last executing test programs: 3.376867368s ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_mballoc_prealloc\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r4, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x2, 0x80, 0xc2, 0xc}}) 3.257268756s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)=@o_path={&(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, r4}, 0x18) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000013c0)={&(0x7f0000001180)="389060fb4b39deafbeee970e3d41215f83fed7d71e9009c2df1e7cd4972f38f36502bb25f5b58d79191f815148d61d7fc9bd25e19e1c056ce2b7bc32a8019f113b9ccd2fd6adf8eae97249caffe4a8f6ff333da77610e0f93b1ce76a42f6102895eb5228683e0cdb106838f20d97e58c192cde0c2ffbf8fbd7b904a88299907a493db8f08fdd8a0ca9f26db9fe0a5c8905ac70415f35228307e75a5216dfb3aed13c7187b1a542cdc284540b709ad7c480101696e3450fa3d577d44809d82a989388aced41a0df475b53d7135474", &(0x7f0000001080)=""/142, &(0x7f0000001280)="3714ca4df4aad14ffd6835103ecc17148fb1272cab355fffbf0942450800e26214031fae4a2e38a600f229134d83f93530d93377667b16ae1dff1b4be73cb85bf4caf08f784d1ba27ee53aa75092fc7b5a8041ac23a630a3812ac16df537dea73cb7d6945d00eac6fa5e91d93bdd304e7c4730f6ae4061a51f731d52b3c051f1d601fd6683bc4f87872e495eb8fbff29f86de5024d201ae696e5db22c4952cc36c07f2dd30d0e3adcfea64b819cd524e6596c407e0dcc9ab32e20770b5e996dae34504a599e276b9ee7b999ec34df1d6fc9cebda9af3f9b8", &(0x7f00000014c0)="f24debd6369693979593dbdbbf5a73837b97e0c1d9da2b395bd6d0197196dc2a29f0de7df718bc0da6c8049e45b188ef603afa1fc0575f5bec18fb62b001eafaa5262a1d29b689d9bea888a851538575fa0028a34fb7301b2d17e6de076f65d33f5b671ca2b7002184ff87c1431cd42f21577ff8c5d49380a4539a40f0ce79838e7f7bcc1a23866fb275617a25486dd8e920d6332430ab86cb91f12409bd4edb8226c6", 0xffff, r5, 0x4}, 0x38) sendmsg$inet(r3, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r4, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x43400) 2.212406807s ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0x16, 0x0, 0xb161, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r2, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r3, 0x0, &(0x7f0000001780)=""/4096}, 0x20) 2.156469416s ago: executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r3}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r5, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000080)) 1.642869905s ago: executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000007000000000000000100000d00000000000001000000005f0070616100"], &(0x7f0000000040)=""/16, 0x3f, 0x10, 0x1, 0x74}, 0x20) perf_event_open(&(0x7f0000002100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000000c0), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuset.memory_pressure\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x4a, &(0x7f00000006c0)=ANY=[@ANYBLOB="18"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r4}, 0x38) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 1.531283983s ago: executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000011100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffde0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 1.514084766s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)=@o_path={&(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, r4}, 0x18) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000013c0)={&(0x7f0000001180)="389060fb4b39deafbeee970e3d41215f83fed7d71e9009c2df1e7cd4972f38f36502bb25f5b58d79191f815148d61d7fc9bd25e19e1c056ce2b7bc32a8019f113b9ccd2fd6adf8eae97249caffe4a8f6ff333da77610e0f93b1ce76a42f6102895eb5228683e0cdb106838f20d97e58c192cde0c2ffbf8fbd7b904a88299907a493db8f08fdd8a0ca9f26db9fe0a5c8905ac70415f35228307e75a5216dfb3aed13c7187b1a542cdc284540b709ad7c480101696e3450fa3d577d44809d82a989388aced41a0df475b53d7135474", &(0x7f0000001080)=""/142, &(0x7f0000001280)="3714ca4df4aad14ffd6835103ecc17148fb1272cab355fffbf0942450800e26214031fae4a2e38a600f229134d83f93530d93377667b16ae1dff1b4be73cb85bf4caf08f784d1ba27ee53aa75092fc7b5a8041ac23a630a3812ac16df537dea73cb7d6945d00eac6fa5e91d93bdd304e7c4730f6ae4061a51f731d52b3c051f1d601fd6683bc4f87872e495eb8fbff29f86de5024d201ae696e5db22c4952cc36c07f2dd30d0e3adcfea64b819cd524e6596c407e0dcc9ab32e20770b5e996dae34504a599e276b9ee7b999ec34df1d6fc9cebda9af3f9b8", &(0x7f00000014c0)="f24debd6369693979593dbdbbf5a73837b97e0c1d9da2b395bd6d0197196dc2a29f0de7df718bc0da6c8049e45b188ef603afa1fc0575f5bec18fb62b001eafaa5262a1d29b689d9bea888a851538575fa0028a34fb7301b2d17e6de076f65d33f5b671ca2b7002184ff87c1431cd42f21577ff8c5d49380a4539a40f0ce79838e7f7bcc1a23866fb275617a25486dd8e920d6332430ab86cb91f12409bd4edb8226c6", 0xffff, r5, 0x4}, 0x38) sendmsg$inet(r3, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r4, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x43400) 1.510435226s ago: executing program 2: ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000000)) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="a0baea4b10"], 0x5) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x10, 0x2, 0xae5, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='signal_generate\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000540)='ext4_es_insert_delayed_block\x00'}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0xfffffdef) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000611224000000000095000007000000008fe6c44eefabf05e9a5903fc7aa844336e92f5bc4c06874865de4defb6fe732c25abe881227e650634f4269611772530244f72e8ccec8573eec4fa11a61dceb73f00ba7fe5d9cb62dd5609bb9733eac7f87db2fde544a94c44f78012026ef42330f961bfba2ac5083451ddb400"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) 1.497836168s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r2}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 1.48774827s ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001b80)={{r0}, &(0x7f0000001b00), &(0x7f0000001b40)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 1.474047072s ago: executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x1c, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000b00000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000600000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x1, &(0x7f00000017c0)=ANY=[@ANYBLOB="852000000080"], &(0x7f0000000080)='GPL\x00'}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6307ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f086dd"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7d07001175f37538e486dd6317"], 0xfdef) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000000), 0x400000) 1.446513446s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x2, 0x1, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000080008007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40086607, 0x20001412) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e30889b1"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)=0x80000) 1.443486936s ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r1}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 1.409963442s ago: executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4004662b, &(0x7f00000005c0)=0x1) gettid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x6, 0x2, &(0x7f0000000200)=@raw=[@call, @exit], &(0x7f0000000280)='GPL\x00', 0x5, 0x81, &(0x7f00000002c0)=""/123, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x90, 0x0, 0x100000}, 0x80) 1.281892391s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.277481182s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x1f, 0xf, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000088500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 1.232905549s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000400)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.215397682s ago: executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x20000}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r2}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) 1.167565649s ago: executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r3}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r5, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000080)) 1.132300215s ago: executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000007000000000000000100000d00000000000001000000005f0070616100"], &(0x7f0000000040)=""/16, 0x3f, 0x10, 0x1, 0x74}, 0x20) perf_event_open(&(0x7f0000002100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000000c0), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuset.memory_pressure\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x4a, &(0x7f00000006c0)=ANY=[@ANYBLOB="18"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r4}, 0x38) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 846.319949ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0x16, 0x0, 0xb161, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r2, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r3, 0x0, &(0x7f0000001780)=""/4096}, 0x20) 774.05423ms ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000000), &(0x7f00000003c0)}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6012, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 515.26145ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001b80)={{r0}, &(0x7f0000001b00), &(0x7f0000001b40)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 504.731132ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r1}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 485.270694ms ago: executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x1c, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000b00000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000600000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x1, &(0x7f00000017c0)=ANY=[@ANYBLOB="852000000080"], &(0x7f0000000080)='GPL\x00'}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6307ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f086dd"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7d07001175f37538e486dd6317"], 0xfdef) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000000), 0x400000) 473.467747ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x2, 0x1, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000080008007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40086607, 0x20001412) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e30889b1"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)=0x80000) 452.18975ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x1f, 0xf, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000088500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 353.687855ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 261.100689ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000400)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 0s ago: executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r3}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r5, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000080)) kernel console output (not intermixed with test programs): 140:126): avc: denied { create } for pid=4909 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 207.654770][ T811] device bridge_slave_1 left promiscuous mode [ 207.660982][ T811] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.668490][ T811] device bridge_slave_0 left promiscuous mode [ 207.674535][ T811] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.688780][ T811] device veth1_macvtap left promiscuous mode [ 207.718272][ T811] device veth0_vlan left promiscuous mode [ 208.767829][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.782907][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.828349][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.844289][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.887351][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.894279][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.942271][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.967818][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.998692][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.005596][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.036436][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.063581][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.075047][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.094954][ T4881] device veth0_vlan entered promiscuous mode [ 209.105710][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 209.113978][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 209.121468][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 209.130488][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 209.149142][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 209.160572][ T4881] device veth1_macvtap entered promiscuous mode [ 209.173391][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 209.182789][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 209.209891][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 209.232023][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 210.259743][ T5000] sock: sock_set_timeout: `syz-executor.1' (pid 5000) tries to set negative timeout [ 210.959329][ T5035] sock: sock_set_timeout: `syz-executor.0' (pid 5035) tries to set negative timeout [ 211.626172][ T5064] sock: sock_set_timeout: `syz-executor.2' (pid 5064) tries to set negative timeout [ 212.896489][ T5128] syz-executor.2[5128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.896888][ T5128] syz-executor.2[5128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.200894][ T5135] syz-executor.0[5135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.227436][ T5135] syz-executor.0[5135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.902960][ T5148] device syzkaller0 entered promiscuous mode [ 213.935917][ T5174] syz-executor.4[5174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.935993][ T5174] syz-executor.4[5174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.135082][ T5189] syz-executor.0[5189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.161146][ T5189] syz-executor.0[5189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.871758][ T5228] syz-executor.3[5228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.892811][ T5228] syz-executor.3[5228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.153118][ T28] audit: type=1400 audit(1718098590.880:127): avc: denied { create } for pid=5236 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 215.803054][ T5249] device wg2 entered promiscuous mode [ 216.688613][ T5313] device wg2 entered promiscuous mode [ 216.846862][ T5325] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 217.249907][ T5344] device wg2 left promiscuous mode [ 217.385820][ T5344] device wg2 entered promiscuous mode [ 222.190339][ T5392] device wg2 left promiscuous mode [ 222.200201][ T5392] device wg2 entered promiscuous mode [ 222.367495][ T5404] device sit0 entered promiscuous mode [ 226.192113][ T5444] bpf_get_probe_write_proto: 2 callbacks suppressed [ 226.192134][ T5444] syz-executor.2[5444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.198928][ T5444] syz-executor.2[5444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.382363][ T5461] device syzkaller0 entered promiscuous mode [ 229.060904][ T5481] syz-executor.4[5481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.060977][ T5481] syz-executor.4[5481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.074560][ T28] audit: type=1400 audit(1718098604.800:128): avc: denied { create } for pid=5476 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 232.094916][ T5590] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.103509][ T5590] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.144298][ T5590] device bridge0 