth0_vlan left promiscuous mode [ 154.589898][ T6245] device syzkaller0 entered promiscuous mode [ 154.720434][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.727981][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.747993][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.776678][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.784919][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.791962][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.809673][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 154.830064][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.838325][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.845187][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.891106][ T6201] device veth0_vlan entered promiscuous mode [ 154.904813][ T6201] device veth1_macvtap entered promiscuous mode [ 154.933639][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 154.957001][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 155.000465][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.008329][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 155.016283][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.024151][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 155.032329][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 155.040510][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 155.048309][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.078500][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 155.086965][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 155.095470][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 155.103107][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 155.111354][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 155.119741][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 155.128064][ T1181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 155.189340][ T30] audit: type=1400 audit(1718460991.310:131): avc: denied { mounton } for pid=6201 comm="syz-executor.2" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 155.228725][ T6272] device wg2 entered promiscuous mode [ 155.272363][ T1663] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.279870][ T1663] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.373812][ T30] audit: type=1400 audit(1718460991.500:132): avc: denied { create } for pid=6278 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 155.520389][ T6289] syz-executor.3[6289] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.520458][ T6289] syz-executor.3[6289] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.599363][ T6291] device lo entered promiscuous mode [ 155.869672][ T6312] syz-executor.0[6312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.869739][ T6312] syz-executor.0[6312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.991789][ T6312] syz-executor.0[6312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.004315][ T6320] syz-executor.2[6320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.148251][ T6312] syz-executor.0[6312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.212231][ T6320] syz-executor.2[6320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.726485][ T6346] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 157.508823][ T6385] device lo entered promiscuous mode [ 163.412144][ T6602] device lo entered promiscuous mode [ 163.775893][ T6621] device wg2 entered promiscuous mode [ 163.805827][ T30] audit: type=1400 audit(1718460999.930:133): avc: denied { attach_queue } for pid=6626 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 163.841039][ T6631] device pim6reg1 entered promiscuous mode [ 164.205574][ T6661] device sit0 entered promiscuous mode [ 164.344018][ T6667] device pim6reg1 entered promiscuous mode [ 164.380720][ T6669] device wg2 left promiscuous mode [ 164.392500][ T6669] device wg2 entered promiscuous mode [ 164.628933][ T6697] device syzkaller0 entered promiscuous mode [ 164.661066][ T6695] device sit0 entered promiscuous mode [ 165.238704][ T6743] device pim6reg1 entered promiscuous mode [ 166.083545][ T6777] device pim6reg1 entered promiscuous mode [ 169.147310][ T6792] syz-executor.0[6792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.147381][ T6792] syz-executor.0[6792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.273181][ T6815] device sit0 left promiscuous mode [ 169.328128][ T6815] device sit0 entered promiscuous mode [ 169.899692][ T6868] device pim6reg1 entered promiscuous mode [ 170.114610][ T6898] device sit0 left promiscuous mode [ 170.148369][ T6900] device syzkaller0 entered promiscuous mode [ 170.193276][ T6898] device sit0 entered promiscuous mode [ 170.972628][ T6932] device syzkaller0 entered promiscuous mode [ 172.768737][ T7015] device syzkaller0 entered promiscuous mode [ 172.987010][ T7034] device syzkaller0 entered promiscuous mode [ 173.876442][ T7076] syz-executor.1[7076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.876515][ T7076] syz-executor.1[7076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.435371][ T7100] device syzkaller0 entered promiscuous mode [ 174.441874][ T7104] syz-executor.1[7104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.530599][ T7104] syz-executor.1[7104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.026326][ T7143] syz-executor.4[7143] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.038073][ T7143] syz-executor.4[7143] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.122221][ T7139] device syzkaller0 entered promiscuous mode [ 176.125372][ T7188] device syzkaller0 entered promiscuous mode [ 178.906226][ T7383] device pim6reg1 entered promiscuous mode [ 180.223796][ T7438] device pim6reg1 entered promiscuous mode [ 181.082606][ T7495] device pim6reg1 entered promiscuous mode [ 182.916432][ T7593] device pim6reg1 entered promiscuous mode [ 183.693326][ T7632] device pim6reg1 entered promiscuous mode [ 184.433905][ T7665] device pim6reg1 entered promiscuous mode [ 185.356695][ T7711] device pim6reg1 entered promiscuous mode [ 185.869500][ T7745] device pim6reg1 entered promiscuous mode [ 187.655148][ T7808] device syzkaller0 entered promiscuous mode [ 188.552112][ T7845] device syzkaller0 entered promiscuous mode [ 189.608797][ T7884] device syzkaller0 entered promiscuous mode [ 190.562772][ T7923] device syzkaller0 entered promiscuous mode [ 192.188172][ T7943] device pim6reg1 entered promiscuous mode [ 193.077228][ T7983] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.152467][ T7983] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.172168][ T7983] device bridge_slave_0 entered promiscuous mode [ 193.201853][ T7983] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.216595][ T7983] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.240767][ T7983] device bridge_slave_1 entered promiscuous mode [ 193.389652][ T7983] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.396546][ T7983] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.404369][ T7983] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.412265][ T7983] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.431762][ T8] device bridge_slave_1 left promiscuous mode [ 193.438471][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.448541][ T8] device O3ãc¤± left promiscuous mode [ 193.455216][ T8] bridge0: port 1(O3ãc¤±) entered disabled state [ 193.466734][ T8] device veth0_vlan left promiscuous mode [ 193.592489][ T8010] device syzkaller0 entered promiscuous mode [ 193.623712][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.631598][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.639515][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.647531][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.662118][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.674638][ T315] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.682897][ T315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.690580][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.698540][ T315] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.705666][ T315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.721194][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.728936][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.738979][ T1813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 193.750567][ T7983] device veth0_vlan entered promiscuous mode [ 193.760337][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 193.768215][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 193.776062][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 193.784607][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 193.797932][ T7983] device veth1_macvtap entered promiscuous mode [ 193.808398][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 193.823867][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 194.745212][ T8126] sock: sock_timestamping_bind_phc: sock not bind to device [ 195.131632][ T8157] sock: sock_timestamping_bind_phc: sock not bind to device [ 195.497717][ T8185] sock: sock_timestamping_bind_phc: sock not bind to device [ 196.858409][ T8262] sock: sock_timestamping_bind_phc: sock not bind to device [ 197.494221][ T8274] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.509208][ T8274] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.516768][ T8274] device bridge_slave_0 entered promiscuous mode [ 197.523773][ T8274] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.531269][ T8274] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.545180][ T8274] device bridge_slave_1 entered promiscuous mode [ 197.627351][ T8274] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.634242][ T8274] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.641373][ T8274] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.648256][ T8274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.675675][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.778533][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.790313][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.821806][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.829827][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.836842][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.868234][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.880515][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.887772][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.896151][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.904683][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.923582][ T4592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 197.943817][ T8274] device veth0_vlan entered promiscuous mode [ 197.954431][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.964696][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.972699][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 197.986002][ T8274] device veth1_macvtap entered promiscuous mode [ 198.013612][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 198.082367][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 198.099522][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 198.171500][ T45] device bridge_slave_1 left promiscuous mode [ 198.180052][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.196163][ T45] device bridge_slave_0 left promiscuous mode [ 198.208602][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.216916][ T45] device veth1_macvtap left promiscuous mode [ 198.222810][ T45] device veth0_vlan left promiscuous mode [ 198.644561][ T8360] device syzkaller0 entered promiscuous mode [ 199.077435][ T8408] device syzkaller0 entered promiscuous mode [ 199.166900][ T8430] syz-executor.2[8430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.166977][ T8430] syz-executor.2[8430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.377643][ T30] audit: type=1400 audit(1718461035.500:134): avc: denied { create } for pid=8450 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 199.547188][ T8461] device syzkaller0 entered promiscuous mode [ 199.575722][ T8479] syz-executor.1[8479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.575797][ T8479] syz-executor.1[8479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.913515][ T8517] syz-executor.4[8517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.925522][ T8517] syz-executor.4[8517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.176348][ T8564] syz-executor.4[8564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.206460][ T8564] syz-executor.4[8564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.718477][ T8592] device syzkaller0 entered promiscuous mode [ 201.054906][ T8609] syz-executor.3[8609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.054966][ T8609] syz-executor.3[8609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.228623][ T8637] device syzkaller0 entered promiscuous mode [ 202.136919][ T8662] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.190021][ T8662] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.217738][ T8662] device bridge_slave_0 entered promiscuous mode [ 202.232844][ T8662] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.239910][ T8662] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.247521][ T8662] device bridge_slave_1 entered promiscuous mode [ 202.263332][ T30] audit: type=1400 audit(1718461038.390:135): avc: denied { create } for pid=8683 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 202.635852][ T45] device bridge_slave_1 left promiscuous mode [ 202.649909][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.707898][ T45] device bridge_slave_0 left promiscuous mode [ 202.760512][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.829602][ T45] device veth0_vlan left promiscuous mode [ 203.461036][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.468374][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.511208][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.530018][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.545402][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.552655][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.569415][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.577966][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.586401][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.593298][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.618741][ T4592] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 203.626540][ T4592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 203.635030][ T4592] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 203.643660][ T4592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 203.652772][ T4592] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.661666][ T4592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 203.669835][ T4592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 203.684114][ T8662] device veth0_vlan entered promiscuous mode [ 203.702364][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.716269][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.727984][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.742330][ T8662] device veth1_macvtap entered promiscuous mode [ 203.811817][ T4592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 203.875853][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 203.930608][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 203.980583][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 203.988776][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 204.018273][ T8772] device syzkaller0 entered promiscuous mode [ 204.656689][ T8853] device pim6reg1 entered promiscuous mode [ 204.680856][ T8858] bpf_get_probe_write_proto: 8 callbacks suppressed [ 204.680874][ T8858] syz-executor.4[8858] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.689704][ T8858] syz-executor.4[8858] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.659469][ T8899] syz-executor.1[8899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.674585][ T8899] syz-executor.1[8899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.784247][ T8904] device syzkaller0 entered promiscuous mode [ 206.025789][ T8909] device pim6reg1 entered promiscuous mode [ 206.153508][ T8933] syz-executor.1[8933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.153582][ T8933] syz-executor.1[8933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.086067][ T8977] syz-executor.1[8977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.120595][ T8977] syz-executor.1[8977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.127174][ T8984] syz-executor.0[8984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.145936][ T8984] syz-executor.0[8984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.708802][ T9012] device syzkaller0 entered promiscuous mode [ 207.973820][ T9033] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 208.556583][ T9068] device syzkaller0 entered promiscuous mode [ 208.760098][ T9099] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 208.989745][ T9114] device syzkaller0 entered promiscuous mode [ 209.088313][ T9130] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 209.682629][ T9154] device syzkaller0 entered promiscuous mode [ 209.721085][ T9162] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 209.825590][ T9180] device pim6reg1 entered promiscuous mode [ 209.896507][ T9187] bpf_get_probe_write_proto: 22 callbacks suppressed [ 209.896527][ T9187] syz-executor.4[9187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.903481][ T9187] syz-executor.4[9187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.928254][ T9189] syz-executor.4[9189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.951657][ T9189] syz-executor.4[9189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.159732][ T9204] device syzkaller0 entered promiscuous mode [ 210.539531][ T30] audit: type=1400 audit(1718461046.660:136): avc: denied { create } for pid=9212 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 210.737741][ T9238] device syzkaller0 entered promiscuous mode [ 210.762929][ T9234] device pim6reg1 entered promiscuous mode [ 211.213432][ T9270] device pim6reg1 entered promiscuous mode [ 211.328056][ T9276] syz-executor.0[9276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.328127][ T9276] syz-executor.0[9276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.394316][ T30] audit: type=1400 audit(1718461047.520:137): avc: denied { ioctl } for pid=9293 comm="syz-executor.0" path="socket:[46161]" dev="sockfs" ino=46161 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 211.513372][ T9300] device pim6reg1 entered promiscuous mode [ 213.220079][ T9391] device pim6reg1 entered promiscuous mode [ 213.275382][ T9399] device veth0_vlan left promiscuous mode [ 213.287565][ T9399] device veth0_vlan entered promiscuous mode [ 213.337458][ T9404] device syzkaller0 entered promiscuous mode [ 213.578021][ T9429] device veth0_vlan left promiscuous mode [ 213.595292][ T9429] device veth0_vlan entered promiscuous mode [ 213.677396][ T9439] device syzkaller0 entered promiscuous mode [ 215.460687][ T9575] device veth0_vlan left promiscuous mode [ 215.481081][ T9575] device veth0_vlan entered promiscuous mode [ 216.148196][ T9616] device veth0_vlan left promiscuous mode [ 216.171892][ T9616] device veth0_vlan entered promiscuous mode [ 216.728639][ T9656] device veth0_vlan left promiscuous mode [ 216.736066][ T9656] device veth0_vlan entered promiscuous mode [ 217.417201][ T9719] syz-executor.3[9719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.417317][ T9719] syz-executor.3[9719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.554357][ T9720] device veth0_vlan left promiscuous mode [ 217.575527][ T9720] device veth0_vlan entered promiscuous mode [ 217.652639][ T9713] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.660306][ T9713] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.670116][ T9713] device bridge_slave_0 entered promiscuous mode [ 217.678107][ T9713] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.685978][ T9713] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.693608][ T9713] device bridge_slave_1 entered promiscuous mode [ 217.826168][ T9749] device pim6reg1 entered promiscuous mode [ 217.839946][ T9763] syz-executor.2[9763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.840013][ T9763] syz-executor.2[9763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.979298][ T4592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.026355][ T4840] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.034999][ T4840] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.043115][ T4840] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.052567][ T4840] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.060897][ T4840] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.071486][ T4840] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.096344][ T4840] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.114316][ T4840] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.122960][ T4840] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.185400][ T9790] syz-executor.3[9790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.185472][ T9790] syz-executor.3[9790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.189104][ T9713] device veth0_vlan entered promiscuous mode [ 218.217684][ T1663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 218.227286][ T1663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 218.236307][ T1663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 218.246690][ T1663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.257496][ T1663] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.268083][ T1663] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.305208][ T9713] device veth1_macvtap entered promiscuous mode [ 218.321826][ T4592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 218.343079][ T4592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.390554][ T4592] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.398214][ T4592] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 218.415296][ T4592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.424698][ T4592] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.434695][ T4592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 218.445279][ T45] device bridge_slave_1 left promiscuous mode [ 218.462178][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.485769][ T45] device bridge_slave_0 left promiscuous mode [ 218.511670][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.537190][ T45] device veth1_macvtap left promiscuous mode [ 218.549726][ T45] device veth0_vlan left promiscuous mode [ 219.135261][ T9820] device veth0_vlan left promiscuous mode [ 219.157052][ T9820] device veth0_vlan entered promiscuous mode [ 219.501241][ T9863] Â: renamed from pim6reg1 [ 220.575468][ T9904] Â: renamed from pim6reg1 [ 220.829756][ T9917] device pim6reg1 entered promiscuous mode [ 220.890561][ T9943] Â: renamed from pim6reg1 [ 322.340092][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 322.346522][ C1] rcu: 1-...!: (9999 ticks this GP) idle=765/1/0x4000000000000000 softirq=40249/40249 fqs=0 last_accelerate: e157/0868 dyntick_enabled: 1 [ 322.366543][ C1] (t=10000 jiffies g=39253 q=264) [ 322.374571][ C1] rcu: rcu_preempt kthread timer wakeup didn't happen for 9999 jiffies! g39253 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 [ 322.387563][ C1] rcu: Possible timer handling issue on cpu=0 timer-softirq=10356 [ 322.396660][ C1] rcu: rcu_preempt kthread starved for 10005 jiffies! g39253 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=0 [ 322.408587][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 322.419807][ C1] rcu: RCU grace-period kthread stack dump: [ 322.427096][ C1] task:rcu_preempt state:I stack:28288 pid: 14 ppid: 2 flags:0x00004000 [ 322.437728][ C1] Call Trace: [ 322.441250][ C1] [ 322.444036][ C1] __schedule+0xccc/0x1590 [ 322.448574][ C1] ? __sched_text_start+0x8/0x8 [ 322.453325][ C1] ? __kasan_check_write+0x14/0x20 [ 322.460608][ C1] schedule+0x11f/0x1e0 [ 322.466380][ C1] schedule_timeout+0x18c/0x370 [ 322.472718][ C1] ? _raw_spin_unlock_irq+0x4e/0x70 [ 322.478732][ C1] ? console_conditional_schedule+0x30/0x30 [ 322.484860][ C1] ? update_process_times+0x200/0x200 [ 322.490780][ C1] ? prepare_to_swait_event+0x308/0x320 [ 322.496445][ C1] rcu_gp_fqs_loop+0x2af/0xf80 [ 322.501408][ C1] ? debug_smp_processor_id+0x17/0x20 [ 322.506610][ C1] ? __note_gp_changes+0x4ab/0x920 [ 322.513431][ C1] ? rcu_gp_init+0xc30/0xc30 [ 322.519279][ C1] ? _raw_spin_unlock_irq+0x4e/0x70 [ 322.525822][ C1] ? rcu_gp_init+0x9cf/0xc30 [ 322.530804][ C1] rcu_gp_kthread+0xa4/0x350 [ 322.535525][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 322.540508][ C1] ? wake_nocb_gp+0x1e0/0x1e0 [ 322.545544][ C1] ? __kasan_check_read+0x11/0x20 [ 322.550634][ C1] ? __kthread_parkme+0xb2/0x200 [ 322.556006][ C1] kthread+0x421/0x510 [ 322.560991][ C1] ? wake_nocb_gp+0x1e0/0x1e0 [ 322.568314][ C1] ? kthread_blkcg+0xd0/0xd0 [ 322.573019][ C1] ret_from_fork+0x1f/0x30 [ 322.577256][ C1] [ 322.580129][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 322.586823][ C1] Sending NMI from CPU 1 to CPUs 0: [ 322.593234][ C0] NMI backtrace for cpu 0 [ 322.593251][ C0] CPU: 0 PID: 10050 Comm: syz-executor.3 Tainted: G W 5.15.149-syzkaller-00165-g85445b5a2107 #0 [ 322.593268][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 322.593284][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 322.593307][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 4b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 322.593321][ C0] RSP: 0018:ffffc90000a36580 EFLAGS: 00000246 [ 322.593335][ C0] RAX: 0000000000000003 RBX: 1ffff92000146cb4 RCX: ffffffff8154fb7f [ 322.593347][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff88810e1b9128 [ 322.593358][ C0] RBP: ffffc90000a36630 R08: dffffc0000000000 R09: ffffed1021c37226 [ 322.593369][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 322.593380][ C0] R13: ffff88810e1b9128 R14: 0000000000000003 R15: 1ffff92000146cb8 [ 322.593391][ C0] FS: 00007fa79ec606c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 322.593405][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 322.593416][ C0] CR2: 00007f8b9a43f98c CR3: 000000011d754000 CR4: 00000000003506b0 [ 322.593430][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 322.593439][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 322.593449][ C0] Call Trace: [ 322.593455][ C0] [ 322.593463][ C0] ? show_regs+0x58/0x60 [ 322.593479][ C0] ? nmi_cpu_backtrace+0x29f/0x300 [ 322.593499][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 322.593517][ C0] ? kvm_wait+0x147/0x180 [ 322.593530][ C0] ? kvm_wait+0x147/0x180 [ 322.593544][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 322.593561][ C0] ? nmi_handle+0xa8/0x280 [ 322.593577][ C0] ? kvm_wait+0x147/0x180 [ 322.593590][ C0] ? default_do_nmi+0x69/0x160 [ 322.593616][ C0] ? exc_nmi+0xaf/0x120 [ 322.593630][ C0] ? end_repeat_nmi+0x16/0x31 [ 322.593648][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 322.593669][ C0] ? kvm_wait+0x147/0x180 [ 322.593683][ C0] ? kvm_wait+0x147/0x180 [ 322.593696][ C0] ? kvm_wait+0x147/0x180 [ 322.593710][ C0] [ 322.593714][ C0] [ 322.593719][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 322.593734][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 322.593750][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 322.593767][ C0] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 322.593786][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 322.593805][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 322.593825][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 322.593843][ C0] sock_map_delete_elem+0x99/0x130 [ 322.593863][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x998 [ 322.593882][ C0] bpf_trace_run4+0x13f/0x270 [ 322.593899][ C0] ? bpf_trace_run3+0x250/0x250 [ 322.593918][ C0] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 322.593935][ C0] __alloc_pages+0x3cb/0x8f0 [ 322.593951][ C0] ? prep_new_page+0x110/0x110 [ 322.593968][ C0] ? stack_trace_save+0x113/0x1c0 [ 322.593984][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 322.594000][ C0] __stack_depot_save+0x38d/0x470 [ 322.594026][ C0] ? kfree+0xc8/0x220 [ 322.594041][ C0] kasan_set_track+0x5d/0x70 [ 322.594055][ C0] ? kasan_set_track+0x4b/0x70 [ 322.594068][ C0] ? kasan_set_free_info+0x23/0x40 [ 322.594082][ C0] ? ____kasan_slab_free+0x126/0x160 [ 322.594096][ C0] ? __kasan_slab_free+0x11/0x20 [ 322.594110][ C0] ? slab_free_freelist_hook+0xbd/0x190 [ 322.594126][ C0] ? kfree+0xc8/0x220 [ 322.594140][ C0] ? sock_map_unref+0x352/0x4d0 [ 322.594155][ C0] ? sock_map_delete_elem+0xc1/0x130 [ 322.594170][ C0] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0x998 [ 322.594181][ C0] ? bpf_trace_run4+0x13f/0x270 [ 322.594196][ C0] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 322.594210][ C0] ? __alloc_pages+0x3cb/0x8f0 [ 322.594225][ C0] ? __stack_depot_save+0x38d/0x470 [ 322.594241][ C0] ? stack_depot_save+0xe/0x10 [ 322.594253][ C0] ? save_stack+0x104/0x1e0 [ 322.594266][ C0] ? __set_page_owner+0x28/0x2e0 [ 322.594279][ C0] ? post_alloc_hook+0x1a3/0x1b0 [ 322.594293][ C0] ? prep_new_page+0x1b/0x110 [ 322.594308][ C0] ? get_page_from_freelist+0x3550/0x35d0 [ 322.594323][ C0] ? __alloc_pages+0x27e/0x8f0 [ 322.594338][ C0] ? new_slab+0x9a/0x4e0 [ 322.594349][ C0] ? ___slab_alloc+0x39e/0x830 [ 322.594364][ C0] ? __slab_alloc+0x4a/0x90 [ 322.594379][ C0] ? kmem_cache_alloc+0x134/0x200 [ 322.594394][ C0] ? alloc_vmap_area+0x644/0x1a80 [ 322.594408][ C0] ? __get_vm_area_node+0x158/0x360 [ 322.594421][ C0] ? __vmalloc_node_range+0xe2/0x8d0 [ 322.594435][ C0] ? bpf_map_area_alloc+0xd9/0xf0 [ 322.594449][ C0] ? array_map_alloc+0x278/0x6d0 [ 322.594466][ C0] ? map_create+0x411/0x2050 [ 322.594479][ C0] ? __sys_bpf+0x296/0x760 [ 322.594492][ C0] ? __x64_sys_bpf+0x7c/0x90 [ 322.594505][ C0] ? do_syscall_64+0x3d/0xb0 [ 322.594518][ C0] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 322.594539][ C0] kasan_set_free_info+0x23/0x40 [ 322.594553][ C0] ____kasan_slab_free+0x126/0x160 [ 322.594568][ C0] __kasan_slab_free+0x11/0x20 [ 322.594582][ C0] slab_free_freelist_hook+0xbd/0x190 [ 322.594600][ C0] ? sock_map_unref+0x352/0x4d0 [ 322.594614][ C0] kfree+0xc8/0x220 [ 322.594630][ C0] sock_map_unref+0x352/0x4d0 [ 322.594648][ C0] sock_map_delete_elem+0xc1/0x130 [ 322.594664][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x998 [ 322.594675][ C0] bpf_trace_run4+0x13f/0x270 [ 322.594692][ C0] ? bpf_trace_run3+0x250/0x250 [ 322.594711][ C0] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 322.594727][ C0] __alloc_pages+0x3cb/0x8f0 [ 322.594742][ C0] ? prep_new_page+0x110/0x110 [ 322.594758][ C0] ? __x64_sys_bpf+0x7c/0x90 [ 322.594773][ C0] ? stack_trace_save+0x113/0x1c0 [ 322.594789][ C0] __stack_depot_save+0x38d/0x470 [ 322.594807][ C0] stack_depot_save+0xe/0x10 [ 322.594820][ C0] save_stack+0x104/0x1e0 [ 322.594832][ C0] ? __this_cpu_preempt_check+0x13/0x20 [ 322.594849][ C0] ? __reset_page_owner+0x190/0x190 [ 322.594862][ C0] ? post_alloc_hook+0x1a3/0x1b0 [ 322.594877][ C0] ? prep_new_page+0x1b/0x110 [ 322.594891][ C0] ? get_page_from_freelist+0x3550/0x35d0 [ 322.594907][ C0] ? __alloc_pages+0x27e/0x8f0 [ 322.594921][ C0] ? new_slab+0x9a/0x4e0 [ 322.594932][ C0] ? ___slab_alloc+0x39e/0x830 [ 322.594947][ C0] ? __slab_alloc+0x4a/0x90 [ 322.594962][ C0] ? kmem_cache_alloc+0x134/0x200 [ 322.594977][ C0] ? alloc_vmap_area+0x644/0x1a80 [ 322.594991][ C0] ? __get_vm_area_node+0x158/0x360 [ 322.595005][ C0] ? __vmalloc_node_range+0xe2/0x8d0 [ 322.595025][ C0] ? bpf_map_area_alloc+0xd9/0xf0 [ 322.595038][ C0] ? array_map_alloc+0x278/0x6d0 [ 322.595054][ C0] ? map_create+0x411/0x2050 [ 322.595067][ C0] ? __sys_bpf+0x296/0x760 [ 322.595080][ C0] ? __x64_sys_bpf+0x7c/0x90 [ 322.595094][ C0] ? finish_task_switch+0x167/0x7b0 [ 322.595111][ C0] __set_page_owner+0x28/0x2e0 [ 322.595125][ C0] ? kernel_init_free_pages+0xda/0xf0 [ 322.595141][ C0] post_alloc_hook+0x1a3/0x1b0 [ 322.595157][ C0] prep_new_page+0x1b/0x110 [ 322.595172][ C0] get_page_from_freelist+0x3550/0x35d0 [ 322.595191][ C0] ? is_bpf_text_address+0x172/0x190 [ 322.595212][ C0] ? lruvec_init+0x150/0x150 [ 322.595229][ C0] ? __alloc_pages+0x8f0/0x8f0 [ 322.595246][ C0] ? __alloc_pages_bulk+0xe40/0xe40 [ 322.595264][ C0] __alloc_pages+0x27e/0x8f0 [ 322.595278][ C0] ? __x64_sys_bpf+0x7c/0x90 [ 322.595292][ C0] ? prep_new_page+0x110/0x110 [ 322.595311][ C0] new_slab+0x9a/0x4e0 [ 322.595324][ C0] ___slab_alloc+0x39e/0x830 [ 322.595339][ C0] ? alloc_vmap_area+0x644/0x1a80 [ 322.595355][ C0] ? alloc_vmap_area+0x644/0x1a80 [ 322.595369][ C0] __slab_alloc+0x4a/0x90 [ 322.595385][ C0] ? alloc_vmap_area+0x644/0x1a80 [ 322.595398][ C0] kmem_cache_alloc+0x134/0x200 [ 322.595415][ C0] alloc_vmap_area+0x644/0x1a80 [ 322.595433][ C0] ? vm_map_ram+0xa90/0xa90 [ 322.595447][ C0] ? kmem_cache_alloc_trace+0x115/0x210 [ 322.595462][ C0] ? __get_vm_area_node+0x117/0x360 [ 322.595478][ C0] __get_vm_area_node+0x158/0x360 [ 322.595491][ C0] ? selinux_capset+0xf0/0xf0 [ 322.595509][ C0] __vmalloc_node_range+0xe2/0x8d0 [ 322.595523][ C0] ? array_map_alloc+0x278/0x6d0 [ 322.595538][ C0] ? bpf_link_settle+0xc0/0x150 [ 322.595552][ C0] ? cap_capable+0x1d2/0x270 [ 322.595570][ C0] bpf_map_area_alloc+0xd9/0xf0 [ 322.595583][ C0] ? array_map_alloc+0x278/0x6d0 [ 322.595600][ C0] array_map_alloc+0x278/0x6d0 [ 322.595617][ C0] map_create+0x411/0x2050 [ 322.595633][ C0] __sys_bpf+0x296/0x760 [ 322.595647][ C0] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 322.595665][ C0] ? __kasan_check_read+0x11/0x20 [ 322.595682][ C0] __x64_sys_bpf+0x7c/0x90 [ 322.595696][ C0] do_syscall_64+0x3d/0xb0 [ 322.595710][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 322.595725][ C0] RIP: 0033:0x7fa79f8e5ea9 [ 322.595739][ C0] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 322.595751][ C0] RSP: 002b:00007fa79ec600c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 322.595766][ C0] RAX: ffffffffffffffda RBX: 00007fa79fa1cf80 RCX: 00007fa79f8e5ea9 [ 322.595777][ C0] RDX: 0000000000000048 RSI: 0000000020000280 RDI: 0000000000000000 [ 322.595787][ C0] RBP: 00007fa79f954ff4 R08: 0000000000000000 R09: 0000000000000000 [ 322.595796][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 322.595805][ C0] R13: 000000000000000b R14: 00007fa79fa1cf80 R15: 00007ffdc27ca048 [ 322.595819][ C0] [ 322.596218][ C1] NMI backtrace for cpu 1 [ 323.692434][ C1] CPU: 1 PID: 10036 Comm: syz-executor.4 Tainted: G W 5.15.149-syzkaller-00165-g85445b5a2107 #0 [ 323.707459][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 323.719917][ C1] Call Trace: [ 323.724055][ C1] [ 323.727624][ C1] dump_stack_lvl+0x151/0x1b7 [ 323.732786][ C1] ? io_uring_drop_tctx_refs+0x190/0x190 [ 323.739530][ C1] ? ttwu_do_wakeup+0x187/0x430 [ 323.745190][ C1] dump_stack+0x15/0x17 [ 323.750971][ C1] nmi_cpu_backtrace+0x2f7/0x300 [ 323.760286][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 323.767708][ C1] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 323.773985][ C1] ? __kasan_check_write+0x14/0x20 [ 323.780401][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 323.785768][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 323.794404][ C1] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 323.801142][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 323.808628][ C1] arch_trigger_cpumask_backtrace+0x10/0x20 [ 323.818717][ C1] rcu_dump_cpu_stacks+0x1d8/0x330 [ 323.824182][ C1] print_cpu_stall+0x315/0x5f0 [ 323.829118][ C1] rcu_sched_clock_irq+0x989/0x12f0 [ 323.835076][ C1] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 323.842174][ C1] ? hrtimer_run_queues+0x15f/0x440 [ 323.847524][ C1] update_process_times+0x198/0x200 [ 323.854121][ C1] tick_sched_timer+0x188/0x240 [ 323.860355][ C1] ? tick_setup_sched_timer+0x480/0x480 [ 323.867361][ C1] __hrtimer_run_queues+0x41a/0xad0 [ 323.873579][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 323.880284][ C1] ? clockevents_program_event+0x236/0x300 [ 323.887274][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 323.894220][ C1] hrtimer_interrupt+0x40c/0xaa0 [ 323.900825][ C1] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 323.906748][ C1] sysvec_apic_timer_interrupt+0x95/0xc0 [ 323.913245][ C1] [ 323.916030][ C1] [ 323.918888][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 323.925590][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 323.930670][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 4b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 323.952639][ C1] RSP: 0018:ffffc90000cae920 EFLAGS: 00000246 [ 323.958649][ C1] RAX: 0000000000000001 RBX: 1ffff92000195d28 RCX: 