last executing test programs: 32.851472543s ago: executing program 2 (id=953): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000f708000000050000008af8ff00000000bfa200000000000007020000f8ffffffb7030000080000007843be180000000085000400820000009500000000002fbe9dd0318dcf6f66bd4cd7c7080dd518fbc43dc654856c6f4ac449db728743f9c4ee730384126fcefca8547d4551201d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1, 0x0, 0x0, @void, @value}, 0x20) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'macvtap0\x00', @link_local}) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'macvtap0\x00', @link_local}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000002c0)='sched_kthread_work_queue_work\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) (async) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'nr0\x00', 0x6132}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB='7'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfe3a) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) 32.184545308s ago: executing program 2 (id=959): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000100c0)='tasks\x00', 0x2, 0x0) r3 = gettid() write$cgroup_pid(r2, &(0x7f0000010100)=r3, 0x12) r4 = gettid() r5 = gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0xe0}, 0x10040) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0xf, &(0x7f0000000340)=ANY=[@ANYRESDEC=r11, @ANYRES16=r7, @ANYRES64=r3], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r12 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x3}, 0x18) sendmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)="f1b3bb09266ed6236a8673699fead9e7ca8a6038e928a6c1efe3a761dc1d6743e17d24cc3121303258e7e60163882d47c094ea76d25cf932161a587bf66531c8a21358c2127cf88a67339db770b5ea62b0cd66618facc16b8b4494844c3a67610011a85a9d92202bd65f20d04bf1", 0x6e}, {&(0x7f0000000040)="c264b9cf4ecddc97d9615a380fa7a7da0f2ff5620c026652134fa5a575271edd51984baa4b8f", 0x26}], 0x2, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32, @ANYRES32=r8, @ANYRES64=r12, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r10, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRESHEX=r9, @ANYRES32=r0, @ANYRES64=r3, @ANYBLOB='\x00\x00\x00\x00'], 0xa0, 0x4044814}, 0x40000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r13, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r14, 0x0, 0xf2}, 0x38) 31.93120079s ago: executing program 2 (id=965): bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x80086601, 0x0) r2 = bpf$ITER_CREATE(0xb, 0x0, 0x0) close(r2) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) recvmsg$unix(r3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xf, 0x4}, {0x2}, {0x8}]}]}, {0x0, [0x0]}}, &(0x7f0000000340)=""/142, 0x3f, 0x8e, 0x1, 0x0, 0x0, @void, @value}, 0x28) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000340)="a8", 0x1}], 0x1}, 0x4040001) recvmsg$unix(r5, &(0x7f00000038c0)={0x0, 0x0, 0x0}, 0x1) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000008c50000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) recvmsg$unix(r5, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x0) 31.466494054s ago: executing program 0 (id=974): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000100c0)='tasks\x00', 0x2, 0x0) r3 = gettid() write$cgroup_pid(r2, &(0x7f0000010100)=r3, 0x12) r4 = gettid() r5 = gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0xe0}, 0x10040) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0xf, &(0x7f0000000340)=ANY=[@ANYRESDEC=r11, @ANYRES16=r7, @ANYRES64=r3], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r12 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x3}, 0x18) sendmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)="f1b3bb09266ed6236a8673699fead9e7ca8a6038e928a6c1efe3a761dc1d6743e17d24cc3121303258e7e60163882d47c094ea76d25cf932161a587bf66531c8a21358c2127cf88a67339db770b5ea62b0cd66618facc16b8b4494844c3a67610011a85a9d92202bd65f20d04bf1", 0x6e}, {&(0x7f0000000040)="c264b9cf4ecddc97d9615a380fa7a7da0f2ff5620c026652134fa5a575271edd51984baa4b8f", 0x26}], 0x2, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32, @ANYRES32=r8, @ANYRES64=r12, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r10, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRESHEX=r9, @ANYRES32=r0, @ANYRES64=r3, @ANYBLOB='\x00\x00\x00\x00'], 0xa0, 0x4044814}, 0x40000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r13, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r14, 0x0, 0xf2}, 0x38) 31.350611685s ago: executing program 0 (id=975): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008000000080000", @ANYRES32=0x0], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008000000080000", @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a}, 0x0) (async) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="00000200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="00000200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b40)={r3, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x33, &(0x7f0000000800)=[{}], 0x8, 0x10, &(0x7f0000000900), &(0x7f00000009c0), 0x8, 0x7a, 0x8, 0x8, &(0x7f0000000a00)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000fc0)={r3, 0xe0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000c00)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x98, &(0x7f0000000cc0)=[{}, {}, {}], 0xfffffffffffffdc6, 0x10, &(0x7f0000000380), &(0x7f0000000d40), 0x8, 0xc2, 0x8, 0x8, &(0x7f0000000e80)}}, 0x10) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001000)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x1, 0x11, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000065490000000000000100000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000f9fbffff8520000005000000bf91000000000000b7020000000000008500000085100000b7000000000000009500000000000000babe6f3abe8e51c8511858d5108bc57aea007935954c68ea59f832ffefd57efa33afda9dad51d9093d13b2fb8adae10b66cc3e91db5d4f80fb5ecf2d08a397dc51ec6573db7cafde39464e6a5110be3c61eda81e88789753933b01eacbcac73527d574e57facc51d3072866bf900"/232], &(0x7f0000000300)='syzkaller\x00', 0x9179, 0x0, 0x0, 0x40f00, 0x30, '\x00', r5, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000bc0)={0x2, 0xf, 0x80000001, 0x9}, 0x10, r6, r3, 0x0, &(0x7f0000001080)=[r7], 0x0, 0x10, 0x7, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x20000000000001c0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xfffffffffffffd7f) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r9 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r9, 0x0, 0x0, 0x0}, 0x30) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r9, 0x0, 0x0, 0x0}, 0x30) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x2, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x8000000}, 0x42, 0x0, 0x25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/time\x00') openat$cgroup_procs(r8, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) 31.168074686s ago: executing program 0 (id=977): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0038000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1, 0x0, 0x0, @void, @value}, 0x20) 31.053796826s ago: executing program 2 (id=988): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(r1) sendmsg$inet(r2, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x21, &(0x7f0000000040), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) sendmsg$tipc(r4, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x0) recvmsg(r3, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1, &(0x7f00000032c0)=""/4096, 0x1000}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x11, 0x1, 0x6, 0x5, 0x131, 0x1, 