left promiscuous mode [ 232.144527][ T28] audit: type=1400 audit(1718098607.870:129): avc: denied { create } for pid=5589 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 232.190045][ T28] audit: type=1400 audit(1718098607.910:130): avc: denied { create } for pid=5589 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 232.241750][ T5597] device bridge_slave_1 left promiscuous mode [ 232.260570][ T5597] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.273200][ T5597] device bridge_slave_0 left promiscuous mode [ 232.285010][ T5597] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.294459][ T5626] device pim6reg1 entered promiscuous mode [ 233.812887][ T8] device bridge_slave_1 left promiscuous mode [ 233.829461][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.912541][ T8] device bridge_slave_0 left promiscuous mode [ 233.977472][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.083808][ T8] device veth1_macvtap left promiscuous mode [ 234.186130][ T8] device veth0_vlan left promiscuous mode [ 234.996384][ T5676] device pim6reg1 entered promiscuous mode [ 235.119282][ T5646] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.169125][ T5646] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.176437][ T5646] device bridge_slave_0 entered promiscuous mode [ 235.183771][ T5646] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.190903][ T5646] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.198340][ T5646] device bridge_slave_1 entered promiscuous mode [ 235.483086][ T5705] device pim6reg1 entered promiscuous mode [ 235.713466][ T5646] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.720371][ T5646] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.727441][ T5646] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.734252][ T5646] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.028073][ T4055] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.038641][ T4055] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.079185][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.087458][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.095034][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.103436][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.112225][ T4055] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.119100][ T4055] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.139191][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.147357][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.155760][ T4055] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.162633][ T4055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.170254][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 236.178176][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 236.186909][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 236.195027][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.208986][ T5646] device veth0_vlan entered promiscuous mode [ 236.255976][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 236.274458][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 236.378100][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 236.446392][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 236.511319][ T5646] device veth1_macvtap entered promiscuous mode [ 236.581775][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 236.591595][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 236.646868][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 236.697127][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 236.810916][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 236.921993][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 236.932186][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 236.942553][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 236.957728][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 238.860442][ T28] audit: type=1400 audit(1718098614.590:131): avc: denied { create } for pid=5869 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 238.954064][ T5873] device pim6reg1 entered promiscuous mode [ 239.835570][ T5912] device pim6reg1 entered promiscuous mode [ 240.946758][ T5948] syz-executor.3[5948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.946831][ T5948] syz-executor.3[5948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.949645][ T5950] device pim6reg1 entered promiscuous mode [ 241.171023][ T5942] syz-executor.3[5942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.171097][ T5942] syz-executor.3[5942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.748509][ T5981] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.767816][ T5981] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.941026][ T5981] device bridge0 left promiscuous mode [ 242.040599][ T5981] device bridge_slave_1 left promiscuous mode [ 242.061230][ T5981] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.121355][ T5981] device bridge_slave_0 left promiscuous mode [ 242.129455][ T5981] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.399997][ T6010] syz-executor.4[6010] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.400072][ T6010] syz-executor.4[6010] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.741816][ T6006] syz-executor.4[6006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.854132][ T6006] syz-executor.4[6006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.169737][ T6025] device sit0 entered promiscuous mode [ 244.183044][ T6069] device sit0 entered promiscuous mode [ 247.157880][ T6155] syz-executor.1[6155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.164256][ T6155] syz-executor.1[6155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.348898][ T6155] syz-executor.1[6155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.372387][ T6155] syz-executor.1[6155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.652888][ T6223] syz-executor.4[6223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.765874][ T6223] syz-executor.4[6223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.088561][ T6223] syz-executor.4[6223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.137386][ T6223] syz-executor.4[6223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.803275][ T6259] device sit0 entered promiscuous mode [ 250.731304][ T6269] syz-executor.3[6269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.742301][ T6269] syz-executor.3[6269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.385131][ T6299] device sit0 entered promiscuous mode [ 252.981290][ T6370] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 257.945370][ T10] device bridge_slave_1 left promiscuous mode [ 257.962252][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.971749][ T10] device bridge_slave_0 left promiscuous mode [ 257.977762][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.985990][ T10] device veth1_macvtap left promiscuous mode [ 258.585423][ T6564] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.602625][ T6564] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.667150][ T6564] device bridge_slave_0 entered promiscuous mode [ 258.736878][ T6564] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.810465][ T6564] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.880628][ T6564] device bridge_slave_1 entered promiscuous mode [ 259.691062][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.698420][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.773343][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 259.783910][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.800894][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.807776][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.939065][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 259.947275][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 260.049115][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.055980][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.139931][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 260.329045][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.352377][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 260.380723][ T6631] device sit0 left promiscuous mode [ 260.424066][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 260.434588][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 260.461820][ T6631] device sit0 entered promiscuous mode [ 260.822172][ T6564] device veth0_vlan entered promiscuous mode [ 260.859991][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 260.867778][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.967716][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.040818][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.146896][ T6564] device veth1_macvtap entered promiscuous mode [ 261.251753][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 261.277224][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 261.382480][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 261.510312][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 261.518447][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 261.583865][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 261.668531][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 265.959823][ T6770] device sit0 left promiscuous mode [ 266.111704][ T6763] device sit0 entered promiscuous mode [ 267.179271][ T6822] device pim6reg1 entered promiscuous mode [ 267.904104][ T6867] device pim6reg1 entered promiscuous mode [ 269.120519][ T6928] device sit0 left promiscuous mode [ 269.512150][ T6935] device sit0 entered promiscuous mode [ 270.353556][ T6984] device sit0 left promiscuous mode [ 270.758612][ T6993] device sit0 entered promiscuous mode [ 271.862949][ T7031] device sit0 left promiscuous mode [ 272.395609][ T7035] device sit0 entered promiscuous mode [ 273.648844][ T7086] device sit0 left promiscuous mode [ 273.744263][ T7080] device sit0 entered promiscuous mode [ 273.830464][ T7097] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 275.010330][ T7130] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 275.023878][ T7134] device pim6reg1 entered promiscuous mode [ 276.393099][ T7181] bpf_get_probe_write_proto: 2 callbacks suppressed [ 276.393117][ T7181] syz-executor.2[7181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.409055][ T7181] syz-executor.2[7181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.669159][ T7214] device pim6reg1 entered promiscuous mode [ 277.738531][ T7209] device sit0 left promiscuous mode [ 278.299155][ T7215] device sit0 entered promiscuous mode [ 278.569643][ T7229] syz-executor.2[7229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.569715][ T7229] syz-executor.2[7229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.325762][ T7251] device veth1_macvtap left promiscuous mode [ 279.451580][ T7251] device veth1_macvtap entered promiscuous mode [ 279.521625][ T7251] device macsec0 entered promiscuous mode [ 280.008889][ T7268] device sit0 entered promiscuous mode [ 280.470511][ T7289] device veth1_macvtap left promiscuous mode [ 280.580786][ T7293] device veth1_macvtap entered promiscuous mode [ 280.599865][ T7293] device macsec0 entered promiscuous mode [ 280.715801][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 281.006314][ T7299] device syzkaller0 entered promiscuous mode [ 281.234073][ T7309] device pim6reg1 entered promiscuous mode [ 281.734249][ T7331] device sit0 left promiscuous mode [ 281.912203][ T7330] device sit0 entered promiscuous mode [ 282.480174][ T7337] device pim6reg1 entered promiscuous mode [ 282.541346][ T7354] device syzkaller0 entered promiscuous mode [ 282.776700][ T7379] device sit0 left promiscuous mode [ 283.105092][ T7405] device sit0 entered promiscuous mode [ 283.206775][ T7410] device syzkaller0 entered promiscuous mode [ 283.249026][ T7411] device pim6reg1 entered promiscuous mode [ 283.770757][ T7437] device veth1_macvtap left promiscuous mode [ 283.784952][ T7439] device veth1_macvtap entered promiscuous mode [ 283.817353][ T7439] device macsec0 entered promiscuous mode [ 285.462111][ T7503] device veth1_macvtap left promiscuous mode [ 285.560593][ T7503] device veth1_macvtap entered promiscuous mode [ 285.607444][ T7503] device macsec0 entered promiscuous mode [ 287.123447][ T7581] device bridge0 entered promiscuous mode [ 288.863347][ T7704] device veth1_macvtap left promiscuous mode [ 288.916258][ T7704] device macsec0 left promiscuous mode [ 288.978454][ T7706] device veth1_macvtap entered promiscuous mode [ 289.041037][ T7706] device macsec0 entered promiscuous mode [ 320.836703][ T8912] syz-executor.1[8912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.836808][ T8912] syz-executor.1[8912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.031285][ T8939] syz-executor.2[8939] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.109563][ T8939] syz-executor.2[8939] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.588674][ T8973] syz-executor.2[8973] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.635089][ T8973] syz-executor.2[8973] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.016989][ T9001] syz-executor.1[9001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.028852][ T9001] syz-executor.1[9001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.190584][ T9026] syz-executor.1[9026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.202548][ T9026] syz-executor.1[9026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.209872][ T9156] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 329.601307][ T9196] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 329.810000][ T9228] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 330.030923][ T9280] bpf_get_probe_write_proto: 4 callbacks suppressed [ 330.030941][ T9280] syz-executor.3[9280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.037485][ T9280] syz-executor.3[9280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.221585][ T9310] syz-executor.0[9310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.233270][ T9310] syz-executor.0[9310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.462773][ T9354] syz-executor.4[9354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.488416][ T9358] device syzkaller0 entered promiscuous mode [ 330.492629][ T9354] syz-executor.4[9354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.758743][ T9407] syz-executor.0[9407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.766325][ T9406] device syzkaller0 entered promiscuous mode [ 330.770525][ T9407] syz-executor.0[9407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.015671][ T9451] device syzkaller0 entered promiscuous mode [ 331.085833][ T9464] syz-executor.4[9464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.085908][ T9464] syz-executor.4[9464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.297980][ T9494] device syzkaller0 entered promiscuous mode [ 331.730947][ T9533] device syzkaller0 entered promiscuous mode [ 332.103617][ T9567] device pim6reg1 entered promiscuous mode [ 335.230590][ T9581] device syzkaller0 entered promiscuous mode [ 335.423457][ T9590] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.430506][ T9590] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.437837][ T9590] device bridge_slave_0 entered promiscuous mode [ 335.444749][ T9590] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.458005][ T9590] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.477851][ T9590] device bridge_slave_1 entered promiscuous mode [ 338.240663][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 338.249620][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 