1ffffffff0d1aa9c [ 323.966709][ C1] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7138ad4 [ 323.975758][ C1] RBP: ffffc90000cae9d0 R08: dffffc0000000000 R09: ffffed103ee2715b [ 323.983543][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 323.991727][ C1] R13: ffff8881f7138ad4 R14: 0000000000000001 R15: 1ffff92000195d2c [ 324.000137][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 324.005214][ C1] ? kasan_check_range+0x82/0x2a0 [ 324.010360][ C1] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 324.017064][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 324.023589][ C1] ? _raw_spin_unlock+0x4d/0x70 [ 324.028437][ C1] ? perf_event_context_sched_in+0x4ea/0x5e0 [ 324.034806][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 324.039742][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 324.045137][ C1] sock_map_delete_elem+0x99/0x130 [ 324.050161][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x998 [ 324.056050][ C1] bpf_trace_run4+0x13f/0x270 [ 324.061597][ C1] ? bpf_trace_run3+0x250/0x250 [ 324.066520][ C1] ? irqentry_exit+0x30/0x40 [ 324.071143][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 324.077306][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 324.083378][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 324.088864][ C1] __alloc_pages+0x3cb/0x8f0 [ 324.093450][ C1] ? prep_new_page+0x110/0x110 [ 324.098043][ C1] wp_page_copy+0x1d4/0x1b00 [ 324.102654][ C1] ? irqentry_exit+0x30/0x40 [ 324.107384][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 324.113609][ C1] ? insert_page_into_pte_locked+0x4e0/0x4e0 [ 324.120200][ C1] ? __sanitizer_cov_trace_const_cmp8+0x2e/0x80 [ 324.126262][ C1] ? vm_normal_page+0x1e1/0x1f0 [ 324.131126][ C1] do_wp_page+0x6fa/0xb60 [ 324.135439][ C1] handle_pte_fault+0x7c0/0x24d0 [ 324.140481][ C1] ? irqentry_exit+0x30/0x40 [ 324.144887][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 324.150535][ C1] ? fault_around_bytes_set+0xc0/0xc0 [ 324.155744][ C1] do_handle_mm_fault+0x1ea9/0x23a0 [ 324.160924][ C1] ? numa_migrate_prep+0xe0/0xe0 [ 324.165724][ C1] ? irqentry_exit+0x30/0x40 [ 324.170312][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 324.176286][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 324.182549][ C1] ? down_read_trylock+0x1d3/0x300 [ 324.187805][ C1] ? down_read_trylock+0x1f9/0x300 [ 324.194086][ C1] ? vmacache_find+0x21f/0x4d0 [ 324.199926][ C1] ? __find_vma+0x30/0x150 [ 324.204189][ C1] exc_page_fault+0x3b5/0x830 [ 324.208719][ C1] asm_exc_page_fault+0x27/0x30 [ 324.213490][ C1] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 324.220396][ C1] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 324.242984][ C1] RSP: 0018:ffffc90000caf698 EFLAGS: 00050206 [ 324.249218][ C1] RAX: ffffffff82633201 RBX: 00000000200207a0 RCX: 000000000000f970 [ 324.257582][ C1] RDX: 00000000000101d0 RSI: ffff888131040928 RDI: 0000000020021000 [ 324.267373][ C1] RBP: ffffc90000caf7f8 R08: dffffc0000000000 R09: ffffed102620a053 [ 324.277866][ C1] R10: 0000000000000003 R11: dffffc0000000001 R12: ffffc90000cafcc8 [ 324.287222][ C1] R13: 00000000000101d0 R14: ffff8881310400c8 R15: 00007ffffffff000 [ 324.295763][ C1] ? _copy_to_iter+0x271/0xde0 [ 324.301429][ C1] ? _copy_to_iter+0x2a3/0xde0 [ 324.306285][ C1] ? iov_iter_init+0x190/0x190 [ 324.311673][ C1] ? __check_object_size+0x2d9/0x3d0 [ 324.317541][ C1] ? __sanitizer_cov_trace_pc+0x1/0x60 [ 324.323001][ C1] ? __kasan_check_read+0x11/0x20 [ 324.328084][ C1] ? __check_object_size+0x2ec/0x3d0 [ 324.334053][ C1] simple_copy_to_iter+0x50/0x70 [ 324.338761][ C1] __skb_datagram_iter+0xcf/0x760 [ 324.344034][ C1] ? irqentry_exit+0x30/0x40 [ 324.348627][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 324.354375][ C1] ? skb_copy_datagram_iter+0x170/0x170 [ 324.359839][ C1] skb_copy_datagram_iter+0x43/0x170 [ 324.366123][ C1] tipc_recvstream+0x7a4/0xf70 [ 324.376300][ C1] ? tipc_sendstream+0x70/0x70 [ 324.381351][ C1] ? security_socket_recvmsg+0x87/0xb0 [ 324.387295][ C1] ? tipc_sendstream+0x70/0x70 [ 324.391888][ C1] ____sys_recvmsg+0x286/0x530 [ 324.396995][ C1] ? __sys_recvmsg_sock+0x50/0x50 [ 324.402094][ C1] ? import_iovec+0xe5/0x120 [ 324.407230][ C1] ___sys_recvmsg+0x1ec/0x690 [ 324.411897][ C1] ? __sys_recvmsg+0x260/0x260 [ 324.416721][ C1] ? enqueue_hrtimer+0xca/0x240 [ 324.421502][ C1] ? __fdget+0x1bc/0x240 [ 324.425579][ C1] __x64_sys_recvmsg+0x1dc/0x2b0 [ 324.430352][ C1] ? ___sys_recvmsg+0x690/0x690 [ 324.435118][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 324.440474][ C1] ? debug_smp_processor_id+0x17/0x20 [ 324.446119][ C1] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 324.452104][ C1] ? exit_to_user_mode_prepare+0x39/0xa0 [ 324.457834][ C1] do_syscall_64+0x3d/0xb0 [ 324.462358][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 324.468867][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 324.474655][ C1] RIP: 0033:0x7f17f7cd3ea9 [ 324.479276][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 324.501009][ C1] RSP: 002b:00007f17f704e0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 324.509349][ C1] RAX: ffffffffffffffda RBX: 00007f17f7e0af80 RCX: 00007f17f7cd3ea9 [ 324.519277][ C1] RDX: 0000000000001f00 RSI: 0000000020000500 RDI: 0000000000000004 [ 324.527365][ C1] RBP: 00007f17f7d42ff4 R08: 0000000000000000 R09: 0000000000000000 [ 324.535371][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 324.543156][ C1] R13: 000000000000000b R14: 00007f17f7e0af80 R15: 00007fff8e529e88 [ 324.550973][ C1] [ 463.085916][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 226s! [syz-executor.3:10050] [ 463.094444][ C0] Modules linked in: [ 463.098294][ C0] CPU: 0 PID: 10050 Comm: syz-executor.3 Tainted: G W 5.15.149-syzkaller-00165-g85445b5a2107 #0 [ 463.109925][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 463.120386][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 463.125917][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 4b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 463.148781][ C0] RSP: 0018:ffffc90000a36580 EFLAGS: 00000246 [ 463.155550][ C0] RAX: 0000000000000003 RBX: 1ffff92000146cb4 RCX: ffffffff8154fb7f [ 463.163547][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff88810e1b9128 [ 463.171363][ C0] RBP: ffffc90000a36630 R08: dffffc0000000000 R09: ffffed1021c37226 [ 463.179258][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 463.188033][ C0] R13: ffff88810e1b9128 R14: 0000000000000003 R15: 1ffff92000146cb8 [ 463.196112][ C0] FS: 00007fa79ec606c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 463.204980][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 463.211659][ C0] CR2: 00007f8b9a43f98c CR3: 000000011d754000 CR4: 00000000003506b0 [ 463.219472][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 463.227498][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 463.235856][ C0] Call Trace: [ 463.238955][ C0] [ 463.242002][ C0] ? show_regs+0x58/0x60 [ 463.246462][ C0] ? watchdog_timer_fn+0x4b1/0x5f0 [ 463.254164][ C0] ? proc_watchdog_cpumask+0xd0/0xd0 [ 463.259545][ C0] ? __hrtimer_run_queues+0x41a/0xad0 [ 463.265270][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 463.270930][ C0] ? clockevents_program_event+0x22f/0x300 [ 463.276671][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 463.283174][ C0] ? hrtimer_interrupt+0x40c/0xaa0 [ 463.288199][ C0] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 