0xb, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000800)={&(0x7f00000002c0)="e302ae33453ad0307e2c8115405f06c2bf5a7f4d5423e82f893eec41f106835063822b101268ae2831984b608659ac6f2301459a8f477fe014656047fc82d5e8e44cbc", &(0x7f0000000000)=""/58, &(0x7f0000000700)="9e5c8ef95f75e4da4cb55c82c55f0e597ec87f193de6aa4b4515996a8b1394ff8de8545eabc9c07fce32c8178f28c49f20211c64c2a6370a693a3bed276d9c4cf6ff5783447b9d8d2485c1275d226e5df9f030f1e95a5ff9ecc743996d20bfd92f9cdabd159521d7c1b601434e1c922b15a42a406d960cf7bcfc0b484b4878ffc96839674faf525a3ba17751e03f1fec84f5352c0386dd295df70f94b3b6060cbf2fc2ef90dc0637ac4ec276e0580e4039b90c23969c25841c6e40a960cea51c01ed44b6c98db200fa74b7", &(0x7f00000004c0)="d0ea113454ce081985e909a9537a59636b8a03b6b5daa5d326cb8b5a63bacebc5554a26078010f57a0c3d062b774c6e06c5e5b296701ade9fe5777b3bbd7f8101d31b13320881f653a50ba1ef20d0dabc21b83f4cf25305576ba8943ccabaaa2dc8205ac0ee455bd77bb500d40d121bf38970221c4ac09bf62a54324ce12734b53c9a06f8ece397304e0fcb04f9e95afcb65966ede5258b3768c5edee460c792d449d94c99dd9121c30610", 0x79c4, r6}, 0x38) sendmsg$tipc(r3, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffd}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r8}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000380)={&(0x7f0000000180)="da1e87acea25c7f405e7c5712d5b0bf566c556a41b6b0bdaa03bb2a7d137e7954df58114b6c95e6edbf655c326911e97a1bf080c0d6ac7ef6d90fff160db8307b105b15b963ba778611f0ae32f6f93fbcc28c116f3aade4dfec8630723b36e6df103a058b42554c48ea0a77b850e4e6bc8343569b25131c7d0b899a06ea654a33035cd98d7e0", 0x0, 0x0, 0x0, 0x5}, 0x38) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000840), 0x1c1c42, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) write$cgroup_devices(r9, &(0x7f0000000200)=ANY=[], 0xffdd) 30.995081997s ago: executing program 0 (id=979): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000200)='./cgroup\x00') bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f00000002c0)={'bond0\x00', 0x200}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) r3 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x7, 0x9, 0x9, 0x3, 0x0, 0x8, 0x100, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x1, @perf_config_ext={0x0, 0xffffffff}, 0x110000, 0x7, 0x9, 0x1, 0x100000000, 0x8, 0x8, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xf, r0, 0xc35b42fd65b6e448) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x65, 0xf, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x10001, 0x104800}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffbfffffffff, r3, 0x2) unlink(&(0x7f0000000140)='./cgroup\x00') ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000340)=0xa) r4 = openat$cgroup_ro(r0, &(0x7f0000000380)='blkio.bfq.time\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000200"/38], &(0x7f0000000200)=""/263, 0x26, 0x107, 0x1, 0x0, 0x0, @void, @value}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x9fd, 0x84, 0x0, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r5}, 0x38) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x80140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) close(r7) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c250000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, 0x0, 0x0) 30.831990808s ago: executing program 3 (id=981): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b7030000fdffffff8500000071"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000020000008500000086000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f0"], 0xcfa4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc6, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xfd85}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203"], 0xfdef) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) 30.679983649s ago: executing program 2 (id=983): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000340)='skb_copy_datagram_iovec\x00', r2, 0x0, 0xfffd}, 0x18) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) close(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r10, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) close(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r13, &(0x7f0000000980), 0x20000992) write$cgroup_subtree(r13, &(0x7f00000002c0)=ANY=[@ANYBLOB=';net_cls -rdma\a\x00\x00\x00getlb -devices -perf_event +net_prio -devices -net -rdma -net '], 0x50) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001b40)=ANY=[@ANYRES8=r2, @ANYRES32=r1, @ANYRESDEC=r12, @ANYRES32=r12, @ANYBLOB="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", @ANYRES16=r11, @ANYRES64=r13, @ANYRES8=r7], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r14}, 0x10) write$cgroup_subtree(r4, &(0x7f00000001c0)=ANY=[], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) 30.679870439s ago: executing program 3 (id=984): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r1}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 30.61104994s ago: executing program 4 (id=985): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35"], 0xcfa4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc6, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xfd85}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203"], 0xfdef) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 30.53820604s ago: executing program 4 (id=986): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000100c0)='tasks\x00', 0x2, 0x0) r3 = gettid() write$cgroup_pid(r2, &(0x7f0000010100)=r3, 0x12) r4 = gettid() r5 = gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0xe0}, 0x10040) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0xf, &(0x7f0000000340)=ANY=[@ANYRESDEC=r11, @ANYRES16=r7, @ANYRES64=r3], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r12 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x3}, 0x18) sendmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)="f1b3bb09266ed6236a8673699fead9e7ca8a6038e928a6c1efe3a761dc1d6743e17d24cc3121303258e7e60163882d47c094ea76d25cf932161a587bf66531c8a21358c2127cf88a67339db770b5ea62b0cd66618facc16b8b4494844c3a67610011a85a9d92202bd65f20d04bf1", 0x6e}, {&(0x7f0000000040)="c264b9cf4ecddc97d9615a380fa7a7da0f2ff5620c026652134fa5a575271edd51984baa4b8f", 0x26}], 0x2, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32, @ANYRES32=r8, @ANYRES64=r12, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r10, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRESHEX=r9, @ANYRES32=r0, @ANYRES64=r3, @ANYBLOB='\x00\x00\x00\x00'], 0xa0, 0x4044814}, 0x40000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r13, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r14, 0x0, 0xf2}, 0x38) 30.419655121s ago: executing program 2 (id=987): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd501783f73268f41, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x1, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c13c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) 30.363059702s ago: executing program 3 (id=989): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000100c0)='tasks\x00', 0x2, 0x0) r3 = gettid() write$cgroup_pid(r2, &(0x7f0000010100)=r3, 0x12) r4 = gettid() r5 = gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0xe0}, 0x10040) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0xf, &(0x7f0000000340)=ANY=[@ANYRESDEC=r11, @ANYRES16=r7, @ANYRES64=r3], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r12 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x3}, 0x18) sendmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)="f1b3bb09266ed6236a8673699fead9e7ca8a6038e928a6c1efe3a761dc1d6743e17d24cc3121303258e7e60163882d47c094ea76d25cf932161a587bf66531c8a21358c2127cf88a67339db770b5ea62b0cd66618facc16b8b4494844c3a67610011a85a9d92202bd65f20d04bf1", 0x6e}, {&(0x7f0000000040)="c264b9cf4ecddc97d9615a380fa7a7da0f2ff5620c026652134fa5a575271edd51984baa4b8f", 0x26}], 0x2, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32, @ANYRES32=r8, @ANYRES64=r12, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r10, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRESHEX=r9, @ANYRES32=r0, @ANYRES64=r3, @ANYBLOB='\x00\x00\x00\x00'], 0xa0, 0x4044814}, 0x40000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r13, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r14, 