338.259162][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 338.267508][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.275617][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.282573][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.290175][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 338.301145][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 338.309545][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.317597][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.324456][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.343433][ T9590] device veth0_vlan entered promiscuous mode [ 338.352020][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 338.361042][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 338.368956][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 338.376130][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 338.383346][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 338.391065][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 338.403013][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 338.413325][ T9590] device veth1_macvtap entered promiscuous mode [ 338.424790][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 338.433195][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 338.522974][ T9644] device pim6reg1 entered promiscuous mode [ 338.764426][ T8] device veth1_macvtap left promiscuous mode [ 338.770323][ T8] device veth0_vlan left promiscuous mode [ 340.942684][ T9705] device pim6reg1 entered promiscuous mode [ 341.413048][ T9752] device syzkaller0 entered promiscuous mode [ 342.397681][ T9796] device syzkaller0 entered promiscuous mode [ 343.254867][ T9846] device syzkaller0 entered promiscuous mode [ 344.110242][ T9895] device syzkaller0 entered promiscuous mode [ 347.048377][ T9954] device syzkaller0 entered promiscuous mode [ 348.455595][T10058] device syzkaller0 entered promiscuous mode [ 348.875216][T10075] device syzkaller0 entered promiscuous mode [ 349.487232][T10101] device syzkaller0 entered promiscuous mode [ 349.968872][T10117] device syzkaller0 entered promiscuous mode [ 350.514844][T10136] bridge0: port 3(veth1_macvtap) entered blocking state [ 350.534285][T10136] bridge0: port 3(veth1_macvtap) entered disabled state [ 350.593892][T10138] bpf_get_probe_write_proto: 2 callbacks suppressed [ 350.593911][T10138] syz-executor.1[10138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.600661][T10138] syz-executor.1[10138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.253228][T10169] syz-executor.4[10169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.310303][T10168] bridge0: port 3(veth1_macvtap) entered blocking state [ 351.419544][T10169] syz-executor.4[10169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.449456][T10168] bridge0: port 3(veth1_macvtap) entered disabled state [ 351.644503][T10177] device syzkaller0 entered promiscuous mode [ 352.188531][T10199] device syzkaller0 entered promiscuous mode [ 352.784237][T10217] device syzkaller0 entered promiscuous mode [ 353.633763][T10253] device syzkaller0 entered promiscuous mode [ 353.973623][T10252] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.988513][T10252] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.001014][T10252] device bridge_slave_0 entered promiscuous mode [ 354.064775][T10252] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.079114][T10252] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.089342][T10252] device bridge_slave_1 entered promiscuous mode [ 354.120344][T10288] device syzkaller0 entered promiscuous mode [ 354.267962][T10252] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.274872][T10252] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.281973][T10252] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.288933][T10252] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.341537][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 354.350138][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.357564][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.388470][ T10] device bridge_slave_1 left promiscuous mode [ 354.416099][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.426558][ T10] device bridge_slave_0 left promiscuous mode [ 354.443849][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.463095][ T10] device veth1_macvtap left promiscuous mode [ 354.470712][ T10] device veth0_vlan left promiscuous mode [ 354.521094][ T28] audit: type=1400 audit(1718098730.250:132): avc: denied { create } for pid=10295 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 354.544249][ T28] audit: type=1400 audit(1718098730.250:133): avc: denied { create } for pid=10295 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 354.780009][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 354.790205][ T8875] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.797090][ T8875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.811056][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 354.823095][ T8875] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.829997][ T8875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.861828][T10252] device veth0_vlan entered promiscuous mode [ 354.878052][T10252] device veth1_macvtap entered promiscuous mode [ 354.893272][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 354.902415][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 354.960145][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 354.968483][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 355.129579][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 355.136947][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 355.238319][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 355.298303][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 355.356857][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 355.780061][ T28] audit: type=1400 audit(1718098731.510:134): avc: denied { write } for pid=10343 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 355.983205][ T28] audit: type=1400 audit(1718098731.710:135): avc: denied { create } for pid=10362 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 356.172443][ T28] audit: type=1400 audit(1718098731.730:136): avc: denied { read } for pid=10362 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 356.351495][T10375] device pim6reg1 entered promiscuous mode [ 357.642491][T10410] device pim6reg1 entered promiscuous mode [ 358.255580][T10415] device pim6reg1 entered promiscuous mode [ 358.277372][T10418] device syzkaller0 entered promiscuous mode [ 358.692152][T10450] device pim6reg1 entered promiscuous mode [ 362.117503][T10566] device syzkaller0 entered promiscuous mode [ 362.470826][T10586] device pim6reg1 entered promiscuous mode [ 362.515329][T10597] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 362.816760][T10599] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.881063][T10599] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.954708][T10599] device bridge_slave_0 entered promiscuous mode [ 363.033769][T10599] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.116706][T10599] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.186292][T10599] device bridge_slave_1 entered promiscuous mode [ 363.681784][ T8] device bridge_slave_1 left promiscuous mode [ 363.687770][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.755696][ T8] device bridge_slave_0 left promiscuous mode [ 363.783115][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.802503][ T8] device veth1_macvtap left promiscuous mode [ 363.853336][ T8] device veth0_vlan left promiscuous mode [ 364.584148][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 364.601827][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 364.913043][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 364.949854][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 364.958023][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.965050][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 365.209246][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 365.279553][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 365.287577][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 365.294445][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 365.302371][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 365.309941][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 365.317943][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 365.419818][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 365.462263][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 365.499682][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 365.518234][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 365.549710][T10599] device veth0_vlan entered promiscuous mode [ 365.563782][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 365.574370][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 365.593147][T10599] device veth1_macvtap entered promiscuous mode [ 365.611408][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 365.619205][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 365.626572][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 365.635079][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 365.643539][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 365.680419][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 365.690426][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 365.712851][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 365.755989][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 367.160423][T10770] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 368.010624][T10813] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 369.242669][T10882] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 370.327526][T10926] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 371.560792][T10981] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 372.542269][T11032] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 374.194873][T11088] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 377.369622][T11139] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 377.677808][T11155] device syzkaller0 entered promiscuous mode [ 378.326552][T11181] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 379.419816][T11198] device syzkaller0 entered promiscuous mode [ 380.849035][T11242] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 386.131528][T11308] device syzkaller0 entered promiscuous mode [ 386.451065][T11341] device wg2 entered promiscuous mode [ 386.533088][T11354] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 387.639330][T11377] syz-executor.0[11377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 387.639405][T11377] syz-executor.0[11377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 387.653908][T11377] syz-executor.0[11377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 387.666030][T11377] syz-executor.0[11377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 387.733793][ T28] audit: type=1400 audit(1718098763.460:137): avc: denied { write } for pid=11381 comm="syz-executor.1" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 388.765959][T11419] device syzkaller0 entered promiscuous mode [ 388.793256][T11418] device wg2 entered promiscuous mode [ 390.428391][T11441] device syzkaller0 entered promiscuous mode [ 390.777604][T11450] device wg2 entered promiscuous mode [ 393.769790][T11489] device wg2 entered promiscuous mode [ 395.504740][T11528] device wg2 left promiscuous mode [ 396.119729][T11533] device wg2 entered promiscuous mode [ 397.119277][T11589] device veth0_vlan left promiscuous mode [ 397.129392][T11589] device veth0_vlan entered promiscuous mode [ 397.164116][T11585] device wg2 left promiscuous mode [ 397.198663][T11596] device wg2 entered promiscuous mode [ 397.395232][T11603] device macsec0 entered promiscuous mode [ 397.652757][T11628] device veth0_vlan left promiscuous mode [ 397.725758][T11628] device veth0_vlan entered promiscuous mode [ 397.788674][ T28] audit: type=1400 audit(1718098773.510:138): avc: denied { create } for pid=11622 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 397.892683][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 397.901098][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 397.953771][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 398.479121][T11658] device macsec0 entered promiscuous mode [ 398.565590][T11660] device syzkaller0 entered promiscuous mode [ 399.300249][T11702] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 399.756958][ T28] audit: type=1400 audit(1718098775.440:139): avc: denied { setopt } for pid=11718 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 400.247418][T11739] device syzkaller0 entered promiscuous mode [ 400.460997][T11761] syz-executor.3[11761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.461085][T11761] syz-executor.3[11761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.295639][T11844] device wg2 left promiscuous mode [ 402.474826][T11852] device wg2 entered promiscuous mode [ 402.889452][T11885] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 402.948987][T11888] device syzkaller0 entered promiscuous mode [ 403.565803][T11921] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 403.901210][T11926] device sit0 entered promiscuous mode [ 405.480628][T12004] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 406.222776][T12036] device sit0 left promiscuous mode [ 406.485709][T12036] device sit0 entered promiscuous mode [ 408.384104][T12103] device wg2 left promiscuous mode [ 408.392556][T12103] device wg2 entered promiscuous mode [ 409.533299][T12155] device syzkaller0 entered promiscuous mode [ 410.026411][ T28] audit: type=1400 audit(1718098785.750:140): avc: denied { tracepoint } for pid=12176 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 412.910679][T12315] device syzkaller0 entered promiscuous mode [ 413.965635][T12352] device syzkaller0 entered promiscuous mode [ 414.027572][T12356] device sit0 left promiscuous mode [ 414.126501][T12360] device veth0_vlan left promiscuous mode [ 414.229877][T12360] device veth0_vlan entered promiscuous mode [ 414.236740][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 414.263869][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 414.357769][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 414.495690][T12356] device sit0 entered promiscuous mode [ 417.127174][T12505] device syzkaller0 entered promiscuous mode [ 417.725901][T12570] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 417.745632][T12577] device veth1_macvtap left promiscuous mode [ 417.765639][T12577] device macsec0 left promiscuous mode [ 417.896039][T12577] device veth1_macvtap entered promiscuous mode [ 417.983662][T12577] device macsec0 entered promiscuous mode [ 422.319288][T12746] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 423.711686][T12787] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 424.336708][T12800] device syzkaller0 entered promiscuous mode [ 428.373184][T12837] device sit0 left promiscuous mode [ 428.564791][T12837] device sit0 entered promiscuous mode [ 432.317665][T12872] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 433.157592][T12894] device sit0 left promiscuous mode [ 436.070150][T12910] device sit0 entered promiscuous mode [ 438.312811][T12946] device syzkaller0 entered promiscuous mode [ 439.266137][T12978] device syzkaller0 entered promiscuous mode [ 439.786379][T13003] device sit0 left promiscuous mode [ 440.214410][T13003] device sit0 entered promiscuous