463.295311][ C0] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 463.301457][ C0] [ 463.304498][ C0] [ 463.307282][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 463.313637][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 463.319711][ C0] ? kvm_wait+0x147/0x180 [ 463.324021][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 463.329999][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 463.334947][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 463.341021][ C0] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 463.350435][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 463.357386][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 463.362156][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 463.367280][ C0] sock_map_delete_elem+0x99/0x130 [ 463.372359][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x998 [ 463.377740][ C0] bpf_trace_run4+0x13f/0x270 [ 463.382508][ C0] ? bpf_trace_run3+0x250/0x250 [ 463.387283][ C0] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 463.392666][ C0] __alloc_pages+0x3cb/0x8f0 [ 463.397199][ C0] ? prep_new_page+0x110/0x110 [ 463.402033][ C0] ? stack_trace_save+0x113/0x1c0 [ 463.407193][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 463.412407][ C0] __stack_depot_save+0x38d/0x470 [ 463.417294][ C0] ? kfree+0xc8/0x220 [ 463.421168][ C0] kasan_set_track+0x5d/0x70 [ 463.425604][ C0] ? kasan_set_track+0x4b/0x70 [ 463.430581][ C0] ? kasan_set_free_info+0x23/0x40 [ 463.435620][ C0] ? ____kasan_slab_free+0x126/0x160 [ 463.441013][ C0] ? __kasan_slab_free+0x11/0x20 [ 463.447155][ C0] ? slab_free_freelist_hook+0xbd/0x190 [ 463.453452][ C0] ? kfree+0xc8/0x220 [ 463.458053][ C0] ? sock_map_unref+0x352/0x4d0 [ 463.463087][ C0] ? sock_map_delete_elem+0xc1/0x130 [ 463.468378][ C0] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0x998 [ 463.474046][ C0] ? bpf_trace_run4+0x13f/0x270 [ 463.478818][ C0] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 463.484300][ C0] ? __alloc_pages+0x3cb/0x8f0 [ 463.488989][ C0] ? __stack_depot_save+0x38d/0x470 [ 463.494020][ C0] ? stack_depot_save+0xe/0x10 [ 463.499315][ C0] ? save_stack+0x104/0x1e0 [ 463.503649][ C0] ? __set_page_owner+0x28/0x2e0 [ 463.508429][ C0] ? post_alloc_hook+0x1a3/0x1b0 [ 463.514242][ C0] ? prep_new_page+0x1b/0x110 [ 463.518769][ C0] ? get_page_from_freelist+0x3550/0x35d0 [ 463.524335][ C0] ? __alloc_pages+0x27e/0x8f0 [ 463.528913][ C0] ? new_slab+0x9a/0x4e0 [ 463.533597][ C0] ? ___slab_alloc+0x39e/0x830 [ 463.538272][ C0] ? __slab_alloc+0x4a/0x90 [ 463.542617][ C0] ? kmem_cache_alloc+0x134/0x200 [ 463.552510][ C0] ? alloc_vmap_area+0x644/0x1a80 [ 463.557473][ C0] ? __get_vm_area_node+0x158/0x360 [ 463.562597][ C0] ? __vmalloc_node_range+0xe2/0x8d0 [ 463.567726][ C0] ? bpf_map_area_alloc+0xd9/0xf0 [ 463.572570][ C0] ? array_map_alloc+0x278/0x6d0 [ 463.577684][ C0] ? map_create+0x411/0x2050 [ 463.582107][ C0] ? __sys_bpf+0x296/0x760 [ 463.586354][ C0] ? __x64_sys_bpf+0x7c/0x90 [ 463.590966][ C0] ? do_syscall_64+0x3d/0xb0 [ 463.595644][ C0] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 463.601733][ C0] kasan_set_free_info+0x23/0x40 [ 463.606839][ C0] ____kasan_slab_free+0x126/0x160 [ 463.612574][ C0] __kasan_slab_free+0x11/0x20 [ 463.617361][ C0] slab_free_freelist_hook+0xbd/0x190 [ 463.622549][ C0] ? sock_map_unref+0x352/0x4d0 [ 463.627767][ C0] kfree+0xc8/0x220 [ 463.631921][ C0] sock_map_unref+0x352/0x4d0 [ 463.636433][ C0] sock_map_delete_elem+0xc1/0x130 [ 463.642079][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x998 [ 463.648357][ C0] bpf_trace_run4+0x13f/0x270 [ 463.653675][ C0] ? bpf_trace_run3+0x250/0x250 [ 463.658451][ C0] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 463.663885][ C0] __alloc_pages+0x3cb/0x8f0 [ 463.668338][ C0] ? prep_new_page+0x110/0x110 [ 463.673118][ C0] ? __x64_sys_bpf+0x7c/0x90 [ 463.677537][ C0] ? stack_trace_save+0x113/0x1c0 [ 463.682647][ C0] __stack_depot_save+0x38d/0x470 [ 463.688136][ C0] stack_depot_save+0xe/0x10 [ 463.692555][ C0] save_stack+0x104/0x1e0 [ 463.697165][ C0] ? __this_cpu_preempt_check+0x13/0x20 [ 463.702541][ C0] ? __reset_page_owner+0x190/0x190 [ 463.707748][ C0] ? post_alloc_hook+0x1a3/0x1b0 [ 463.712530][ C0] ? prep_new_page+0x1b/0x110 [ 463.717030][ C0] ? get_page_from_freelist+0x3550/0x35d0 [ 463.722766][ C0] ? __alloc_pages+0x27e/0x8f0 [ 463.727443][ C0] ? new_slab+0x9a/0x4e0 [ 463.731826][ C0] ? ___slab_alloc+0x39e/0x830 [ 463.736427][ C0] ? __slab_alloc+0x4a/0x90 [ 463.740750][ C0] ? kmem_cache_alloc+0x134/0x200 [ 463.745833][ C0] ? alloc_vmap_area+0x644/0x1a80 [ 463.750900][ C0] ? __get_vm_area_node+0x158/0x360 [ 463.756330][ C0] ? __vmalloc_node_range+0xe2/0x8d0 [ 463.762660][ C0] ? bpf_map_area_alloc+0xd9/0xf0 [ 463.767520][ C0] ? array_map_alloc+0x278/0x6d0 [ 463.772296][ C0] ? map_create+0x411/0x2050 [ 463.776978][ C0] ? __sys_bpf+0x296/0x760 [ 463.781582][ C0] ? __x64_sys_bpf+0x7c/0x90 [ 463.786193][ C0] ? finish_task_switch+0x167/0x7b0 [ 463.791214][ C0] __set_page_owner+0x28/0x2e0 [ 463.795815][ C0] ? kernel_init_free_pages+0xda/0xf0 [ 463.801131][ C0] post_alloc_hook+0x1a3/0x1b0 [ 463.806206][ C0] prep_new_page+0x1b/0x110 [ 463.810539][ C0] get_page_from_freelist+0x3550/0x35d0 [ 463.816012][ C0] ? is_bpf_text_address+0x172/0x190 [ 463.821267][ C0] ? lruvec_init+0x150/0x150 [ 463.825699][ C0] ? __alloc_pages+0x8f0/0x8f0 [ 463.830445][ C0] ? __alloc_pages_bulk+0xe40/0xe40 [ 463.835686][ C0] __alloc_pages+0x27e/0x8f0 [ 463.840357][ C0] ? __x64_sys_bpf+0x7c/0x90 [ 463.845465][ C0] ? prep_new_page+0x110/0x110 [ 463.850667][ C0] new_slab+0x9a/0x4e0 [ 463.856175][ C0] ___slab_alloc+0x39e/0x830 [ 463.861025][ C0] ? alloc_vmap_area+0x644/0x1a80 [ 463.866660][ C0] ? alloc_vmap_area+0x644/0x1a80 [ 463.872131][ C0] __slab_alloc+0x4a/0x90 [ 463.876398][ C0] ? alloc_vmap_area+0x644/0x1a80 [ 463.881244][ C0] kmem_cache_alloc+0x134/0x200 [ 463.886553][ C0] alloc_vmap_area+0x644/0x1a80 [ 463.891668][ C0] ? vm_map_ram+0xa90/0xa90 [ 463.896436][ C0] ? kmem_cache_alloc_trace+0x115/0x210 [ 463.901998][ C0] ? __get_vm_area_node+0x117/0x360 [ 463.907034][ C0] __get_vm_area_node+0x158/0x360 [ 463.911995][ C0] ? selinux_capset+0xf0/0xf0 [ 463.916498][ C0] __vmalloc_node_range+0xe2/0x8d0 [ 463.921739][ C0] ? array_map_alloc+0x278/0x6d0 [ 463.926657][ C0] ? bpf_link_settle+0xc0/0x150 [ 463.931995][ C0] ? cap_capable+0x1d2/0x270 [ 463.936423][ C0] bpf_map_area_alloc+0xd9/0xf0 [ 463.941370][ C0] ? array_map_alloc+0x278/0x6d0 [ 463.946181][ C0] array_map_alloc+0x278/0x6d0 [ 463.950962][ C0] map_create+0x411/0x2050 [ 463.955205][ C0] __sys_bpf+0x296/0x760 [ 463.960149][ C0] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 463.965718][ C0] ? __kasan_check_read+0x11/0x20 [ 463.970951][ C0] __x64_sys_bpf+0x7c/0x90 [ 463.975266][ C0] do_syscall_64+0x3d/0xb0 [ 463.979513][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 463.985329][ C0] RIP: 0033:0x7fa79f8e5ea9 [ 463.989601][ C0] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 464.009469][ C0] RSP: 002b:00007fa79ec600c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 464.017804][ C0] RAX: ffffffffffffffda RBX: 00007fa79fa1cf80 RCX: 00007fa79f8e5ea9 [ 464.025862][ C0] RDX: 0000000000000048 RSI: 0000000020000280 RDI: 0000000000000000 [ 464.033838][ C0] RBP: 00007fa79f954ff4 R08: 0000000000000000 R09: 0000000000000000 [ 