0x0, 0xf2}, 0x38) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 30.256090422s ago: executing program 4 (id=990): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0038000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1, 0x0, 0x0, @void, @value}, 0x20) 30.199337433s ago: executing program 0 (id=991): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000100c0)='tasks\x00', 0x2, 0x0) r3 = gettid() write$cgroup_pid(r2, &(0x7f0000010100)=r3, 0x12) r4 = gettid() r5 = gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0xe0}, 0x10040) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0xf, &(0x7f0000000340)=ANY=[@ANYRESDEC=r11, @ANYRES16=r7, @ANYRES64=r3], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r12 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x3}, 0x18) sendmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)="f1b3bb09266ed6236a8673699fead9e7ca8a6038e928a6c1efe3a761dc1d6743e17d24cc3121303258e7e60163882d47c094ea76d25cf932161a587bf66531c8a21358c2127cf88a67339db770b5ea62b0cd66618facc16b8b4494844c3a67610011a85a9d92202bd65f20d04bf1", 0x6e}, {&(0x7f0000000040)="c264b9cf4ecddc97d9615a380fa7a7da0f2ff5620c026652134fa5a575271edd51984baa4b8f", 0x26}], 0x2, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32, @ANYRES32=r8, @ANYRES64=r12, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r10, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRESHEX=r9, @ANYRES32=r0, @ANYRES64=r3, @ANYBLOB='\x00\x00\x00\x00'], 0xa0, 0x4044814}, 0x40000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r13, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r14, 0x0, 0xf2}, 0x38) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 30.127690373s ago: executing program 4 (id=992): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000100c0)='tasks\x00', 0x2, 0x0) r3 = gettid() write$cgroup_pid(r2, &(0x7f0000010100)=r3, 0x12) r4 = gettid() r5 = gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0xe0}, 0x10040) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0xf, &(0x7f0000000340)=ANY=[@ANYRESDEC=r11, @ANYRES16=r7, @ANYRES64=r3], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)="f1b3bb09266ed6236a8673699fead9e7ca8a6038e928a6c1efe3a761dc1d6743e17d24cc3121303258e7e60163882d47c094ea76d25cf932161a587bf66531c8a21358c2127cf88a67339db770b5ea62b0cd66618facc16b8b4494844c3a67610011a85a9d92202bd65f20d04bf1", 0x6e}, {&(0x7f0000000040)="c264b9cf4ecddc97d9615a380fa7a7da0f2ff5620c026652134fa5a575271edd51984baa4b8f", 0x26}], 0x2, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32, @ANYRES32=r8, @ANYRES64, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r10, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRESHEX=r9, @ANYRES32=r0, @ANYRES64=r3, @ANYBLOB='\x00\x00\x00\x00'], 0xa0, 0x4044814}, 0x40000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r12, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r13, 0x0, 0xf2}, 0x38) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 30.110622764s ago: executing program 3 (id=993): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b7030000fdffffff8500000071"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000020000008500000086000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f0"], 0xcfa4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc6, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xfd85}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203"], 0xfdef) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) 29.847684746s ago: executing program 4 (id=994): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="090000000800000004008001094000000a"], 0x48) 29.846775775s ago: executing program 0 (id=1004): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000100c0)='tasks\x00', 0x2, 0x0) r3 = gettid() write$cgroup_pid(r2, &(0x7f0000010100)=r3, 0x12) r4 = gettid() r5 = gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0xe0}, 0x10040) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r10, 0x0, 0x3}, 0x18) sendmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)="f1b3bb09266ed6236a8673699fead9e7ca8a6038e928a6c1efe3a761dc1d6743e17d24cc3121303258e7e60163882d47c094ea76d25cf932161a587bf66531c8a21358c2127cf88a67339db770b5ea62b0cd66618facc16b8b4494844c3a67610011a85a9d92202bd65f20d04bf1", 0x6e}, {&(0x7f0000000040)="c264b9cf4ecddc97d9615a380fa7a7da0f2ff5620c026652134fa5a575271edd51984baa4b8f", 0x26}], 0x2, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32, @ANYRES32=r7, @ANYRES64=r11, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r9, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRESHEX=r8, @ANYRES32=r0, @ANYRES64=r3, @ANYBLOB='\x00\x00\x00\x00'], 0xa0, 0x4044814}, 0x40000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r12, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r13, 0x0, 0xf2}, 0x38) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 29.846017136s ago: executing program 3 (id=1005): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b7030000fdffffff8500000071"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000020000008500000086000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f0"], 0xcfa4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc6, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xfd85}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203"], 0xfdef) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) 29.771335316s ago: executing program 4 (id=995): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b7030000fdffffff8500000071"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000020000008500000086000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f0"], 0xcfa4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc6, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xfd85}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203"], 0xfdef) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) 29.768549236s ago: executing program 3 (id=1007): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b7030000fdffffff8500000071"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000020000008500000086000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f0"], 0xcfa4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc6, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xfd85}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203"], 0xfdef) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) 11.221185465s ago: executing program 1 (id=937): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd501783f73268f41, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x1, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c13c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c77"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4008, r0}, 0x18) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) 9.200091461s ago: executing program 1 (id=937): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd501783f73268f41, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x1, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c13c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c77"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4008, r0}, 0x18) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) 7.070716186s ago: executing program 1 (id=937): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd501783f73268f41, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x1, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c13c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c77"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4008, r0}, 0x18) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) 4.780692764s ago: executing program 1 (id=937): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd501783f73268f41, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x1, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c13c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c77"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4008, r0}, 