mode [ 440.808028][T13024] device syzkaller0 entered promiscuous mode [ 442.127820][T13058] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.204266][T13058] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.272731][T13058] device bridge_slave_0 entered promiscuous mode [ 442.428955][ T8] device bridge_slave_1 left promiscuous mode [ 442.434936][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.497155][ T8] device bridge_slave_0 left promiscuous mode [ 442.507186][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.525069][ T8] device veth1_macvtap left promiscuous mode [ 442.921103][T13058] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.927982][T13058] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.952106][T13058] device bridge_slave_1 entered promiscuous mode [ 442.954220][T13088] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 443.053746][T13072] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.060717][T13072] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.067739][T13072] device bridge_slave_0 entered promiscuous mode [ 443.075779][T13072] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.082687][T13072] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.090078][T13072] device bridge_slave_1 entered promiscuous mode [ 443.170803][T13072] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.177683][T13072] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.184785][T13072] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.191564][T13072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.209692][ T4055] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.216871][ T4055] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.225953][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 443.235906][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 443.274518][T13096] device syzkaller0 entered promiscuous mode [ 443.302045][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 443.358756][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 443.412835][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.419725][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.483805][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 443.525475][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 443.581463][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.588431][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.674652][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 443.726519][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 443.784945][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 443.814936][T13058] device veth0_vlan entered promiscuous mode [ 443.931727][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 444.029726][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 444.037604][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 444.152134][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 444.159529][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 444.177617][T13058] device veth1_macvtap entered promiscuous mode [ 444.190748][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 444.199742][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 444.207827][ T4055] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.214701][ T4055] bridge0: port 1(bridge_slave_0) entered forwarding state [ 444.225507][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 444.302746][ T4055] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.309745][ T4055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 444.427439][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 444.436900][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 444.445241][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 444.453582][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 444.461666][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 444.469841][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 444.478594][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 444.486948][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 444.509444][T13072] device veth0_vlan entered promiscuous mode [ 444.522407][T13072] device veth1_macvtap entered promiscuous mode [ 444.544083][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 444.552403][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 444.565132][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 444.573032][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 444.581877][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 444.590093][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 444.598153][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 444.605986][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 444.614172][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 444.622424][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 444.630554][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 444.666333][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 444.673753][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 445.162212][ T8] device bridge_slave_1 left promiscuous mode [ 445.168182][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.303018][ T8] device bridge_slave_0 left promiscuous mode [ 445.421239][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.489291][ T8] device veth1_macvtap left promiscuous mode [ 445.927928][T13168] device sit0 left promiscuous mode [ 446.043855][T13168] device sit0 entered promiscuous mode [ 446.273334][T13188] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 446.930004][T13196] device syzkaller0 entered promiscuous mode [ 447.561883][T13227] device sit0 entered promiscuous mode [ 448.201237][T13246] tap0: tun_chr_ioctl cmd 35108 [ 448.360526][T13255] device syzkaller0 entered promiscuous mode [ 448.867432][T13281] tap0: tun_chr_ioctl cmd 35108 [ 448.980059][T13291] device syzkaller0 entered promiscuous mode [ 449.484187][T13307] device syzkaller0 entered promiscuous mode [ 449.759567][T13326] tap0: tun_chr_ioctl cmd 35108 [ 450.305533][T13359] tap0: tun_chr_ioctl cmd 35108 [ 455.115284][T13407] sock: sock_set_timeout: `syz-executor.0' (pid 13407) tries to set negative timeout [ 458.444712][T13489] device sit0 left promiscuous mode [ 458.520906][T13489] device sit0 entered promiscuous mode [ 462.271225][T13541] device sit0 left promiscuous mode [ 464.078163][T13550] device sit0 entered promiscuous mode [ 466.156550][T13568] device pim6reg1 entered promiscuous mode [ 470.126218][T13617] device pim6reg1 entered promiscuous mode [ 473.738097][T13768] device pim6reg1 entered promiscuous mode [ 474.772329][T13799] device veth0_vlan left promiscuous mode [ 475.174019][T13799] device veth0_vlan entered promiscuous mode [ 475.949930][T13858] syz_tun: tun_net_xmit 86 [ 476.256356][T13867] device veth0_vlan left promiscuous mode [ 476.329782][T13867] device veth0_vlan entered promiscuous mode [ 476.336775][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 476.362631][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 476.543037][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 476.844439][T13893] syz_tun: tun_net_xmit 86 [ 476.979271][ C0] syz_tun: tun_net_xmit 86 [ 477.129065][T13904] device wg2 left promiscuous mode [ 477.858901][ C0] syz_tun: tun_net_xmit 86 [ 478.018890][ C0] syz_tun: tun_net_xmit 86 [ 478.898905][ C0] syz_tun: tun_net_xmit 86 [ 489.141716][T14039] device pim6reg1 entered promiscuous mode [ 489.454162][T14059] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 489.702795][T14090] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 490.346125][T14129] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 490.426025][T14132] device veth0_vlan left promiscuous mode [ 490.432379][T14132] device veth0_vlan entered promiscuous mode [ 490.440323][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 490.527886][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 490.616026][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 491.487040][T14171] device veth0_vlan left promiscuous mode [ 491.556785][T14171] device veth0_vlan entered promiscuous mode [ 491.634020][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 491.643054][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 491.660577][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 491.674932][T14179] device veth1_macvtap left promiscuous mode [ 491.680887][T14179] device macsec0 left promiscuous mode [ 491.689401][T14180] device veth1_macvtap entered promiscuous mode [ 491.695568][T14180] device macsec0 entered promiscuous mode [ 491.749133][T14183] bridge0: port 1(bridge_slave_0) entered blocking state [ 491.756107][T14183] bridge0: port 1(bridge_slave_0) entered disabled state [ 491.763853][T14183] device bridge_slave_0 entered promiscuous mode [ 491.770978][T14183] bridge0: port 2(bridge_slave_1) entered blocking state [ 491.777826][T14183] bridge0: port 2(bridge_slave_1) entered disabled state [ 491.786065][T14183] device bridge_slave_1 entered promiscuous mode [ 491.971167][ T811] device bridge_slave_1 left promiscuous mode [ 491.977170][ T811] bridge0: port 2(bridge_slave_1) entered disabled state [ 492.090338][ T811] device bridge_slave_0 left promiscuous mode [ 492.096312][ T811] bridge0: port 1(bridge_slave_0) entered disabled state [ 492.249352][ T811] device veth1_macvtap left promiscuous mode [ 492.269190][ T811] device veth0_vlan left promiscuous mode [ 492.815562][T14183] bridge0: port 2(bridge_slave_1) entered blocking state [ 492.822476][T14183] bridge0: port 2(bridge_slave_1) entered forwarding state [ 492.829571][T14183] bridge0: port 1(bridge_slave_0) entered blocking state [ 492.836320][T14183] bridge0: port 1(bridge_slave_0) entered forwarding state [ 492.846419][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 492.861251][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 493.039698][ T28] audit: type=1400 audit(1718098868.760:141): avc: denied { ioctl } for pid=14237 comm="syz-executor.3" path="socket:[58656]" dev="sockfs" ino=58656 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 493.133140][T14219] device veth0_vlan left promiscuous mode [ 493.140962][T14242] EXT4-fs warning (device sda1): verify_group_input:180: Cannot read last block (2147745790) [ 493.157863][T14219] device veth0_vlan entered promiscuous mode [ 493.170896][T14231] device veth1_macvtap left promiscuous mode [ 493.176735][T14231] device macsec0 left promiscuous mode [ 493.184070][T14232] device veth1_macvtap entered promiscuous mode [ 493.192665][T14232] device macsec0 entered promiscuous mode [ 493.220650][T10672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 493.228359][T10672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 493.245744][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 493.255079][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 493.263808][ T8875] bridge0: port 1(bridge_slave_0) entered blocking state [ 493.270708][ T8875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 493.279157][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 493.287600][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 493.296040][ T8875] bridge0: port 2(bridge_slave_1) entered blocking state [ 493.302930][ T8875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 493.319155][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 493.327406][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 493.335538][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 493.343781][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 493.385709][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 493.403927][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 493.416977][T14183] device veth0_vlan entered promiscuous mode [ 493.434136][T10672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 493.446472][T10672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 493.462380][T14183] device veth1_macvtap entered promiscuous mode [ 493.477820][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 493.488257][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 493.495778][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 493.504500][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 493.512913][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 493.551578][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 493.580896][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 493.636369][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 493.703233][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 494.295261][T14333] syz-executor.4[14333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 494.295341][T14333] syz-executor.4[14333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 494.918971][T14394] device sit0 entered promiscuous mode [ 495.102250][T14417] device pim6reg1 entered promiscuous mode [ 495.174558][T14430] device sit0 left promiscuous mode [ 495.219587][T14430] device sit0 entered promiscuous mode [ 495.285884][ T28] audit: type=1400 audit(1718098871.010:142): avc: denied { setattr } for pid=14443 comm="syz-executor.2" path="/dev/net/tun" dev="devtmpfs" ino=136 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 495.364002][T14453] device pim6reg1 entered promiscuous mode [ 495.512702][T14477] device sit0 left promiscuous mode [ 495.579963][T14480] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 495.609282][T14477] device sit0 entered promiscuous mode [ 495.885575][T14489] bridge0: port 3(team_slave_1) entered blocking state [ 495.899497][T14489] bridge0: port 3(team_slave_1) entered disabled state [ 496.032376][T14489] device team_slave_1 entered promiscuous mode [ 496.436245][T14512] tap0: tun_chr_ioctl cmd 2147767520 [ 497.320269][T14537] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 497.397591][T14545] device veth1_macvtap left promiscuous mode [ 497.413370][T14545] device macsec0 left promiscuous mode [ 497.467355][T14545] device veth1_macvtap entered promiscuous mode [ 497.498672][T14545] device macsec0 entered promiscuous mode [ 497.994394][T14570] device syzkaller0 entered promiscuous mode [ 498.040503][T14574] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 498.131681][T14583] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 498.142071][T14584] device veth1_macvtap left promiscuous mode [ 498.208935][T14584] device macsec0 left promiscuous mode [ 498.354595][T14586] device veth1_macvtap entered promiscuous mode [ 498.369701][T14586] device macsec0 entered promiscuous mode [ 498.377398][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 498.759716][T14608] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 499.613892][T14641] bridge0: port 3(veth1_macvtap) entered blocking state [ 499.681835][T14641] bridge0: port 3(veth1_macvtap) entered disabled state [ 499.837060][T14648] device syzkaller0 entered promiscuous mode [ 500.072136][T14679] device pim6reg1 entered promiscuous mode [ 500.342912][T14686] device syzkaller0 entered promiscuous mode [ 500.858470][T14688] bridge0: port 1(bridge_slave_0) entered blocking state [ 500.865451][T14688] bridge0: port 1(bridge_slave_0) entered disabled state [ 500.879337][T14688] device bridge_slave_0 entered promiscuous mode [ 500.893028][T14688] bridge0: port 2(bridge_slave_1) entered blocking state [ 500.906526][T14688] bridge0: port 2(bridge_slave_1) entered disabled state [ 500.922001][T14688] device bridge_slave_1 entered promiscuous mode [ 501.058179][T14714] device pim6reg1 entered promiscuous mode [ 501.180651][T14688] bridge0: port 2(bridge_slave_1) entered blocking state [ 501.187520][T14688] bridge0: port 2(bridge_slave_1) entered