464.041837][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 464.049903][ C0] R13: 000000000000000b R14: 00007fa79fa1cf80 R15: 00007ffdc27ca048 [ 464.057716][ C0] [ 464.060665][ C0] Sending NMI from CPU 0 to CPUs 1: [ 464.065704][ C1] NMI backtrace for cpu 1 [ 464.065719][ C1] CPU: 1 PID: 10036 Comm: syz-executor.4 Tainted: G W 5.15.149-syzkaller-00165-g85445b5a2107 #0 [ 464.065739][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 464.065748][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 464.065770][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 4b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 464.065783][ C1] RSP: 0018:ffffc90000cae920 EFLAGS: 00000246 [ 464.065798][ C1] RAX: 0000000000000001 RBX: 1ffff92000195d28 RCX: 1ffffffff0d1aa9c [ 464.065810][ C1] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7138ad4 [ 464.065820][ C1] RBP: ffffc90000cae9d0 R08: dffffc0000000000 R09: ffffed103ee2715b [ 464.065831][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 464.065842][ C1] R13: ffff8881f7138ad4 R14: 0000000000000001 R15: 1ffff92000195d2c [ 464.065852][ C1] FS: 00007f17f704e6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 464.065866][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 464.065877][ C1] CR2: 0000786c6c257830 CR3: 0000000126206000 CR4: 00000000003506a0 [ 464.065892][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 464.065901][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 464.065911][ C1] Call Trace: [ 464.065915][ C1] [ 464.065920][ C1] ? show_regs+0x58/0x60 [ 464.065936][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 464.065955][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 464.065974][ C1] ? kvm_wait+0x147/0x180 [ 464.065987][ C1] ? kvm_wait+0x147/0x180 [ 464.066000][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 464.066026][ C1] ? nmi_handle+0xa8/0x280 [ 464.066042][ C1] ? kvm_wait+0x147/0x180 [ 464.066055][ C1] ? default_do_nmi+0x69/0x160 [ 464.066072][ C1] ? exc_nmi+0xaf/0x120 [ 464.066086][ C1] ? end_repeat_nmi+0x16/0x31 [ 464.066106][ C1] ? kvm_wait+0x147/0x180 [ 464.066120][ C1] ? kvm_wait+0x147/0x180 [ 464.066134][ C1] ? kvm_wait+0x147/0x180 [ 464.066147][ C1] [ 464.066151][ C1] [ 464.066156][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 464.066177][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 464.066193][ C1] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 464.066213][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 464.066230][ C1] ? _raw_spin_unlock+0x4d/0x70 [ 464.066247][ C1] ? perf_event_context_sched_in+0x4ea/0x5e0 [ 464.066268][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 464.066284][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 464.066303][ C1] sock_map_delete_elem+0x99/0x130 [ 464.066321][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x998 [ 464.066334][ C1] bpf_trace_run4+0x13f/0x270 [ 464.066351][ C1] ? bpf_trace_run3+0x250/0x250 [ 464.066367][ C1] ? irqentry_exit+0x30/0x40 [ 464.066382][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 464.066398][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 464.066414][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 464.066431][ C1] __alloc_pages+0x3cb/0x8f0 [ 464.066448][ C1] ? prep_new_page+0x110/0x110 [ 464.066467][ C1] wp_page_copy+0x1d4/0x1b00 [ 464.066484][ C1] ? irqentry_exit+0x30/0x40 [ 464.066499][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 464.066515][ C1] ? insert_page_into_pte_locked+0x4e0/0x4e0 [ 464.066533][ C1] ? __sanitizer_cov_trace_const_cmp8+0x2e/0x80 [ 464.066552][ C1] ? vm_normal_page+0x1e1/0x1f0 [ 464.066566][ C1] do_wp_page+0x6fa/0xb60 [ 464.066581][ C1] handle_pte_fault+0x7c0/0x24d0 [ 464.066597][ C1] ? irqentry_exit+0x30/0x40 [ 464.066611][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 464.066627][ C1] ? fault_around_bytes_set+0xc0/0xc0 [ 464.066646][ C1] do_handle_mm_fault+0x1ea9/0x23a0 [ 464.066665][ C1] ? numa_migrate_prep+0xe0/0xe0 [ 464.066683][ C1] ? irqentry_exit+0x30/0x40 [ 464.066697][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 464.066714][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 464.066731][ C1] ? down_read_trylock+0x1d3/0x300 [ 464.066746][ C1] ? down_read_trylock+0x1f9/0x300 [ 464.066761][ C1] ? vmacache_find+0x21f/0x4d0 [ 464.066778][ C1] ? __find_vma+0x30/0x150 [ 464.066793][ C1] exc_page_fault+0x3b5/0x830 [ 464.066814][ C1] asm_exc_page_fault+0x27/0x30 [ 464.066827][ C1] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 464.066846][ C1] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 464.066857][ C1] RSP: 0018:ffffc90000caf698 EFLAGS: 00050206 [ 464.066870][ C1] RAX: ffffffff82633201 RBX: 00000000200207a0 RCX: 000000000000f970 [ 464.066880][ C1] RDX: 00000000000101d0 RSI: ffff888131040928 RDI: 0000000020021000 [ 464.066890][ C1] RBP: ffffc90000caf7f8 R08: dffffc0000000000 R09: ffffed102620a053 [ 464.066902][ C1] R10: 0000000000000003 R11: dffffc0000000001 R12: ffffc90000cafcc8 [ 464.066912][ C1] R13: 00000000000101d0 R14: ffff8881310400c8 R15: 00007ffffffff000 [ 464.066924][ C1] ? _copy_to_iter+0x271/0xde0 [ 464.066939][ C1] ? _copy_to_iter+0x2a3/0xde0 [ 464.066955][ C1] ? iov_iter_init+0x190/0x190 [ 464.066970][ C1] ? __check_object_size+0x2d9/0x3d0 [ 464.066988][ C1] ? __sanitizer_cov_trace_pc+0x1/0x60 [ 464.067005][ C1] ? __kasan_check_read+0x11/0x20 [ 464.067021][ C1] ? __check_object_size+0x2ec/0x3d0 [ 464.067037][ C1] simple_copy_to_iter+0x50/0x70 [ 464.067055][ C1] __skb_datagram_iter+0xcf/0x760 [ 464.067070][ C1] ? irqentry_exit+0x30/0x40 [ 464.067085][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 464.067101][ C1] ? skb_copy_datagram_iter+0x170/0x170 [ 464.067119][ C1] skb_copy_datagram_iter+0x43/0x170 [ 464.067136][ C1] tipc_recvstream+0x7a4/0xf70 [ 464.067155][ C1] ? tipc_sendstream+0x70/0x70 [ 464.067185][ C1] ? security_socket_recvmsg+0x87/0xb0 [ 464.067200][ C1] ? tipc_sendstream+0x70/0x70 [ 464.067213][ C1] ____sys_recvmsg+0x286/0x530 [ 464.067231][ C1] ? __sys_recvmsg_sock+0x50/0x50 [ 464.067248][ C1] ? import_iovec+0xe5/0x120 [ 464.067265][ C1] ___sys_recvmsg+0x1ec/0x690 [ 464.067281][ C1] ? __sys_recvmsg+0x260/0x260 [ 464.067294][ C1] ? enqueue_hrtimer+0xca/0x240 [ 464.067316][ C1] ? __fdget+0x1bc/0x240 [ 464.067330][ C1] __x64_sys_recvmsg+0x1dc/0x2b0 [ 464.067345][ C1] ? ___sys_recvmsg+0x690/0x690 [ 464.067359][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 464.067376][ C1] ? debug_smp_processor_id+0x17/0x20 [ 464.067392][ C1] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 464.067409][ C1] ? exit_to_user_mode_prepare+0x39/0xa0 [ 464.067426][ C1] do_syscall_64+0x3d/0xb0 [ 464.067439][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 464.067455][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 464.067469][ C1] RIP: 0033:0x7f17f7cd3ea9 [ 464.067482][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 464.067493][ C1] RSP: 002b:00007f17f704e0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 464.067508][ C1] RAX: ffffffffffffffda RBX: 00007f17f7e0af80 RCX: 00007f17f7cd3ea9 [ 464.067519][ C1] RDX: 0000000000001f00 RSI: 0000000020000500 RDI: 0000000000000004 [ 464.067528][ C1] RBP: 00007f17f7d42ff4 R08: 0000000000000000 R09: 0000000000000000 [ 464.067536][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 464.067545][ C1] R13: 000000000000000b R14: 00007f17f7e0af80 R15: 00007fff8e529e88 [ 464.067558][ C1]