0x18) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) 2.450888561s ago: executing program 1 (id=937): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd501783f73268f41, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x1, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c13c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c77"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4008, r0}, 0x18) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) 0s ago: executing program 1 (id=937): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd501783f73268f41, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x1, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c13c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c77"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4008, r0}, 0x18) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) kernel console output (not intermixed with test programs): syzkaller-00013-g7d1f9b5c2ff5 #0 [ 43.568725][ T1005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 43.578726][ T1005] Call Trace: [ 43.581831][ T1005] [ 43.584607][ T1005] dump_stack_lvl+0x151/0x1c0 [ 43.589117][ T1005] ? io_uring_drop_tctx_refs+0x190/0x190 [ 43.594591][ T1005] dump_stack+0x15/0x20 [ 43.598580][ T1005] should_fail+0x3c6/0x510 [ 43.602835][ T1005] should_fail_usercopy+0x1a/0x20 [ 43.607690][ T1005] copy_page_from_iter_atomic+0x423/0x10e0 [ 43.613342][ T1005] ? pipe_zero+0x4e0/0x4e0 [ 43.617591][ T1005] ? __kasan_check_write+0x14/0x20 [ 43.622536][ T1005] ? _raw_spin_lock+0xa4/0x1b0 [ 43.627139][ T1005] generic_perform_write+0x360/0x750 [ 43.632257][ T1005] ? __mark_inode_dirty+0x54e/0xa50 [ 43.637296][ T1005] ? grab_cache_page_write_begin+0xa0/0xa0 [ 43.642932][ T1005] ? file_remove_privs+0x610/0x610 [ 43.647881][ T1005] ? generic_file_write_iter+0x9f/0x1c0 [ 43.653263][ T1005] __generic_file_write_iter+0x25b/0x4b0 [ 43.658735][ T1005] generic_file_write_iter+0xaf/0x1c0 [ 43.663940][ T1005] vfs_write+0xd5d/0x1110 [ 43.668108][ T1005] ? file_end_write+0x1c0/0x1c0 [ 43.672796][ T1005] ? mutex_lock+0xb6/0x1e0 [ 43.677041][ T1005] ? wait_for_completion_killable_timeout+0x10/0x10 [ 43.683466][ T1005] ? __fdget_pos+0x2e7/0x3a0 [ 43.687894][ T1005] ? ksys_write+0x77/0x2c0 [ 43.692143][ T1005] ksys_write+0x199/0x2c0 [ 43.696317][ T1005] ? irqentry_exit+0x30/0x40 [ 43.700743][ T1005] ? __ia32_sys_read+0x90/0x90 [ 43.705341][ T1005] __x64_sys_write+0x7b/0x90 [ 43.709761][ T1005] x64_sys_call+0x2f/0x9a0 [ 43.714019][ T1005] do_syscall_64+0x3b/0xb0 [ 43.718270][ T1005] ? clear_bhb_loop+0x35/0x90 [ 43.722790][ T1005] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 43.728511][ T1005] RIP: 0033:0x7fb6dd80c169 [ 43.732773][ T1005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.752205][ T1005] RSP: 002b:00007fb6dbe55038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 43.760453][ T1005] RAX: ffffffffffffffda RBX: 00007fb6dda25080 RCX: 00007fb6dd80c169 [ 43.768263][ T1005] RDX: 0000000020000992 RSI: 0000400000000980 RDI: 0000000000000005 [ 43.776072][ T1005] RBP: 00007fb6dbe55090 R08: 0000000000000000 R09: 0000000000000000 [ 43.783890][ T1005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.791696][ T1005] R13: 0000000000000000 R14: 00007fb6dda25080 R15: 00007ffe870dad18 [ 43.799513][ T1005] [ 44.387389][ T1034] device syzkaller0 entered promiscuous mode [ 44.637759][ T1047] FAULT_INJECTION: forcing a failure. [ 44.637759][ T1047] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 44.723720][ T1047] CPU: 1 PID: 1047 Comm: syz.2.261 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 44.733368][ T1047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 44.743262][ T1047] Call Trace: [ 44.746385][ T1047] [ 44.749166][ T1047] dump_stack_lvl+0x151/0x1c0 [ 44.753680][ T1047] ? io_uring_drop_tctx_refs+0x190/0x190 [ 44.759156][ T1047] dump_stack+0x15/0x20 [ 44.763134][ T1047] should_fail+0x3c6/0x510 [ 44.763814][ T1043] device syzkaller0 entered promiscuous mode [ 44.767386][ T1047] should_fail_alloc_page+0x5a/0x80 [ 44.767413][ T1047] prepare_alloc_pages+0x15c/0x700 [ 44.767440][ T1047] ? __alloc_pages_bulk+0xd80/0xd80 [ 44.767462][ T1047] ? __alloc_skb+0x10c/0x550 [ 44.767484][ T1047] ? __napi_alloc_skb+0x167/0x2e0 [ 44.767506][ T1047] ? napi_get_frags+0x6a/0x170 [ 44.767526][ T1047] ? tun_get_user+0xd85/0x3aa0 [ 44.767545][ T1047] ? tun_chr_write_iter+0x1e1/0x2e0 [ 44.767567][ T1047] __alloc_pages+0x18c/0x8f0 [ 44.767590][ T1047] ? prep_new_page+0x110/0x110 [ 44.767619][ T1047] kmalloc_order+0x4a/0x160 [ 44.767641][ T1047] kmalloc_order_trace+0x1a/0xb0 [ 44.767661][ T1047] ? tun_get_user+0x13b3/0x3aa0 [ 44.834815][ T1047] __kmalloc_track_caller+0x1a0/0x2c0 [ 44.840019][ T1047] ? tun_get_user+0x13b3/0x3aa0 [ 44.844702][ T1047] pskb_expand_head+0x113/0x1240 [ 44.849475][ T1047] ? __napi_alloc_skb+0x174/0x2e0 [ 44.854336][ T1047] tun_get_user+0x13b3/0x3aa0 [ 44.858852][ T1047] ? __x64_sys_openat+0x1b1/0x290 [ 44.863711][ T1047] ? _kstrtoull+0x3a0/0x4a0 [ 44.868054][ T1047] ? tun_do_read+0x2010/0x2010 [ 44.872649][ T1047] ? kstrtouint_from_user+0x20a/0x2a0 [ 44.877861][ T1047] ? kstrtol_from_user+0x310/0x310 [ 44.882816][ T1047] ? avc_policy_seqno+0x1b/0x70 [ 44.887615][ T1047] ? selinux_file_permission+0x2c4/0x570 [ 44.893084][ T1047] tun_chr_write_iter+0x1e1/0x2e0 [ 44.897944][ T1047] vfs_write+0xd5d/0x1110 [ 44.902115][ T1047] ? file_end_write+0x1c0/0x1c0 [ 44.906828][ T1047] ? __fdget_pos+0x209/0x3a0 [ 44.911218][ T1047] ? ksys_write+0x77/0x2c0 [ 44.915480][ T1047] ksys_write+0x199/0x2c0 [ 44.919645][ T1047] ? __ia32_sys_read+0x90/0x90 [ 44.924241][ T1047] ? debug_smp_processor_id+0x17/0x20 [ 44.929449][ T1047] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 44.935350][ T1047] __x64_sys_write+0x7b/0x90 [ 44.939774][ T1047] x64_sys_call+0x2f/0x9a0 [ 44.944030][ T1047] do_syscall_64+0x3b/0xb0 [ 44.948281][ T1047] ? clear_bhb_loop+0x35/0x90 [ 44.952792][ T1047] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 44.958519][ T1047] RIP: 0033:0x7fb6dd80c169 [ 44.962779][ T1047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 44.982224][ T1047] RSP: 002b:00007fb6dbe55038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 44.990460][ T1047] RAX: ffffffffffffffda RBX: 00007fb6dda25080 RCX: 00007fb6dd80c169 [ 44.998272][ T1047] RDX: 000000000000fdef RSI: 0000400000000380 RDI: 000000000000000b [ 45.006082][ T1047] RBP: 00007fb6dbe55090 R08: 0000000000000000 R09: 0000000000000000 [ 45.013896][ T1047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 45.021705][ T1047] R13: 0000000000000000 R14: 00007fb6dda25080 R15: 00007ffe870dad18 [ 45.029525][ T1047] [ 45.248111][ T1068] FAULT_INJECTION: forcing a failure. [ 45.248111][ T1068] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 45.291035][ T1068] CPU: 1 PID: 1068 Comm: syz.1.270 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 45.300678][ T1068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 45.310578][ T1068] Call Trace: [ 45.313702][ T1068] [ 45.316472][ T1068] dump_stack_lvl+0x151/0x1c0 [ 45.320997][ T1068] ? io_uring_drop_tctx_refs+0x190/0x190 [ 45.326452][ T1068] ? dump_stack+0x9/0x20 [ 45.330534][ T1068] dump_stack+0x15/0x20 [ 45.334525][ T1068] should_fail+0x3c6/0x510 [ 45.338782][ T1068] should_fail_usercopy+0x1a/0x20 [ 45.343637][ T1068] _copy_to_user+0x20/0x90 [ 45.347891][ T1068] generic_map_lookup_batch+0x703/0xc70 [ 45.353275][ T1068] ? bpf_map_update_value+0x3c0/0x3c0 [ 45.358480][ T1068] ? __fdget+0x1bc/0x240 [ 45.362556][ T1068] ? bpf_map_update_value+0x3c0/0x3c0 [ 45.367770][ T1068] bpf_map_do_batch+0x2dc/0x620 [ 45.372454][ T1068] __sys_bpf+0x5dc/0x760 [ 45.376533][ T1068] ? bpf_link_show_fdinfo+0x300/0x300 [ 45.381746][ T1068] ? debug_smp_processor_id+0x17/0x20 [ 45.386952][ T1068] __x64_sys_bpf+0x7c/0x90 [ 45.391200][ T1068] x64_sys_call+0x87f/0x9a0 [ 45.395538][ T1068] do_syscall_64+0x3b/0xb0 [ 45.399793][ T1068] ? clear_bhb_loop+0x35/0x90 [ 45.404304][ T1068] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 45.410036][ T1068] RIP: 0033:0x7f59db97a169 [ 45.414289][ T1068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.433730][ T1068] RSP: 002b:00007f59d9fe4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 45.441972][ T1068] RAX: ffffffffffffffda RBX: 00007f59dbb92fa0 RCX: 00007f59db97a169 [ 45.449786][ T1068] RDX: 0000000000000038 RSI: 00004000000003c0 RDI: 0000000000000018 [ 45.457605][ T1068] RBP: 00007f59d9fe4090 R08: 0000000000000000 R09: 0000000000000000 [ 45.465409][ T1068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 45.473217][ T1068] R13: 0000000000000000 R14: 00007f59dbb92fa0 R15: 00007ffe7c1161e8 [ 45.481038][ T1068] [ 47.162790][ T30] audit: type=1400 audit(1741907838.674:124): avc: denied { create } for pid=1168 comm="syz.0.