forwarding state [ 501.194665][T14688] bridge0: port 1(bridge_slave_0) entered blocking state [ 501.201687][T14688] bridge0: port 1(bridge_slave_0) entered forwarding state [ 501.345815][ T8] device bridge_slave_1 left promiscuous mode [ 501.351929][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 501.440884][ T8] device bridge_slave_0 left promiscuous mode [ 501.446856][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 501.559931][ T8] device veth1_macvtap left promiscuous mode [ 501.619849][ T8] device veth0_vlan left promiscuous mode [ 502.071397][ T28] audit: type=1400 audit(1718098877.800:143): avc: denied { create } for pid=14772 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 502.143151][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 502.150573][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 502.238253][T14785] device syzkaller0 entered promiscuous mode [ 502.284436][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 502.296667][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 502.336002][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 502.349501][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 502.363045][ T8875] bridge0: port 1(bridge_slave_0) entered blocking state [ 502.369943][ T8875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 502.401306][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 502.421853][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 502.444267][ T8875] bridge0: port 2(bridge_slave_1) entered blocking state [ 502.451182][ T8875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 502.481789][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 502.498544][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 502.516259][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 502.534198][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 502.558898][T14804] tap0: tun_chr_ioctl cmd 2147767520 [ 502.572621][T10672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 502.585430][T10672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 502.612871][T14688] device veth0_vlan entered promiscuous mode [ 502.634962][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 502.653589][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 502.699641][T14688] device veth1_macvtap entered promiscuous mode [ 502.720362][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 502.731815][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 502.843014][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 502.877118][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 502.888615][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 502.921932][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 502.933260][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 502.951729][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 502.975665][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 503.046384][T14822] device pim6reg1 entered promiscuous mode [ 503.992333][T14874] syz-executor.3[14874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.992409][T14874] syz-executor.3[14874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.357245][T14905] tap0: tun_chr_ioctl cmd 2147767520 [ 504.484200][T14917] syz-executor.1[14917] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.484275][T14917] syz-executor.1[14917] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.872728][T14930] geneve1: tun_chr_ioctl cmd 1074025681 [ 505.725230][T14954] device syzkaller0 entered promiscuous mode [ 505.814221][T14971] geneve1: tun_chr_ioctl cmd 1074025681 [ 506.662787][T15008] device syzkaller0 entered promiscuous mode [ 506.873048][T15024] syz-executor.4[15024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 506.873126][T15024] syz-executor.4[15024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 507.379944][T15042] device syzkaller0 entered promiscuous mode [ 507.917872][T15070] geneve1: tun_chr_ioctl cmd 1074025681 [ 507.997686][T15072] syz-executor.0[15072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 507.997764][T15072] syz-executor.0[15072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 508.130579][T15078] syz-executor.0[15078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 508.236262][T15078] syz-executor.0[15078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.303611][T15120] syz-executor.1[15120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.389168][T15120] syz-executor.1[15120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.503598][T15120] syz-executor.1[15120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 511.068959][T15120] syz-executor.1[15120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 512.609509][T15182] syz-executor.1[15182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 512.710406][T15182] syz-executor.1[15182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 513.605483][T15226] syz-executor.4[15226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 513.713060][T15226] syz-executor.4[15226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 514.982802][T15256] device syzkaller0 entered promiscuous mode [ 516.340956][T15293] device syzkaller0 entered promiscuous mode [ 519.529680][T15356] device syzkaller0 entered promiscuous mode [ 519.864348][T15367] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 524.371636][T15442] device macsec0 entered promiscuous mode [ 529.159666][T15637] device pim6reg1 entered promiscuous mode [ 531.637884][T15729] device pim6reg1 entered promiscuous mode [ 532.146250][T15752] device sit0 left promiscuous mode [ 532.253018][T15752] device sit0 entered promiscuous mode [ 533.391027][T15818] device sit0 left promiscuous mode [ 533.644883][T15818] device sit0 entered promiscuous mode [ 537.692778][T16023] device pim6reg1 entered promiscuous mode [ 537.801414][T16035] device pim6reg1 entered promiscuous mode [ 538.704945][T16095] device veth1_macvtap left promiscuous mode [ 538.712942][T16095] device macsec0 left promiscuous mode [ 538.726483][T16094] device pim6reg1 entered promiscuous mode [ 538.745294][T16095] syz-executor.2[16095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 538.745391][T16095] syz-executor.2[16095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 539.046345][T16128] device pim6reg1 entered promiscuous mode [ 539.364363][T16147] ip6_tunnel: non-ECT from db5b:6861:58bb:cfc8:875a:6596:9ff5:7b00 with DS=0x31 [ 539.399890][T16145] device syzkaller0 entered promiscuous mode [ 539.735318][T16160] bridge0: port 2(bridge_slave_1) entered disabled state [ 539.742359][T16160] bridge0: port 1(bridge_slave_0) entered disabled state [ 539.997684][T16176] device veth1_macvtap left promiscuous mode [ 540.025442][T16176] syz-executor.1[16176] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 540.025535][T16176] syz-executor.1[16176] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 540.528142][T16194] device pim6reg1 entered promiscuous mode [ 541.243888][T16223] device syzkaller0 entered promiscuous mode [ 541.342902][T16223] ip6_tunnel: non-ECT from db5b:6861:58bb:cfc8:875a:6596:9ff5:7b00 with DS=0x31 [ 543.802769][ T416] device bridge_slave_1 left promiscuous mode [ 543.827672][ T416] bridge0: port 2(bridge_slave_1) entered disabled state [ 543.902119][ T416] bridge0: port 1(bridge_slave_0) entered disabled state [ 544.499884][T16331] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 544.612901][T16298] bridge0: port 1(bridge_slave_0) entered blocking state [ 544.619834][T16298] bridge0: port 1(bridge_slave_0) entered disabled state [ 544.627135][T16298] device bridge_slave_0 entered promiscuous mode [ 544.634084][T16298] bridge0: port 2(bridge_slave_1) entered blocking state [ 544.645395][T16298] bridge0: port 2(bridge_slave_1) entered disabled state [ 544.653105][T16298] device bridge_slave_1 entered promiscuous mode [ 544.684132][T16341] syz-executor.2[16341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 544.684225][T16341] syz-executor.2[16341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 544.985124][T16298] bridge0: port 2(bridge_slave_1) entered blocking state [ 545.003552][T16298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 545.010656][T16298] bridge0: port 1(bridge_slave_0) entered blocking state [ 545.017424][T16298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 545.169301][T16365] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 545.201797][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 545.221450][ T4055] bridge0: port 1(bridge_slave_0) entered disabled state [ 545.260569][ T4055] bridge0: port 2(bridge_slave_1) entered disabled state [ 545.301080][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 545.309261][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 545.316221][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 545.323576][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 545.332293][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 545.339197][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 545.361140][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 545.489709][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 545.522716][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 545.589783][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 545.683568][T16298] device veth0_vlan entered promiscuous mode [ 545.723435][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 545.724790][T16380] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 545.741884][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 545.787068][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 545.830519][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 545.915083][T16298] device veth1_macvtap entered promiscuous mode [ 546.006097][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 546.036947][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 546.154102][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 546.492976][T16393] bridge0: port 2(bridge_slave_1) entered disabled state [ 546.499955][T16393] bridge0: port 1(bridge_slave_0) entered disabled state [ 546.658018][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 546.749695][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 548.064235][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 548.075786][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 550.395988][T16437] bridge0: port 2(bridge_slave_1) entered disabled state [ 550.403021][T16437] bridge0: port 1(bridge_slave_0) entered disabled state [ 558.115695][T16508] device sit0 entered promiscuous mode [ 562.182559][T16562] device sit0 left promiscuous mode [ 562.318632][T16562] device sit0 entered promiscuous mode [ 563.120181][T16592] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 563.802479][T16637] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 564.207618][ T28] audit: type=1400 audit(1718098939.920:144): avc: denied { create } for pid=16655 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 565.685401][T16767] device syzkaller0 entered promiscuous mode [ 566.328329][T16802] device syzkaller0 entered promiscuous mode [ 567.558599][T16913] syz-executor.3[16913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 567.558662][T16913] syz-executor.3[16913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 567.960258][T16949] syz-executor.1[16949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 568.008915][T16949] syz-executor.1[16949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 568.669147][T16993] bridge0: port 3(veth1_macvtap) entered blocking state [ 568.779211][T16993] bridge0: port 3(veth1_macvtap) entered disabled state [ 571.136007][T17104] syz-executor.4[17104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 571.136079][T17104] syz-executor.4[17104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 571.215924][T17102] device syzkaller0 entered promiscuous mode [ 580.012201][T17439] device pim6reg1 entered promiscuous mode [ 580.909832][T17486] device pim6reg1 entered promiscuous mode [ 583.049174][T17553] device sit0 left promiscuous mode [ 583.264571][T17557] device sit0 entered promiscuous mode [ 583.454901][T17575] bridge0: port 2(bridge_slave_1) entered blocking state [ 583.461813][T17575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 583.468917][T17575] bridge0: port 1(bridge_slave_0) entered blocking state [ 583.475838][T17575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 583.483270][T17575] device bridge0 entered promiscuous mode [ 583.618405][T17584] bridge0: port 4(veth1_macvtap) entered blocking state [ 583.686237][T17584] bridge0: port 4(veth1_macvtap) entered disabled state [ 583.976081][T17596] device sit0 left promiscuous mode [ 584.132302][T17600] device sit0 entered promiscuous mode [ 584.292526][T17610] device bridge0 entered promiscuous mode [ 584.499664][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 584.886525][T17633] device pim6reg1 entered promiscuous mode [ 586.174784][T17691] bridge0: port 4(veth1_macvtap) entered blocking state [ 586.202618][T17691] bridge0: port 4(veth1_macvtap) entered disabled state [ 587.643642][T17760] device sit0 left promiscuous mode [ 587.823532][T17765] device sit0 entered promiscuous mode [ 587.891402][T17770] device syzkaller0 entered promiscuous mode [ 589.132836][T17856] device syzkaller0 entered promiscuous mode [ 590.623686][T17897] device sit0 left promiscuous mode [ 590.755282][T17900] device sit0 entered promiscuous mode [ 591.009907][T17910] device syzkaller0 entered promiscuous mode [ 591.021231][ T28] audit: type=1400 audit(1718098966.750:145): avc: denied { attach_queue } for pid=17904 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 592.697374][T17954] bridge0: port 1(bridge_slave_0) entered blocking state [ 592.704363][T17954] bridge0: port 1(bridge_slave_0) entered disabled state [ 592.711860][T17954] device bridge_slave_0 entered promiscuous mode [ 592.718727][T17954] bridge0: port 2(bridge_slave_1) entered blocking state [ 592.725705][T17954] bridge0: port 2(bridge_slave_1) entered disabled state [ 592.733076][T17954] device bridge_slave_1 entered promiscuous mode [ 592.966310][T17954] bridge0: port 2(bridge_slave_1) entered blocking state [ 592.973221][T17954] bridge0: port 2(bridge_slave_1) entered forwarding state [ 592.980317][T17954] bridge0: port 1(bridge_slave_0) entered blocking state [ 592.987070][T17954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 593.060150][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 593.078611][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 593.094618][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 593.130191][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 593.147089][T15433] bridge0: port 1(bridge_slave_0) entered blocking state [ 593.154007][T15433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 593.202716][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 593.214070][T15433] bridge0: port 2(bridge_slave_1) entered blocking state [ 593.220972][T15433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 593.247297][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 593.259922][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 593.270249][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 593.286256][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 593.303872][T17954] device veth0_vlan entered promiscuous mode [ 593.327847][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 593.338058][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 593.346488][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 593.354967][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 593.370764][T17954] device veth1_macvtap entered promiscuous mode [ 593.420332][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 593.438524][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 593.463685][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 593.474177][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 593.488975][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 593.518217][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 593.528677][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 593.580382][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 593.600590][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 593.633268][ T8] device veth1_macvtap left promiscuous mode [ 595.330976][ T8] device bridge_slave_1 left promiscuous mode [ 595.336999][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 595.344654][ T8] device bridge_slave_0 left promiscuous mode [ 595.350788][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.358858][ T8] device veth1_macvtap left promiscuous mode [ 595.364833][ T8] device veth0_vlan left promiscuous mode [ 595.612710][T18067] device syzkaller0 entered promiscuous mode [ 595.635691][T18046] bridge0: port 1(bridge_slave_0) entered blocking state [ 595.645028][T18046] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.652687][T18046] device bridge_slave_0 entered promiscuous mode [ 595.660168][T18046] bridge0: port 2(bridge_slave_1) entered blocking state [ 595.667302][T18046] bridge0: port 2(bridge_slave_1) entered disabled state [ 595.674994][T18046] device bridge_slave_1 entered promiscuous mode [ 596.532310][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 596.559270][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 596.604404][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 596.629009][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 596.643170][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.650064][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 596.658642][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 596.666980][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 596.675153][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 596.682017][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 596.690341][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 596.726107][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 596.734178][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 596.751138][T18046] device veth0_vlan entered promiscuous mode [ 596.758899][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 596.766887][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 596.775762][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 596.799213][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 596.807550][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 596.815433][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 596.824156][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 596.831524][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 596.841303][T18046] device veth1_macvtap entered promiscuous mode [ 596.848385][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 596.856565][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 596.864736][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 596.879579][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 596.887842][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 596.896397][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 596.906329][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 599.180537][T18239] device syzkaller0 entered promiscuous mode [ 600.728232][T18307] tun0: tun_chr_ioctl cmd 1074025692 [ 600.849982][T18311] device pim6reg1 entered promiscuous mode [ 601.656333][T18345] device pim6reg1 entered promiscuous mode [ 602.063228][T18366] tun0: tun_chr_ioctl cmd 1074025692 [ 602.233840][T18374] device veth0_vlan left promiscuous mode [ 602.271387][T18374] device veth0_vlan entered promiscuous mode [ 602.474782][T18388] device pim6reg1 entered promiscuous mode [ 604.667012][T18527] device syzkaller0 entered promiscuous mode [ 606.064340][T18579] device wg2 left promiscuous mode [ 606.156898][T18579] device wg2 entered promiscuous mode [ 607.473534][T18620] device syzkaller0 entered promiscuous mode [ 607.506320][T18624] device wg2 entered promiscuous mode [ 607.572008][T18630] device syzkaller0 entered promiscuous mode [ 607.598489][T18634] device veth0_vlan left promiscuous mode [ 607.604739][T18634] device veth0_vlan entered promiscuous mode [ 607.616890][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 607.626756][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 607.645609][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 607.758305][T18662] device veth0_vlan left promiscuous mode [ 607.769590][T18662] device veth0_vlan entered promiscuous mode [ 607.790301][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 607.808531][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 607.925188][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 607.981060][T18678] device syzkaller0 entered promiscuous mode [ 608.046316][T18688] device pim6reg1 entered promiscuous mode [ 608.581818][T18721] device wg2 left promiscuous mode [ 608.593965][T18724] device wg2 entered promiscuous mode [ 608.789277][T18727] device pim6reg1 entered promiscuous mode [ 609.768723][T18788] device syzkaller0 entered promiscuous mode [ 610.310330][T18828] Q6\bY4: renamed from lo [ 611.562722][T18899] device wg2 left promiscuous mode [ 611.690759][T18900] device wg2 entered promiscuous mode [ 612.894088][T18974] device wg2 entered promiscuous mode [ 613.712552][T19002] device wg2 entered promiscuous mode [ 614.208132][T19027] device pim6reg1 entered promiscuous mode [ 614.330809][T19029] syz-executor.2[19029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 614.330885][T19029] syz-executor.2[19029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 616.552773][T19117] device syzkaller0 entered promiscuous mode [ 616.583635][T19119] Q6\bY4: renamed from lo [ 617.761985][T19189] Q6\bY4: renamed from lo [ 619.251110][T19252] device syzkaller0 entered promiscuous mode [ 620.248529][T19297] syz-executor.2[19297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 620.248614][T19297] syz-executor.2[19297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 620.358850][T19304] syz-executor.2[19304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 620.392175][T19304] syz-executor.2[19304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 621.880347][T19378] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 622.339612][T19396] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 622.466470][T19401] device pim6reg1 entered promiscuous mode [ 622.798404][T19421] device syzkaller0 entered promiscuous mode [ 623.802451][T19472] device syzkaller0 entered promiscuous mode [ 624.363391][T19504] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 624.454279][T19508] device pim6reg1 entered promiscuous mode [ 625.006721][T19534] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 625.022847][T19544] device pim6reg1 entered promiscuous mode [ 625.326954][T19583] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 625.688007][T19617] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 625.929796][T19662] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 626.290200][T19694] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 626.304609][T19690] device syzkaller0 entered promiscuous mode [ 626.417977][T19698] device pim6reg1 entered promiscuous mode [ 626.545457][T19715] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 627.276485][T19757] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 627.346838][T19752] device syzkaller0 entered promiscuous mode [ 627.353348][T19755] device pim6reg1 entered promiscuous mode [ 627.373492][T19762] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 627.434794][T19766] device pim6reg1 entered promiscuous mode [ 627.847868][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 627.862088][T19791] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 627.890580][T19798] device syzkaller0 entered promiscuous mode [ 627.952073][T19812] syz-executor.4[19812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 627.952144][T19812] syz-executor.4[19812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.340428][T19840] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 628.513902][T19850] syz-executor.2[19850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.513975][T19850] syz-executor.2[19850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.932286][T19881] syz-executor.1[19881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.000331][T19888] syz-executor.0[19888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.029089][T19881] syz-executor.1[19881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.140608][T19888] syz-executor.0[19888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.514125][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 629.785788][T19921] device veth0_vlan left promiscuous mode [ 629.845291][T19921] device veth0_vlan entered promiscuous mode [ 629.924008][T19932] syz-executor.2[19932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.924085][T19932] syz-executor.2[19932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.943363][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 629.966531][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 629.978973][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 630.353871][T19936] device pim6reg1 entered promiscuous mode [ 630.437205][T19942] bridge0: port 1(bridge_slave_0) entered blocking state [ 630.445711][T19942] bridge0: port 1(bridge_slave_0) entered disabled state [ 630.456799][T19942] device bridge_slave_0 entered promiscuous mode [ 630.466051][T19942] bridge0: port 2(bridge_slave_1) entered blocking state [ 630.473045][T19942] bridge0: port 2(bridge_slave_1) entered disabled state [ 630.481073][T19942] device bridge_slave_1 entered promiscuous mode [ 630.549813][T19942] bridge0: port 2(bridge_slave_1) entered blocking state [ 630.556676][T19942] bridge0: port 2(bridge_slave_1) entered forwarding state [ 630.563799][T19942] bridge0: port 1(bridge_slave_0) entered blocking state [ 630.570584][T19942] bridge0: port 1(bridge_slave_0) entered forwarding state [ 630.671128][ T4055] bridge0: port 1(bridge_slave_0) entered disabled state [ 630.712510][ T4055] bridge0: port 2(bridge_slave_1) entered disabled state [ 630.733439][T19974] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 630.774726][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 630.803766][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 630.858709][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 630.906804][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 630.925062][ T4055] bridge0: port 1(bridge_slave_0) entered blocking state [ 630.931951][ T4055] bridge0: port 1(bridge_slave_0) entered forwarding state [ 630.955153][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 630.971543][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 630.987245][ T4055] bridge0: port 2(bridge_slave_1) entered blocking state [ 630.994238][ T4055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 631.016570][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 631.032017][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 631.148477][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 631.157214][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 631.165986][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 631.174561][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 631.196272][T19942] device veth0_vlan entered promiscuous mode [ 631.206129][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 631.218292][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 631.248468][T19942] device veth1_macvtap entered promiscuous mode [ 631.259415][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 631.271193][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 631.284336][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 631.295533][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 631.313780][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 631.389842][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 631.397998][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 631.431292][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 631.459179][ T4055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 631.817023][ T359] device bridge_slave_1 left promiscuous mode [ 631.829685][ T359] bridge0: port 2(bridge_slave_1) entered disabled state [ 631.867490][ T359] bridge0: port 1(bridge_slave_0) entered disabled state [ 631.938705][ T359] device veth1_macvtap left promiscuous mode [ 631.958905][ T359] device veth0_vlan left promiscuous mode [ 632.428976][T20013] bridge0: port 1(bridge_slave_0) entered blocking state [ 632.443059][T20013] bridge0: port 1(bridge_slave_0) entered disabled state [ 632.457065][T20013] device bridge_slave_0 entered promiscuous mode [ 632.477544][T20013] bridge0: port 2(bridge_slave_1) entered blocking state [ 632.491068][T20013] bridge0: port 2(bridge_slave_1) entered disabled state [ 632.526080][T20013] device bridge_slave_1 entered promiscuous mode [ 633.210619][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 633.229174][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 633.282134][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 633.296996][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 633.319711][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.326691][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 633.389446][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 633.397743][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 633.405793][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 633.412657][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 633.419890][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 633.427750][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 633.491076][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 633.503544][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 633.572898][T20069] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 633.596104][T20013] device veth0_vlan entered promiscuous mode [ 633.627672][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 633.636986][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 633.644385][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 633.684124][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 633.718196][T20013] device veth1_macvtap entered promiscuous mode [ 633.743194][ T359] device bridge_slave_1 left promiscuous mode [ 633.753568][ T359] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.763723][ T359] device bridge_slave_0 left promiscuous mode [ 633.787391][ T359] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.806313][ T359] device veth1_macvtap left promiscuous mode [ 633.812544][ T359] device veth0_vlan left promiscuous mode [ 634.358893][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 634.367369][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 634.386861][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 634.416160][T20091] device sit0 entered promiscuous mode [ 634.562940][T20100] syz-executor.1[20100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 634.563013][T20100] syz-executor.1[20100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 