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 47.279592][ T1185] FAULT_INJECTION: forcing a failure. [ 47.279592][ T1185] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 47.315398][ T1185] CPU: 0 PID: 1185 Comm: syz.1.312 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 47.325047][ T1185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 47.334943][ T1185] Call Trace: [ 47.338060][ T1185] [ 47.340841][ T1185] dump_stack_lvl+0x151/0x1c0 [ 47.345354][ T1185] ? io_uring_drop_tctx_refs+0x190/0x190 [ 47.350835][ T1185] dump_stack+0x15/0x20 [ 47.354813][ T1185] should_fail+0x3c6/0x510 [ 47.359072][ T1185] should_fail_usercopy+0x1a/0x20 [ 47.363926][ T1185] _copy_from_user+0x20/0xd0 [ 47.368357][ T1185] ___sys_recvmsg+0x150/0x690 [ 47.372867][ T1185] ? __sys_recvmsg+0x260/0x260 [ 47.377471][ T1185] ? __fdget+0x1bc/0x240 [ 47.381546][ T1185] __x64_sys_recvmsg+0x1dc/0x2b0 [ 47.386320][ T1185] ? ___sys_recvmsg+0x690/0x690 [ 47.391007][ T1185] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 47.396906][ T1185] ? exit_to_user_mode_prepare+0x39/0xa0 [ 47.402378][ T1185] x64_sys_call+0x171/0x9a0 [ 47.406717][ T1185] do_syscall_64+0x3b/0xb0 [ 47.410969][ T1185] ? clear_bhb_loop+0x35/0x90 [ 47.415482][ T1185] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.421209][ T1185] RIP: 0033:0x7f59db97a169 [ 47.425466][ T1185] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.444906][ T1185] RSP: 002b:00007f59d9fe4038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 47.453147][ T1185] RAX: ffffffffffffffda RBX: 00007f59dbb92fa0 RCX: 00007f59db97a169 [ 47.460963][ T1185] RDX: 0000000000000000 RSI: 0000400000003040 RDI: 0000000000000003 [ 47.468773][ T1185] RBP: 00007f59d9fe4090 R08: 0000000000000000 R09: 0000000000000000 [ 47.476585][ T1185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 47.484491][ T1185] R13: 0000000000000000 R14: 00007f59dbb92fa0 R15: 00007ffe7c1161e8 [ 47.492299][ T1185] [ 47.763507][ T1203] device veth0_vlan left promiscuous mode [ 47.770105][ T1203] device veth0_vlan entered promiscuous mode [ 47.815325][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.842842][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.866723][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.650377][ T1220] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.674014][ T30] audit: type=1400 audit(1741907840.174:125): avc: denied { create } for pid=1222 comm="syz.3.326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 48.809529][ T30] audit: type=1400 audit(1741907840.314:126): avc: denied { create } for pid=1227 comm="syz.4.327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 49.335149][ T30] audit: type=1400 audit(1741907840.844:127): avc: denied { create } for pid=1254 comm="syz.2.338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 49.374728][ T1255] device veth0_vlan left promiscuous mode [ 49.474117][ T1255] device veth0_vlan entered promiscuous mode [ 50.004293][ T1268] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.560959][ T1303] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 50.612481][ T1303] device sit0 entered promiscuous mode [ 50.619862][ T1303] FAULT_INJECTION: forcing a failure. [ 50.619862][ T1303] name failslab, interval 1, probability 0, space 0, times 0 [ 50.643423][ T1303] CPU: 1 PID: 1303 Comm: syz.2.352 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 50.653079][ T1303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 50.662979][ T1303] Call Trace: [ 50.666098][ T1303] [ 50.668874][ T1303] dump_stack_lvl+0x151/0x1c0 [ 50.673399][ T1303] ? io_uring_drop_tctx_refs+0x190/0x190 [ 50.678862][ T1303] ? __kasan_check_read+0x11/0x20 [ 50.683723][ T1303] ? preempt_schedule_irq+0xe7/0x140 [ 50.688837][ T1303] ? __cond_resched+0x20/0x20 [ 50.693356][ T1303] dump_stack+0x15/0x20 [ 50.697342][ T1303] should_fail+0x3c6/0x510 [ 50.701597][ T1303] __should_failslab+0xa4/0xe0 [ 50.706198][ T1303] ? fib_table_insert+0x853/0x20c0 [ 50.711145][ T1303] should_failslab+0x9/0x20 [ 50.715484][ T1303] slab_pre_alloc_hook+0x37/0xd0 [ 50.720258][ T1303] ? fib_table_insert+0x853/0x20c0 [ 50.725205][ T1303] kmem_cache_alloc+0x44/0x250 [ 50.729805][ T1303] fib_table_insert+0x853/0x20c0 [ 50.734578][ T1303] ? __stack_depot_save+0x34/0x470 [ 50.739528][ T1303] ? fib_alias_hw_flags_set+0xb20/0xb20 [ 50.744903][ T1303] ? __dev_notify_flags+0x304/0x610 [ 50.749956][ T1303] ? dev_ifsioc+0x147/0x10c0 [ 50.754367][ T1303] ? dev_ioctl+0x54d/0xe70 [ 50.758618][ T1303] fib_add_ifaddr+0xb7d/0x15e0 [ 50.763221][ T1303] ? nlmsg_parse_deprecated_strict+0xf0/0xf0 [ 50.769037][ T1303] ? arp_mc_map+0x4f1/0x910 [ 50.773376][ T1303] ? igmp_group_added+0x1fa/0x800 [ 50.778235][ T1303] ? igmpv3_del_delrec+0x740/0x740 [ 50.783188][ T1303] ? __kasan_check_write+0x14/0x20 [ 50.788128][ T1303] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 50.792990][ T1303] ? igmp_group_added+0x1fa/0x800 [ 50.797849][ T1303] ? igmpv3_del_delrec+0x740/0x740 [ 50.802807][ T1303] ? __local_bh_enable_ip+0x58/0x80 [ 50.807831][ T1303] ? _raw_spin_unlock_bh+0x51/0x60 [ 50.812784][ T1303] ? irqentry_exit+0x30/0x40 [ 50.817205][ T1303] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 50.822946][ T1303] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 50.828935][ T1303] fib_netdev_event+0x235/0x5d0 [ 50.833622][ T1303] raw_notifier_call_chain+0x8c/0xf0 [ 50.838743][ T1303] __dev_notify_flags+0x304/0x610 [ 50.843602][ T1303] ? __dev_change_flags+0x6e0/0x6e0 [ 50.848635][ T1303] ? __dev_change_flags+0x505/0x6e0 [ 50.853681][ T1303] ? avc_denied+0x1b0/0x1b0 [ 50.858011][ T1303] ? dev_get_flags+0x1e0/0x1e0 [ 50.862611][ T1303] ? _kstrtoull+0x3a0/0x4a0 [ 50.866954][ T1303] dev_change_flags+0xf0/0x1a0 [ 50.871550][ T1303] dev_ifsioc+0x147/0x10c0 [ 50.875805][ T1303] ? dev_ioctl+0xe70/0xe70 [ 50.880052][ T1303] ? mutex_lock+0xb6/0x1e0 [ 50.884308][ T1303] ? wait_for_completion_killable_timeout+0x10/0x10 [ 50.890734][ T1303] dev_ioctl+0x54d/0xe70 [ 50.894812][ T1303] sock_do_ioctl+0x34f/0x5a0 [ 50.899241][ T1303] ? sock_show_fdinfo+0xa0/0xa0 [ 50.903929][ T1303] ? selinux_file_ioctl+0x3cc/0x540 [ 50.908961][ T1303] sock_ioctl+0x455/0x740 [ 50.913126][ T1303] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 50.918766][ T1303] ? sock_poll+0x400/0x400 [ 50.923021][ T1303] ? security_file_ioctl+0x84/0xb0 [ 50.927967][ T1303] ? sock_poll+0x400/0x400 [ 50.932217][ T1303] __se_sys_ioctl+0x114/0x190 [ 50.936731][ T1303] __x64_sys_ioctl+0x7b/0x90 [ 50.941159][ T1303] x64_sys_call+0x98/0x9a0 [ 50.945420][ T1303] do_syscall_64+0x3b/0xb0 [ 50.949679][ T1303] ? clear_bhb_loop+0x35/0x90 [ 50.954177][ T1303] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 50.959905][ T1303] RIP: 0033:0x7fb6dd80c169 [ 50.964161][ T1303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 50.983601][ T1303] RSP: 