634.783134][T20106] device veth0_vlan left promiscuous mode [ 634.800755][T20106] device veth0_vlan entered promiscuous mode [ 635.915547][T20165] syz-executor.0[20165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.915624][T20165] syz-executor.0[20165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 636.050431][T20174] syz-executor.3[20174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 636.062339][T20174] syz-executor.3[20174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 636.100566][T20174] bridge0: port 3(veth1_macvtap) entered blocking state [ 636.124100][T20174] bridge0: port 3(veth1_macvtap) entered disabled state [ 637.295052][T20222] syz-executor.1[20222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.295127][T20222] syz-executor.1[20222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.386791][T20227] syz-executor.0[20227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.404039][T20227] syz-executor.0[20227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.473623][T20227] bridge0: port 3(veth1_macvtap) entered blocking state [ 637.495907][T20227] bridge0: port 3(veth1_macvtap) entered disabled state [ 637.516665][T20236] device pim6reg1 entered promiscuous mode [ 637.819692][T20267] device veth0_vlan left promiscuous mode [ 637.841022][T20267] device veth0_vlan entered promiscuous mode [ 637.979626][T20271] bridge0: port 3(veth1_macvtap) entered blocking state [ 637.994778][T20271] bridge0: port 3(veth1_macvtap) entered disabled state [ 639.125049][T20310] device pim6reg1 entered promiscuous mode [ 639.234502][T20312] device pim6reg1 entered promiscuous mode [ 639.284795][T20316] bridge0: port 3(veth1_macvtap) entered blocking state [ 639.291810][T20316] bridge0: port 3(veth1_macvtap) entered disabled state [ 639.707073][T20353] bpf_get_probe_write_proto: 6 callbacks suppressed [ 639.707095][T20353] syz-executor.1[20353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 639.750736][T20353] syz-executor.1[20353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 639.783683][T20352] tap0: tun_chr_ioctl cmd 1074025675 [ 639.815153][T20352] tap0: persist enabled [ 639.822666][T20352] tap0: tun_chr_ioctl cmd 1074025675 [ 639.838896][T20352] tap0: persist enabled [ 639.922531][T20356] device syzkaller0 entered promiscuous mode [ 640.422558][T20386] tap1: tun_chr_ioctl cmd 1074025677 [ 640.427730][T20386] tap1: linktype set to 769 [ 641.354782][T20422] syz-executor.1[20422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 641.354855][T20422] syz-executor.1[20422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 641.377129][T20423] tap0: tun_chr_ioctl cmd 1074025677 [ 641.438532][T20423] tap0: linktype set to 769 [ 641.508296][T20430] bridge0: port 3(veth1_macvtap) entered blocking state [ 641.515764][T20430] bridge0: port 3(veth1_macvtap) entered disabled state [ 641.661109][T20446] syz-executor.2[20446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 641.661183][T20446] syz-executor.2[20446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 641.679713][T20446] syz-executor.2[20446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 641.694033][T20448] device sit0 left promiscuous mode [ 641.711252][T20446] syz-executor.2[20446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 641.791006][T20450] device sit0 entered promiscuous mode [ 642.022403][T20461] syz-executor.3[20461] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.022474][T20461] syz-executor.3[20461] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.459444][T20475] tap0: tun_chr_ioctl cmd 1074025677 [ 642.542266][T20475] tap0: linktype set to 769 [ 644.135696][T20542] bridge0: port 2(bridge_slave_1) entered disabled state [ 644.142730][T20542] bridge0: port 1(bridge_slave_0) entered disabled state [ 644.285058][T20542] bridge0: port 2(bridge_slave_1) entered blocking state [ 644.291956][T20542] bridge0: port 2(bridge_slave_1) entered forwarding state [ 644.299057][T20542] bridge0: port 1(bridge_slave_0) entered blocking state [ 644.305806][T20542] bridge0: port 1(bridge_slave_0) entered forwarding state [ 644.450627][T20542] device bridge0 entered promiscuous mode [ 644.545340][T20559] device pim6reg1 entered promiscuous mode [ 644.840078][T20583] bridge0: port 2(bridge_slave_1) entered disabled state [ 644.846974][T20583] bridge0: port 1(bridge_slave_0) entered disabled state [ 644.853908][T20583] device bridge0 left promiscuous mode [ 644.877347][T20583] bridge0: port 2(bridge_slave_1) entered blocking state [ 644.884313][T20583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 644.891351][T20583] bridge0: port 1(bridge_slave_0) entered blocking state [ 644.898186][T20583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 644.905698][T20583] device bridge0 entered promiscuous mode [ 644.916335][T20577] bridge0: port 1(bridge_slave_0) entered blocking state [ 644.923457][T20577] bridge0: port 1(bridge_slave_0) entered disabled state [ 644.930640][T20577] device bridge_slave_0 entered promiscuous mode [ 644.937363][T20577] bridge0: port 2(bridge_slave_1) entered blocking state [ 644.944308][T20577] bridge0: port 2(bridge_slave_1) entered disabled state [ 644.951559][T20577] device bridge_slave_1 entered promiscuous mode [ 644.963458][T20578] device veth0_vlan left promiscuous mode [ 644.997588][T20578] device veth0_vlan entered promiscuous mode [ 645.089284][T20590] geneve1: tun_chr_ioctl cmd 2148553947 [ 645.324336][T20577] bridge0: port 2(bridge_slave_1) entered blocking state [ 645.331231][T20577] bridge0: port 2(bridge_slave_1) entered forwarding state [ 645.338312][T20577] bridge0: port 1(bridge_slave_0) entered blocking state [ 645.345110][T20577] bridge0: port 1(bridge_slave_0) entered forwarding state [ 645.365190][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 645.372708][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 645.380194][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 645.390793][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 645.398971][T15433] bridge0: port 1(bridge_slave_0) entered blocking state [ 645.405821][T15433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 645.415024][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 645.432579][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 645.439573][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 645.441529][T20607] bpf_get_probe_write_proto: 10 callbacks suppressed [ 645.441546][T20607] syz-executor.3[20607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 645.453869][T20607] syz-executor.3[20607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 645.477422][T20607] syz-executor.3[20607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 645.498955][T20607] syz-executor.3[20607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 645.575062][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 645.606247][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 646.080641][T20608] device syzkaller0 entered promiscuous mode [ 646.155011][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 646.196622][T20577] device veth0_vlan entered promiscuous mode [ 646.211829][T20625] device veth1_macvtap left promiscuous mode [ 646.217732][T20625] device macsec0 left promiscuous mode [ 646.283340][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 646.293304][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 646.371765][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 646.416636][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 646.442559][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 646.462921][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 646.472909][ T416] device bridge_slave_1 left promiscuous mode [ 646.481189][ T416] bridge0: port 2(bridge_slave_1) entered disabled state [ 646.488546][ T416] device bridge_slave_0 left promiscuous mode [ 646.494689][ T416] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.502548][ T416] device veth1_macvtap left promiscuous mode [ 646.508420][ T416] device veth0_vlan left promiscuous mode [ 646.820714][T20577] device veth1_macvtap entered promiscuous mode [ 646.844713][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 646.852204][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 646.860459][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 646.872402][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 646.902145][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 647.943697][T20679] device veth1_macvtap left promiscuous mode [ 648.209418][ T28] audit: type=1400 audit(1718099023.910:146): avc: denied { create } for pid=20682 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 648.270800][T20689] syz-executor.0[20689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 648.270872][T20689] syz-executor.0[20689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 648.285560][T20691] geneve1: tun_chr_ioctl cmd 2148553947 [ 648.521900][T20708] device syzkaller0 entered promiscuous mode [ 648.572798][T20711] bridge0: port 2(bridge_slave_1) entered disabled state [ 648.580433][T20711] bridge0: port 1(bridge_slave_0) entered disabled state [ 648.675925][T20712] bridge0: port 2(bridge_slave_1) entered blocking state [ 648.682830][T20712] bridge0: port 2(bridge_slave_1) entered forwarding state [ 648.689946][T20712] bridge0: port 1(bridge_slave_0) entered blocking state [ 648.696793][T20712] bridge0: port 1(bridge_slave_0) entered forwarding state [ 648.719627][T20712] device bridge0 entered promiscuous mode [ 648.970098][T20728] syz-executor.4[20728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 648.970171][T20728] syz-executor.4[20728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 649.295487][T20762] syz-executor.4[20762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 649.361810][T20762] syz-executor.4[20762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 649.607894][T20773] device veth0_vlan left promiscuous mode [ 649.663279][T20773] device veth0_vlan entered promiscuous mode [ 649.716487][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 649.730131][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 649.741330][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 651.041687][T20814] device veth0_vlan left promiscuous mode [ 651.154359][T20814] device veth0_vlan entered promiscuous mode [ 652.972422][T20890] device team_slave_1 left promiscuous mode [ 652.980433][T20890] bridge0: port 3(team_slave_1) entered disabled state [ 653.344785][T20905] device veth0_vlan left promiscuous mode [ 653.375385][T20905] device veth0_vlan entered promiscuous mode [ 654.153256][T20933] device veth0_vlan left promiscuous mode [ 654.169710][T20933] device veth0_vlan entered promiscuous mode [ 654.178264][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 654.187074][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 654.199325][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 654.706422][T20974] device syzkaller0 entered promiscuous mode [ 654.846732][T20980] device veth0_vlan left promiscuous mode [ 654.910360][T20980] device veth0_vlan entered promiscuous mode [ 654.998551][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 655.006864][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 655.014519][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 655.860196][T21023] device veth0_vlan left promiscuous mode [ 655.890335][T21023] device veth0_vlan entered promiscuous mode [ 656.159869][T21041] device wg2 left promiscuous mode [ 656.669137][T21063] device sit0 entered promiscuous mode [ 658.682906][T21165] device syzkaller0 entered promiscuous mode [ 658.689289][T21169] device veth0_vlan left promiscuous mode [ 658.708644][T21169] device veth0_vlan entered promiscuous mode [ 659.842208][T21225] syz-executor.0[21225] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 659.842280][T21225] syz-executor.0[21225] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 660.782875][T21263] syz-executor.2[21263] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 660.817883][T21263] syz-executor.2[21263] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 661.657746][T21298] device syzkaller0 entered promiscuous mode [ 661.699529][T21308] syz-executor.2[21308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 661.699606][T21308] syz-executor.2[21308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 662.791482][T21355] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 663.990825][T21396] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 664.853531][T21430] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 665.244533][T21464] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 665.579791][T21496] device pim6reg1 entered promiscuous mode [ 665.604581][T21500] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 665.885045][T21511] bridge0: port 2(bridge_slave_1) entered disabled state [ 665.892958][T21511] bridge0: port 1(bridge_slave_0) entered disabled state [ 665.914940][T21511] device bridge0 left promiscuous mode [ 665.937906][T21519] device bridge_slave_1 left promiscuous mode [ 665.944015][T21519] bridge0: port 2(bridge_slave_1) entered disabled state [ 665.955091][T21519] device bridge_slave_0 left promiscuous mode [ 665.961198][T21519] bridge0: port 1(bridge_slave_0) entered disabled state [ 667.073851][T21571] syz-executor.2[21571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 667.073929][T21571] syz-executor.2[21571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 667.354696][T21592] device pim6reg1 entered promiscuous mode [ 667.409353][T21603] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 667.548120][T21613] bridge0: port 2(bridge_slave_1) entered disabled state [ 667.556111][T21613] bridge0: port 1(bridge_slave_0) entered disabled state [ 667.617799][T21627] device bridge_slave_1 left promiscuous mode [ 667.623941][T21627] bridge0: port 2(bridge_slave_1) entered disabled state [ 667.640072][T21627] device bridge_slave_0 left promiscuous mode [ 667.646086][T21627] bridge0: port 1(bridge_slave_0) entered disabled state [ 667.708110][T21635] device pim6reg1 entered promiscuous mode [ 667.719637][T21637] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 667.870479][T21669] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 667.884034][T21671] device pim6reg1 entered promiscuous mode [ 667.960519][T21677] bridge0: port 2(bridge_slave_1) entered disabled state [ 667.967915][T21677] bridge0: port 1(bridge_slave_0) entered disabled state [ 667.992227][T21677] device bridge_slave_1 left promiscuous mode [ 667.998788][T21677] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.019615][T21677] device bridge_slave_0 left promiscuous mode [ 668.031209][T21677] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.335452][T21704] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 672.858346][T21887] device syzkaller0 entered promiscuous mode [ 674.758885][T21933] device syzkaller0 entered promiscuous mode [ 674.814348][T21955] syz-executor.3 (21955) used obsolete PPPIOCDETACH ioctl [ 675.945271][T22008] device syzkaller0 entered promiscuous mode [ 677.308137][T22067] bridge0: port 1(bridge_slave_0) entered blocking state [ 677.315183][T22067] bridge0: port 1(bridge_slave_0) entered disabled state [ 677.330139][T22067] device bridge_slave_0 entered promiscuous mode [ 677.337101][T22067] bridge0: port 2(bridge_slave_1) entered blocking state [ 677.343989][T22067] bridge0: port 2(bridge_slave_1) entered disabled state [ 677.351418][T22067] device bridge_slave_1 entered promiscuous mode [ 677.487437][T22087] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 677.607082][ T359] device bridge_slave_1 left promiscuous mode [ 677.614048][ T359] bridge0: port 2(bridge_slave_1) entered disabled state [ 677.762817][ T359] device bridge_slave_0 left promiscuous mode [ 677.799777][ T359] bridge0: port 1(bridge_slave_0) entered disabled state [ 678.505924][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 678.517144][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 678.534497][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 678.557901][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 678.568949][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.575808][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 678.583702][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 678.592136][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 678.600236][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 678.607087][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 678.614255][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 678.622110][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 678.660280][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 678.668275][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 678.680063][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 678.687388][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 678.695174][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 678.703195][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 678.711150][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 678.719594][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 678.732645][T22067] device veth0_vlan entered promiscuous mode [ 678.743493][T22109] device veth0_vlan left promiscuous mode [ 678.783379][T22109] device veth0_vlan entered promiscuous mode [ 678.879814][T22131] device syzkaller0 entered promiscuous mode [ 678.886223][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 678.894809][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 678.902246][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 678.915979][T22067] device veth1_macvtap entered promiscuous mode [ 678.947279][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 678.976245][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 678.984796][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 678.993857][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 679.059494][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 679.842479][T22165] device syzkaller0 entered promiscuous mode [ 680.217479][T22172] device veth0_vlan left promiscuous mode [ 680.230236][T22172] device veth0_vlan entered promiscuous mode [ 680.386388][T22189] device wg2 entered promiscuous mode [ 680.408330][T22189] tap0: tun_chr_ioctl cmd 1074025677 [ 680.414071][T22189] tap0: linktype set to 704 [ 681.250922][T22218] device syzkaller0 entered promiscuous mode [ 681.686656][T22238] device veth0_vlan left promiscuous mode [ 681.710316][T22238] device veth0_vlan entered promiscuous mode [ 681.736226][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 681.750304][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 681.757796][ T835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 687.361642][T22311] device veth0_vlan left promiscuous mode [ 687.367481][T22311] device veth0_vlan entered promiscuous mode [ 687.438076][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 687.472913][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 687.565553][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 688.112492][T22345] device pim6reg1 entered promiscuous mode [ 688.329862][T22350] syz-executor.2[22350] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 688.329934][T22350] syz-executor.2[22350] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 688.776876][T22379] device pim6reg1 entered promiscuous mode [ 689.223356][T22390] device veth0_vlan left promiscuous mode [ 689.231748][T22390] device veth0_vlan entered promiscuous mode [ 689.697676][T22428] device pim6reg1 entered promiscuous mode [ 690.307914][T22452] device veth0_vlan left promiscuous mode [ 690.370431][T22452] device veth0_vlan entered promiscuous mode [ 690.441090][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 690.472568][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 690.521985][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 693.214097][T22491] device syzkaller0 entered promiscuous mode [ 693.820936][T22517] device veth0_vlan left promiscuous mode [ 693.893828][T22517] device veth0_vlan entered promiscuous mode [ 694.372879][T22545] device sit0 left promiscuous mode [ 694.475763][T22552] device sit0 entered promiscuous mode [ 695.554794][T22598] device sit0 entered promiscuous mode [ 696.353236][T22607] device veth0_vlan left promiscuous mode [ 696.360516][T22607] device veth0_vlan entered promiscuous mode [ 696.732041][T22631] device syzkaller0 entered promiscuous mode [ 699.405105][T22723] device veth0_vlan left promiscuous mode [ 699.415711][T22723] device veth0_vlan entered promiscuous mode [ 699.770576][T22742] device syzkaller0 entered promiscuous mode [ 700.144584][T22760] device syzkaller0 entered promiscuous mode [ 700.956428][T22773] device veth0_vlan left promiscuous mode [ 701.004562][T22773] device veth0_vlan entered promiscuous mode [ 701.122064][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 701.149572][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 701.219727][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 701.298433][T22790] device sit0 left promiscuous mode [ 701.371921][T22792] device sit0 entered promiscuous mode [ 702.086533][T22797] device syzkaller0 entered promiscuous mode [ 702.635795][T22830] device sit0 left promiscuous mode [ 702.695823][T22830] device sit0 entered promiscuous mode [ 703.024809][T22853] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 703.536529][T22863] device syzkaller0 entered promiscuous mode [ 704.419154][T22884] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 705.308405][T22913] device syzkaller0 entered promiscuous mode [ 705.868146][T22930] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 707.892856][T22974] device veth0_vlan left promiscuous mode [ 707.904758][T22974] device veth0_vlan entered promiscuous mode [ 707.938994][T22986] device syzkaller0 entered promiscuous mode [ 707.945586][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 707.953802][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 707.961270][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 708.254773][T23002] device sit0 entered promiscuous mode [ 709.124471][T23015] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 709.171957][T23013] device syzkaller0 entered promiscuous mode [ 710.300606][T23032] device veth0_vlan left promiscuous mode [ 710.308481][T23032] device veth0_vlan entered promiscuous mode [ 710.648089][T23035] device syzkaller0 entered promiscuous mode [ 711.240221][T23062] device sit0 entered promiscuous mode [ 712.092028][T23074] device syzkaller0 entered promiscuous mode [ 713.802417][T23120] device sit0 left promiscuous mode [ 713.908720][T23123] device sit0 entered promiscuous mode [ 715.282802][T23148] device veth0_vlan left promiscuous mode [ 715.413922][T23148] device veth0_vlan entered promiscuous mode [ 716.601660][T23177] device sit0 left promiscuous mode [ 716.756643][T23178] device sit0 entered promiscuous mode [ 718.264577][T23210] device veth0_vlan left promiscuous mode [ 718.296549][T23210] device veth0_vlan entered promiscuous mode [ 719.613432][T23234] device sit0 left promiscuous mode [ 719.766394][T23235] device sit0 entered promiscuous mode [ 720.808464][T23256] device veth0_vlan left promiscuous mode [ 720.820508][T23256] device veth0_vlan entered promiscuous mode [ 722.153921][T23292] device sit0 left promiscuous mode [ 722.277933][T23295] device sit0 entered promiscuous mode [ 723.945432][T23345] device sit0 left promiscuous mode [ 724.226474][T23345] device sit0 entered promiscuous mode [ 724.901179][T23367] device sit0 left promiscuous mode [ 725.352642][T23396] device sit0 left promiscuous mode [ 725.495558][T23396] device sit0 entered promiscuous mode [ 726.291887][T23422] device sit0 left promiscuous mode [ 726.350177][T23422] device sit0 entered promiscuous mode [ 727.124406][T23442] device sit0 left promiscuous mode [ 727.304144][T23443] device sit0 entered promiscuous mode [ 728.090954][T23469] device sit0 left promiscuous mode [ 728.261777][T23469] device sit0 entered promiscuous mode [ 729.052889][T23486] device sit0 left promiscuous mode [ 729.102619][T23486] device sit0 entered promiscuous mode [ 729.623689][T23507] device sit0 left promiscuous mode [ 729.737854][T23512] device sit0 entered promiscuous mode [ 730.580069][T23547] device sit0 left promiscuous mode [ 730.768413][T23551] device sit0 entered promiscuous mode [ 731.402917][T23557] device sit0 left promiscuous mode [ 731.481176][T23565] syz-executor.0[23565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 731.481252][T23565] syz-executor.0[23565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 731.575567][T23587] device sit0 left promiscuous mode [ 731.618238][T23587] device sit0 entered promiscuous mode [ 732.265004][T23596] device sit0 entered promiscuous mode [ 732.484690][T23608] syz-executor.4[23608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 732.484764][T23608] syz-executor.4[23608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 732.767105][T23638] syz-executor.2[23638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 732.893092][T23638] syz-executor.2[23638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 733.111118][T23648] device sit0 entered promiscuous mode [ 733.611816][T23675] syz-executor.4[23675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 733.611886][T23675] syz-executor.4[23675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 733.980406][T23702] syz-executor.1[23702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 734.055440][T23702] syz-executor.1[23702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 734.127883][T23705] device sit0 left promiscuous mode [ 734.877528][T23741] device sit0 left promiscuous mode [ 734.988638][T23741] device sit0 entered promiscuous mode [ 736.096570][T23795] device sit0 left promiscuous mode [ 736.170153][T23795] device sit0 entered promiscuous mode [ 736.980674][T23837] device sit0 left promiscuous mode [ 737.116720][T23839] device sit0 entered promiscuous mode [ 737.901454][T23879] device sit0 left promiscuous mode [ 737.963530][T23879] device sit0 entered promiscuous mode [ 738.994169][T23918] device sit0 entered promiscuous mode [ 739.429536][T23908] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 739.437189][T23908] #PF: supervisor instruction fetch in kernel mode [ 739.443521][T23908] #PF: error_code(0x0010) - not-present page [ 739.449615][T23908] PGD 13e1c9067 P4D 13e1c9067 PUD 13e1c5067 PMD 0 [ 739.455943][T23908] Oops: 0010 [#1] PREEMPT SMP KASAN [ 739.461237][T23908] CPU: 1 PID: 23908 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00001-gec795e4eaa8a #0 [ 739.471216][T23908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 739.481135][T23908] RIP: 0010:0x0 [ 739.484434][T23908] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 739.491608][T23908] RSP: 0018:ffffc90000bff908 EFLAGS: 00010246 [ 739.497510][T23908] RAX: 1ffff1102b381017 RBX: ffff888159c080b8 RCX: 0000000000040000 [ 739.505335][T23908] RDX: ffffc90006262000 RSI: 000000000000c7d1 RDI: ffff8881276f2f40 [ 739.513230][T23908] RBP: ffffc90000bff930 R08: ffffffff841d7ec7 R09: ffff888100b90480 [ 739.521035][T23908] R10: 0000000000000010 R11: dffffc0000000001 R12: 0000000000000004 [ 739.528841][T23908] R13: dffffc0000000000 R14: ffff8881276f2f40 R15: dffffc0000000000 [ 739.536652][T23908] FS: 00007fd38fbfd6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 739.545421][T23908] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 739.551845][T23908] CR2: ffffffffffffffd6 CR3: 000000013e1dc000 CR4: 00000000003506a0 [ 739.559656][T23908] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 739.567465][T23908] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 739.575277][T23908] Call Trace: [ 739.578404][T23908] [ 739.581181][T23908] ? __die_body+0x62/0xb0 [ 739.585343][T23908] ? __die+0x7e/0x90 [ 739.589076][T23908] ? page_fault_oops+0x7f9/0xa90 [ 739.593979][T23908] ? kernelmode_fixup_or_oops+0x270/0x270 [ 739.599510][T23908] ? queued_write_lock_slowpath+0x460/0x547 [ 739.605237][T23908] ? preempt_schedule_notrace+0x140/0x140 [ 739.610837][T23908] ? is_errata93+0xc7/0x240 [ 739.615129][T23908] ? exc_page_fault+0x537/0x700 [ 739.619819][T23908] ? asm_exc_page_fault+0x27/0x30 [ 739.624678][T23908] ? sk_psock_verdict_data_ready+0xf7/0x160 [ 739.630417][T23908] sk_psock_verdict_data_ready+0x129/0x160 [ 739.636061][T23908] unix_stream_sendmsg+0x8fd/0x1070 [ 739.641083][T23908] ? unix_stream_sendmsg+0x841/0x1070 [ 739.646292][T23908] ? unix_show_fdinfo+0x2f0/0x2f0 [ 739.651150][T23908] ? security_socket_sendmsg+0x82/0xb0 [ 739.656448][T23908] ? unix_show_fdinfo+0x2f0/0x2f0 [ 739.661300][T23908] ____sys_sendmsg+0x5d3/0x9a0 [ 739.665992][T23908] ? __sys_sendmsg_sock+0x40/0x40 [ 739.670852][T23908] __sys_sendmsg+0x2a9/0x390 [ 739.675274][T23908] ? ____sys_sendmsg+0x9a0/0x9a0 [ 739.680059][T23908] ? restore_fpregs_from_fpstate+0xfc/0x230 [ 739.685779][T23908] ? __kasan_check_write+0x14/0x20 [ 739.690731][T23908] ? fpregs_restore_userregs+0x130/0x290 [ 739.696198][T23908] __x64_sys_sendmsg+0x7f/0x90 [ 739.700795][T23908] do_syscall_64+0x3d/0xb0 [ 739.705043][T23908] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 739.710774][T23908] RIP: 0033:0x7fd38ee7cf69 [ 739.715025][T23908] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 739.734466][T23908] RSP: 002b:00007fd38fbfd0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 739.742711][T23908] RAX: ffffffffffffffda RBX: 00007fd38efb3f80 RCX: 00007fd38ee7cf69 [ 739.750523][T23908] RDX: 0000000000000003 RSI: 0000000020000980 RDI: 0000000000000003 [ 739.758336][T23908] RBP: 00007fd38eeda6fe R08: 0000000000000000 R09: 0000000000000000 [ 739.766145][T23908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 739.773954][T23908] R13: 000000000000000b R14: 00007fd38efb3f80 R15: 00007fff97ea4058 [ 739.781772][T23908] [ 739.784631][T23908] Modules linked in: [ 739.788383][T23908] CR2: 0000000000000000 [ 739.792358][T23908] ---[ end trace 0000000000000000 ]--- [ 739.797651][T23908] RIP: 0010:0x0 [ 739.800953][T23908] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 739.808151][T23908] RSP: 0018:ffffc90000bff908 EFLAGS: 00010246 [ 739.814054][T23908] RAX: 1ffff1102b381017 RBX: ffff888159c080b8 RCX: 0000000000040000 [ 739.821864][T23908] RDX: ffffc90006262000 RSI: 000000000000c7d1 RDI: ffff8881276f2f40 [ 739.829675][T23908] RBP: ffffc90000bff930 R08: ffffffff841d7ec7 R09: ffff888100b90480 [ 739.837487][T23908] R10: 0000000000000010 R11: dffffc0000000001 R12: 0000000000000004 [ 739.845299][T23908] R13: dffffc0000000000 R14: ffff8881276f2f40 R15: dffffc0000000000 [ 739.853114][T23908] FS: 00007fd38fbfd6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 739.861877][T23908] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 739.868298][T23908] CR2: ffffffffffffffd6 CR3: 000000013e1dc000 CR4: 00000000003506a0 [ 739.876116][T23908] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 739.883920][T23908] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 739.891734][T23908] Kernel panic - not syncing: Fatal exception [ 739.897955][T23908] Kernel Offset: disabled [ 739.902076][T23908] Rebooting in 86400 seconds..