002b:00007fb6dbe76038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 50.991849][ T1303] RAX: ffffffffffffffda RBX: 00007fb6dda24fa0 RCX: 00007fb6dd80c169 [ 50.999669][ T1303] RDX: 0000400000000040 RSI: 0000000000008914 RDI: 0000000000000009 [ 51.007471][ T1303] RBP: 00007fb6dbe76090 R08: 0000000000000000 R09: 0000000000000000 [ 51.015365][ T1303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 51.023178][ T1303] R13: 0000000000000000 R14: 00007fb6dda24fa0 R15: 00007ffe870dad18 [ 51.030994][ T1303] [ 52.024684][ T1327] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.067758][ T1322] device veth0_vlan left promiscuous mode [ 52.085690][ T1322] device veth0_vlan entered promiscuous mode [ 52.410853][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.437507][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 52.454503][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 53.753301][ T1384] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.135373][ T1392] device veth0_vlan left promiscuous mode [ 54.161352][ T1392] device veth0_vlan entered promiscuous mode [ 54.175381][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 54.201621][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 54.223979][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.361441][ T1413] device veth0_vlan left promiscuous mode [ 55.428465][ T1413] device veth0_vlan entered promiscuous mode [ 55.554903][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 55.586515][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 55.615179][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 56.471246][ T1443] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.243899][ T1638] FAULT_INJECTION: forcing a failure. [ 63.243899][ T1638] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 63.290979][ T1638] CPU: 1 PID: 1638 Comm: syz.3.472 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 63.300630][ T1638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 63.310542][ T1638] Call Trace: [ 63.313646][ T1638] [ 63.316437][ T1638] dump_stack_lvl+0x151/0x1c0 [ 63.320936][ T1638] ? io_uring_drop_tctx_refs+0x190/0x190 [ 63.326406][ T1638] dump_stack+0x15/0x20 [ 63.330394][ T1638] should_fail+0x3c6/0x510 [ 63.334649][ T1638] should_fail_alloc_page+0x5a/0x80 [ 63.339684][ T1638] prepare_alloc_pages+0x15c/0x700 [ 63.344634][ T1638] ? __alloc_pages_bulk+0xd80/0xd80 [ 63.349785][ T1638] ? lapic_next_event+0x5f/0x70 [ 63.354475][ T1638] __alloc_pages+0x18c/0x8f0 [ 63.358904][ T1638] ? prep_new_page+0x110/0x110 [ 63.363502][ T1638] wp_page_copy+0x1d4/0x1b00 [ 63.367925][ T1638] ? perf_pmu_nop_void+0x9/0x10 [ 63.372614][ T1638] ? __kasan_check_write+0x14/0x20 [ 63.377558][ T1638] ? insert_page_into_pte_locked+0x4e0/0x4e0 [ 63.383375][ T1638] ? irqentry_exit+0x30/0x40 [ 63.387800][ T1638] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 63.393446][ T1638] ? vm_normal_page+0x1e1/0x1f0 [ 63.398138][ T1638] do_wp_page+0x9ca/0xc90 [ 63.402298][ T1638] handle_pte_fault+0x7f1/0x28f0 [ 63.407091][ T1638] ? fault_around_bytes_set+0xc0/0xc0 [ 63.412275][ T1638] ? ktime_get+0x12f/0x160 [ 63.416529][ T1638] ? cgroup_rstat_updated+0xe5/0x370 [ 63.421654][ T1638] do_handle_mm_fault+0x20bc/0x2400 [ 63.426686][ T1638] ? numa_migrate_prep+0xe0/0xe0 [ 63.431457][ T1638] ? ctx_flexible_sched_in+0xa8/0x100 [ 63.436667][ T1638] ? ctx_sched_in+0x276/0x310 [ 63.441181][ T1638] ? down_read_trylock+0x3d6/0x7d0 [ 63.446127][ T1638] ? __init_rwsem+0x1d0/0x1d0 [ 63.450643][ T1638] ? __find_vma+0x136/0x150 [ 63.454978][ T1638] exc_page_fault+0x3b5/0x7f0 [ 63.459498][ T1638] asm_exc_page_fault+0x27/0x30 [ 63.464178][ T1638] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 63.470601][ T1638] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 63.490042][ T1638] RSP: 0018:ffffc90001027698 EFLAGS: 00050206 [ 63.495944][ T1638] RAX: ffffffff82643801 RBX: 0000400000000400 RCX: 000000000000f5d0 [ 63.503756][ T1638] RDX: 00000000000101d0 RSI: ffff888117da0cc8 RDI: 0000400000001000 [ 63.511567][ T1638] RBP: ffffc90001027800 R08: dffffc0000000000 R09: ffffed1022fb6053 [ 63.519379][ T1638] R10: 0000000000000003 R11: dffffc0000000001 R12: ffffc90001027cc8 [ 63.527212][ T1638] R13: 00000000000101d0 R14: ffff888117da00c8 R15: 00007ffffffff000 [ 63.535004][ T1638] ? _copy_to_iter+0x251/0xde0 [ 63.539615][ T1638] ? _copy_to_iter+0x2a3/0xde0 [ 63.544202][ T1638] ? iov_iter_init+0x190/0x190 [ 63.548799][ T1638] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 63.554442][ T1638] ? remove_wait_queue+0x12e/0x140 [ 63.559391][ T1638] ? __kasan_check_read+0x11/0x20 [ 63.564251][ T1638] ? __check_object_size+0x2ec/0x3d0 [ 63.569372][ T1638] simple_copy_to_iter+0x50/0x70 [ 63.574149][ T1638] __skb_datagram_iter+0xd4/0x780 [ 63.579004][ T1638] ? tipc_sk_anc_data_recv+0x69c/0x990 [ 63.584300][ T1638] ? tsk_importance+0x150/0x150 [ 63.588984][ T1638] ? skb_copy_datagram_iter+0x170/0x170 [ 63.594372][ T1638] skb_copy_datagram_iter+0x43/0x170 [ 63.599491][ T1638] tipc_recvstream+0x7a4/0xf70 [ 63.604092][ T1638] ? tipc_sendstream+0x70/0x70 [ 63.608688][ T1638] ? security_socket_recvmsg+0x87/0xb0 [ 63.613979][ T1638] ? tipc_sendstream+0x70/0x70 [ 63.618584][ T1638] ____sys_recvmsg+0x286/0x530 [ 63.623185][ T1638] ? __sys_recvmsg_sock+0x50/0x50 [ 63.628049][ T1638] ? import_iovec+0xe5/0x120 [ 63.632470][ T1638] ___sys_recvmsg+0x1ec/0x690 [ 63.636986][ T1638] ? __sys_recvmsg+0x260/0x260 [ 63.641593][ T1638] ? __fdget+0x1bc/0x240 [ 63.645661][ T1638] __x64_sys_recvmsg+0x1dc/0x2b0 [ 63.650438][ T1638] ? ___sys_recvmsg+0x690/0x690 [ 63.655122][ T1638] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 63.661024][ T1638] ? exit_to_user_mode_prepare+0x39/0xa0 [ 63.666496][ T1638] x64_sys_call+0x171/0x9a0 [ 63.670833][ T1638] do_syscall_64+0x3b/0xb0 [ 63.675083][ T1638] ? clear_bhb_loop+0x35/0x90 [ 63.679598][ T1638] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 63.685330][ T1638] RIP: 0033:0x7f4ce8a7e169 [ 63.689581][ T1638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 63.709024][ T1638] RSP: 002b:00007f4ce70e8038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 63.717268][ T1638] RAX: ffffffffffffffda RBX: 00007f4ce8c96fa0 RCX: 00007f4ce8a7e169 [ 63.725079][ T1638] RDX: 0000000000001f00 RSI: 0000400000000500 RDI: 0000000000000006 [ 63.732976][ T1638] RBP: 00007f4ce70e8090 R08: 0000000000000000 R09: 0000000000000000 [ 63.740792][ T1638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 63.748639][ T1638] R13: 0000000000000000 R14: 00007f4ce8c96fa0 R15: 00007ffd16531748 [ 63.756414][ T1638] [ 63.841279][ T30] audit: type=1400 audit(1741907855.354:128): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 63.936046][ T30] audit: type=1400 audit(1741907855.354:129): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 65.753301][ T1700] syz.0.491[1700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.753378][ T1700] syz.0.491[1700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.010186][ T1737] FAULT_INJECTION: forcing a failure. [ 67.010186][ T1737] name failslab, interval 1, probability 0, space 0, times 0 [ 67.176353][ T1737] CPU: 0 PID: 1737 Comm: syz.3.502 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 67.186005][ T1737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 67.195896][ T1737] Call Trace: [ 67.199025][ T1737] [ 67.201799][ T1737] dump_stack_lvl+0x151/0x1c0 [ 67.206313][ T1737] ? io_uring_drop_tctx_refs+0x190/0x190 [ 67.211780][ T1737] dump_stack+0x15/0x20 [ 67.215771][ T1737] should_fail+0x3c6/0x510 [ 67.220030][ T1737] __should_failslab+0xa4/0xe0 [ 67.224625][ T1737] ? alloc_vmap_area+0x19e/0x1a80 [ 67.229483][ T1737] should_failslab+0x9/0x20 [ 67.233824][ T1737] slab_pre_alloc_hook+0x37/0xd0 [ 67.238597][ T1737] ? alloc_vmap_area+0x19e/0x1a80 [ 67.243455][ T1737] kmem_cache_alloc+0x44/0x250 [ 67.248062][ T1737] alloc_vmap_area+0x19e/0x1a80 [ 67.252749][ T1737] ? vm_map_ram+0xa90/0xa90 [ 67.257083][ T1737] ? __kasan_kmalloc+0x9/0x10 [ 67.261602][ T1737] ? kmem_cache_alloc_trace+0x11a/0x270 [ 67.266988][ T1737] ? __get_vm_area_node+0x117/0x360 [ 67.272015][ T1737] __get_vm_area_node+0x158/0x360 [ 67.276877][ T1737] __vmalloc_node_range+0xe2/0x8d0 [ 67.281822][ T1737] ? dev_map_create_hash+0x29/0x1c0 [ 67.286857][ T1737] bpf_map_area_alloc+0xd9/0xf0 [ 67.291535][ T1737] ? dev_map_create_hash+0x29/0x1c0 [ 67.296572][ T1737] dev_map_create_hash+0x29/0x1c0 [ 67.301430][ T1737] ? bpf_map_init_from_attr+0x15b/0x380 [ 67.306813][ T1737] dev_map_alloc+0x2d4/0x530 [ 67.311243][ T1737] map_create+0x411/0x2050 [ 67.315501][ T1737] __sys_bpf+0x296/0x760 [ 67.319571][ T1737] ? fput_many+0x160/0x1b0 [ 67.323823][ T1737] ? bpf_link_show_fdinfo+0x300/0x300 [ 67.329034][ T1737] ? debug_smp_processor_id+0x17/0x20 [ 67.334238][ T1737] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 67.340143][ T1737] __x64_sys_bpf+0x7c/0x90 [ 67.344396][ T1737] x64_sys_call+0x87f/0x9a0 [ 67.348736][ T1737] do_syscall_64+0x3b/0xb0 [ 67.352990][ T1737] ? clear_bhb_loop+0x35/0x90 [ 67.357499][ T1737] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 67.363231][ T1737] RIP: 0033:0x7f4ce8a7e169 [ 67.367490][ T1737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 67.386922][ T1737] RSP: 002b:00007f4ce70e8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 67.395179][ T1737] RAX: ffffffffffffffda RBX: 00007f4ce8c96fa0 RCX: 00007f4ce8a7e169 [ 67.402977][ T1737] RDX: 0000000000000048 RSI: 0000400000000000 RDI: 0000000000000000 [ 67.410795][ T1737] RBP: 00007f4ce70e8090 R08: 0000000000000000 R09: 0000000000000000 [ 67.418686][ T1737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 67.426500][ T1737] R13: 0000000000000000 R14: 00007f4ce8c96fa0 R15: 00007ffd16531748 [ 67.434320][ T1737] [ 68.227118][ T30] audit: type=1400 audit(1741907859.734:130): avc: denied { tracepoint } for pid=1752 comm="syz.0.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 68.331116][ T1777] FAULT_INJECTION: forcing a failure. [ 68.331116][ T1777] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 68.423812][ T1777] CPU: 0 PID: 1777 Comm: syz.2.517 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 68.433462][ T1777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 68.443357][ T1777] Call Trace: [ 68.446481][ T1777] [ 68.449273][ T1777] dump_stack_lvl+0x151/0x1c0 [ 68.453771][ T1777] ? io_uring_drop_tctx_refs+0x190/0x190 [ 68.459242][ T1777] ? vmacache_find+0x21f/0x4d0 [ 68.463841][ T1777] dump_stack+0x15/0x20 [ 68.467834][ T1777] should_fail+0x3c6/0x510 [ 68.472087][ T1777] should_fail_alloc_page+0x5a/0x80 [ 68.477118][ T1777] prepare_alloc_pages+0x15c/0x700 [ 68.482076][ T1777] ? __alloc_pages_bulk+0xd80/0xd80 [ 68.487102][ T1777] __alloc_pages+0x18c/0x8f0 [ 68.491528][ T1777] ? prep_new_page+0x110/0x110 [ 68.496126][ T1777] ? copy_page_from_iter+0x241/0x640 [ 68.501247][ T1777] ? copy_user_enhanced_fast_string+0xe/0x40 [ 68.507079][ T1777] pipe_write+0x551/0x1930 [ 68.511325][ T1777] ? pipe_read+0x1040/0x1040 [ 68.515746][ T1777] ? selinux_file_permission+0x450/0x570 [ 68.521209][ T1777] ? fsnotify_perm+0x6a/0x5b0 [ 68.525839][ T1777] ? iov_iter_init+0x53/0x190 [ 68.530351][ T1777] vfs_write+0xd5d/0x1110 [ 68.534515][ T1777] ? __traceiter_kmem_cache_free+0x32/0x50 [ 68.540158][ T1777] ? file_end_write+0x1c0/0x1c0 [ 68.544845][ T1777] ? __fdget_pos+0x209/0x3a0 [ 68.549268][ T1777] ? ksys_write+0x77/0x2c0 [ 68.553543][ T1777] ksys_write+0x199/0x2c0 [ 68.557691][ T1777] ? __ia32_sys_read+0x90/0x90 [ 68.562294][ T1777] ? debug_smp_processor_id+0x17/0x20 [ 68.567493][ T1777] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 68.573397][ T1777] __x64_sys_write+0x7b/0x90 [ 68.577822][ T1777] x64_sys_call+0x2f/0x9a0 [ 68.582078][ T1777] do_syscall_64+0x3b/0xb0 [ 68.586330][ T1777] ? clear_bhb_loop+0x35/0x90 [ 68.590848][ T1777] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 68.596568][ T1777] RIP: 0033:0x7fb6dd80c169 [ 68.600827][ T1777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 68.620267][ T1777] RSP: 002b:00007fb6dbe76038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 68.628514][ T1777] RAX: ffffffffffffffda RBX: 00007fb6dda24fa0 RCX: 00007fb6dd80c169 [ 68.636324][ T1777] RDX: 000000000000fdef RSI: 0000400000000300 RDI: 0000000000000000 [ 68.644315][ T1777] RBP: 00007fb6dbe76090 R08: 0000000000000000 R09: 0000000000000000 [ 68.652127][ T1777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 68.659942][ T1777] R13: 0000000000000000 R14: 00007fb6dda24fa0 R15: 00007ffe870dad18 [ 68.667758][ T1777] [ 68.713758][ T1783] device syzkaller0 entered promiscuous mode [ 68.787022][ T1791] FAULT_INJECTION: forcing a failure. [ 68.787022][ T1791] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 68.799993][ T1791] CPU: 1 PID: 1791 Comm: syz.3.522 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 68.809627][ T1791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 68.819521][ T1791] Call Trace: [ 68.822676][ T1791] [ 68.825424][ T1791] dump_stack_lvl+0x151/0x1c0 [ 68.829932][ T1791] ? io_uring_drop_tctx_refs+0x190/0x190 [ 68.835404][ T1791] dump_stack+0x15/0x20 [ 68.839394][ T1791] should_fail+0x3c6/0x510 [ 68.843654][ T1791] should_fail_usercopy+0x1a/0x20 [ 68.848505][ T1791] _copy_to_user+0x20/0x90 [ 68.852758][ T1791] simple_read_from_buffer+0xc7/0x150 [ 68.857970][ T1791] proc_fail_nth_read+0x1a3/0x210 [ 68.862829][ T1791] ? proc_fault_inject_write+0x390/0x390 [ 68.868380][ T1791] ? fsnotify_perm+0x269/0x5b0 [ 68.872981][ T1791] ? security_file_permission+0x86/0xb0 [ 68.878364][ T1791] ? proc_fault_inject_write+0x390/0x390 [ 68.883829][ T1791] vfs_read+0x27d/0xd40 [ 68.887826][ T1791] ? kernel_read+0x1f0/0x1f0 [ 68.892258][ T1791] ? __kasan_check_write+0x14/0x20 [ 68.897192][ T1791] ? mutex_lock+0xb6/0x1e0 [ 68.901446][ T1791] ? wait_for_completion_killable_timeout+0x10/0x10 [ 68.907872][ T1791] ? __fdget_pos+0x2e7/0x3a0 [ 68.912296][ T1791] ? ksys_read+0x77/0x2c0 [ 68.916461][ T1791] ksys_read+0x199/0x2c0 [ 68.920543][ T1791] ? vfs_write+0x1110/0x1110 [ 68.924971][ T1791] ? debug_smp_processor_id+0x17/0x20 [ 68.930174][ T1791] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 68.936076][ T1791] __x64_sys_read+0x7b/0x90 [ 68.940418][ T1791] x64_sys_call+0x28/0x9a0 [ 68.944668][ T1791] do_syscall_64+0x3b/0xb0 [ 68.948922][ T1791] ? clear_bhb_loop+0x35/0x90 [ 68.953435][ T1791] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 68.959163][ T1791] RIP: 0033:0x7f4ce8a7cb7c [ 68.963417][ T1791] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 68.982860][ T1791] RSP: 002b:00007f4ce70e8030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 68.991104][ T1791] RAX: ffffffffffffffda RBX: 00007f4ce8c96fa0 RCX: 00007f4ce8a7cb7c [ 68.998915][ T1791] RDX: 000000000000000f RSI: 00007f4ce70e80a0 RDI: 0000000000000003 [ 69.006723][ T1791] RBP: 00007f4ce70e8090 R08: 0000000000000000 R09: 0000000000000000 [ 69.014545][ T1791] R10: 0000400000000080 R11: 0000000000000246 R12: 0000000000000002 [ 69.022347][ T1791] R13: 0000000000000001 R14: 00007f4ce8c96fa0 R15: 00007ffd16531748 [ 69.030164][ T1791] [ 69.348989][ T30] audit: type=1400 audit(1741907860.854:131): avc: denied { create } for pid=1808 comm="syz.4.531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 69.648584][ T1819] ref_ctr_offset mismatch. inode: 0x268 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 70.815423][ T1858] FAULT_INJECTION: forcing a failure. [ 70.815423][ T1858] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 70.919597][ T1858] CPU: 0 PID: 1858 Comm: syz.0.549 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 70.929246][ T1858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 70.939140][ T1858] Call Trace: [ 70.942263][ T1858] [ 70.945041][ T1858] dump_stack_lvl+0x151/0x1c0 [ 70.949560][ T1858] ? io_uring_drop_tctx_refs+0x190/0x190 [ 70.955034][ T1858] ? __kasan_check_write+0x14/0x20 [ 70.959968][ T1858] ? __alloc_skb+0x355/0x550 [ 70.964402][ T1858] dump_stack+0x15/0x20 [ 70.968391][ T1858] should_fail+0x3c6/0x510 [ 70.972657][ T1858] should_fail_usercopy+0x1a/0x20 [ 70.977500][ T1858] _copy_from_iter+0x22f/0xdc0 [ 70.982104][ T1858] ? copy_mc_pipe_to_iter+0x760/0x760 [ 70.987310][ T1858] ? __check_object_size+0x2ec/0x3d0 [ 70.992432][ T1858] skb_copy_datagram_from_iter+0x100/0x6d0 [ 70.998069][ T1858] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 71.003711][ T1858] ? kvfree_call_rcu+0x612/0x8b0 [ 71.008487][ T1858] tun_get_user+0x112d/0x3aa0 [ 71.013001][ T1858] ? _kstrtoull+0x3a0/0x4a0 [ 71.017355][ T1858] ? tun_do_read+0x2010/0x2010 [ 71.021942][ T1858] ? kstrtouint_from_user+0x20a/0x2a0 [ 71.027149][ T1858] ? kstrtol_from_user+0x310/0x310 [ 71.032098][ T1858] ? avc_policy_seqno+0x1b/0x70 [ 71.036781][ T1858] ? selinux_file_permission+0x2c4/0x570 [ 71.042248][ T1858] tun_chr_write_iter+0x1e1/0x2e0 [ 71.047111][ T1858] vfs_write+0xd5d/0x1110 [ 71.051278][ T1858] ? file_end_write+0x1c0/0x1c0 [ 71.055964][ T1858] ? __fdget_pos+0x209/0x3a0 [ 71.060390][ T1858] ? ksys_write+0x77/0x2c0 [ 71.064645][ T1858] ksys_write+0x199/0x2c0 [ 71.068807][ T1858] ? __ia32_sys_read+0x90/0x90 [ 71.073408][ T1858] ? debug_smp_processor_id+0x17/0x20 [ 71.078614][ T1858] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 71.084519][ T1858] __x64_sys_write+0x7b/0x90 [ 71.088944][ T1858] x64_sys_call+0x2f/0x9a0 [ 71.093199][ T1858] do_syscall_64+0x3b/0xb0 [ 71.097446][ T1858] ? clear_bhb_loop+0x35/0x90 [ 71.101965][ T1858] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 71.107691][ T1858] RIP: 0033:0x7f99ecc01169 [ 71.111948][ T1858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 71.131387][ T1858] RSP: 002b:00007f99eb26b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 71.139632][ T1858] RAX: ffffffffffffffda RBX: 00007f99ece19fa0 RCX: 00007f99ecc01169 [ 71.147441][ T1858] RDX: 000000000000fdef RSI: 0000400000000580 RDI: 00000000000000c8 [ 71.155261][ T1858] RBP: 00007f99eb26b090 R08: 0000000000000000 R09: 0000000000000000 [ 71.163074][ T1858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 71.170878][ T1858] R13: 0000000000000000 R14: 00007f99ece19fa0 R15: 00007ffc05e3e3e8 [ 71.178690][ T1858] [ 72.146430][ T1890] FAULT_INJECTION: forcing a failure. [ 72.146430][ T1890] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 72.159525][ T1890] CPU: 0 PID: 1890 Comm: syz.0.562 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 72.169109][ T1890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 72.179003][ T1890] Call Trace: [ 72.182119][ T1890] [ 72.184904][ T1890] dump_stack_lvl+0x151/0x1c0 [ 72.189413][ T1890] ? io_uring_drop_tctx_refs+0x190/0x190 [ 72.194883][ T1890] dump_stack+0x15/0x20 [ 72.198874][ T1890] should_fail+0x3c6/0x510 [ 72.203125][ T1890] should_fail_alloc_page+0x5a/0x80 [ 72.208164][ T1890] prepare_alloc_pages+0x15c/0x700 [ 72.213108][ T1890] ? __alloc_pages_bulk+0xd80/0xd80 [ 72.218142][ T1890] ? stack_trace_save+0x1c0/0x1c0 [ 72.223006][ T1890] __alloc_pages+0x18c/0x8f0 [ 72.227520][ T1890] ? prep_new_page+0x110/0x110 [ 72.232123][ T1890] ? stack_trace_save+0x113/0x1c0 [ 72.236978][ T1890] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 72.242621][ T1890] ? stack_trace_snprint+0xf0/0xf0 [ 72.247569][ T1890] __stack_depot_save+0x38d/0x470 [ 72.252423][ T1890] ____kasan_kmalloc+0xed/0x110 [ 72.257106][ T1890] ? ____kasan_kmalloc+0xdb/0x110 [ 72.261966][ T1890] ? __kasan_kmalloc+0x9/0x10 [ 72.266478][ T1890] ? __kmalloc_track_caller+0x13e/0x2c0 [ 72.271860][ T1890] ? __alloc_skb+0x10c/0x550 [ 72.276287][ T1890] ? ip_frag_next+0xe2/0xa20 [ 72.280715][ T1890] ? ip_do_fragment+0x7e7/0x1e10 [ 72.285489][ T1890] ? ip_fragment+0x123/0x210 [ 72.289914][ T1890] ? __ip_finish_output+0x29c/0x360 [ 72.294947][ T1890] ? ip_finish_output+0x31/0x210 [ 72.299722][ T1890] ? ip_output+0x1d6/0x420 [ 72.303973][ T1890] ? ip_local_out+0x92/0xb0 [ 72.308314][ T1890] ? iptunnel_xmit+0x4b7/0x8a0 [ 72.312918][ T1890] ? ip_tunnel_xmit+0x1e1e/0x2760 [ 72.317775][ T1890] ? ipgre_xmit+0x7f8/0xb80 [ 72.322116][ T1890] ? dev_hard_start_xmit+0x228/0x620 [ 72.327236][ T1890] ? __dev_queue_xmit+0x1856/0x2e80 [ 72.332269][ T1890] ? dev_queue_xmit+0x17/0x20 [ 72.336780][ T1890] ? __bpf_redirect+0x690/0xe60 [ 72.341468][ T1890] ? bpf_clone_redirect+0x24d/0x390 [ 72.346505][ T1890] ? bpf_prog_973cd02a7a0e8181+0x56/0xe18 [ 72.352057][ T1890] ? bpf_test_run+0x478/0xa10 [ 72.356572][ T1890] ? bpf_prog_test_run_skb+0xb41/0x1420 [ 72.361953][ T1890] ? bpf_prog_test_run+0x3b0/0x630 [ 72.366992][ T1890] ? __sys_bpf+0x525/0x760 [ 72.371241][ T1890] ? __x64_sys_bpf+0x7c/0x90 [ 72.375665][ T1890] ? x64_sys_call+0x87f/0x9a0 [ 72.380181][ T1890] ? do_syscall_64+0x3b/0xb0 [ 72.384610][ T1890] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 72.390517][ T1890] __kasan_kmalloc+0x9/0x10 [ 72.394849][ T1890] __kmalloc_track_caller+0x13e/0x2c0 [ 72.400057][ T1890] ? ip_frag_next+0xe2/0xa20 [ 72.404482][ T1890] ? ip_frag_next+0xe2/0xa20 [ 72.408912][ T1890] __alloc_skb+0x10c/0x550 [ 72.413162][ T1890] ip_frag_next+0xe2/0xa20 [ 72.417413][ T1890] ? __kasan_check_read+0x11/0x20 [ 72.422272][ T1890] ? selinux_ip_postroute+0x2b9/0x1380 [ 72.427572][ T1890] ip_do_fragment+0x7e7/0x1e10 [ 72.432170][ T1890] ? ip_fragment+0x210/0x210 [ 72.436598][ T1890] ? ip_frag_next+0xa20/0xa20 [ 72.441110][ T1890] ip_fragment+0x123/0x210 [ 72.445362][ T1890] __ip_finish_output+0x29c/0x360 [ 72.450221][ T1890] ip_finish_output+0x31/0x210 [ 72.454820][ T1890] ? ip_output+0x3e1/0x420 [ 72.459072][ T1890] ip_output+0x1d6/0x420 [ 72.463154][ T1890] ? ip_finish_output+0x210/0x210 [ 72.468013][ T1890] ? ____kasan_slab_free+0x131/0x160 [ 72.473133][ T1890] ? ip_mc_finish_output+0x3c0/0x3c0 [ 72.478256][ T1890] ? prandom_u32+0x24c/0x290 [ 72.482682][ T1890] ip_local_out+0x92/0xb0 [ 72.486857][ T1890] iptunnel_xmit+0x4b7/0x8a0 [ 72.491276][ T1890] ip_tunnel_xmit+0x1e1e/0x2760 [ 72.495963][ T1890] ? ip_tunnel_xmit+0x191/0x2760 [ 72.500736][ T1890] ? tnl_update_pmtu+0xba0/0xba0 [ 72.505509][ T1890] ? skb_network_protocol+0x578/0x770 [ 72.510714][ T1890] ? skb_push+0x87/0x120 [ 72.514803][ T1890] ? gre_build_header+0x233/0x7a0 [ 72.519659][ T1890] ipgre_xmit+0x7f8/0xb80 [ 72.523827][ T1890] dev_hard_start_xmit+0x228/0x620 [ 72.528771][ T1890] __dev_queue_xmit+0x1856/0x2e80 [ 72.533632][ T1890] ? dev_queue_xmit+0x20/0x20 [ 72.538144][ T1890] ? __kasan_check_write+0x14/0x20 [ 72.543089][ T1890] ? skb_release_data+0x1c3/0xa80 [ 72.547953][ T1890] ? __kasan_check_write+0x14/0x20 [ 72.552897][ T1890] ? pskb_expand_head+0xc8f/0x1240 [ 72.557849][ T1890] dev_queue_xmit+0x17/0x20 [ 72.562185][ T1890] __bpf_redirect+0x690/0xe60 [ 72.566700][ T1890] bpf_clone_redirect+0x24d/0x390 [ 72.571559][ T1890] bpf_prog_973cd02a7a0e8181+0x56/0xe18 [ 72.576938][ T1890] ? dma_free_contiguous+0x90/0xc0 [ 72.581887][ T1890] ? __stack_depot_save+0x34/0x470 [ 72.586836][ T1890] ? __kasan_slab_alloc+0xc3/0xe0 [ 72.591694][ T1890] ? __kasan_slab_alloc+0xb1/0xe0 [ 72.596552][ T1890] ? slab_post_alloc_hook+0x53/0x2c0 [ 72.601675][ T1890] ? kmem_cache_alloc+0xf5/0x250 [ 72.606451][ T1890] ? __build_skb+0x2a/0x300 [ 72.610792][ T1890] ? build_skb+0x25/0x1f0 [ 72.614955][ T1890] ? bpf_prog_test_run_skb+0x38e/0x1420 [ 72.620333][ T1890] ? bpf_prog_test_run+0x3b0/0x630 [ 72.625281][ T1890] ? __sys_bpf+0x525/0x760 [ 72.629534][ T1890] ? __x64_sys_bpf+0x7c/0x90 [ 72.633962][ T1890] ? x64_sys_call+0x87f/0x9a0 [ 72.638475][ T1890] ? do_syscall_64+0x3b/0xb0 [ 72.642899][ T1890] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 72.648809][ T1890] ? ktime_get+0x12f/0x160 [ 72.653058][ T1890] bpf_test_run+0x478/0xa10 [ 72.657401][ T1890] ? convert___skb_to_skb+0x570/0x570 [ 72.662605][ T1890] ? eth_type_trans+0x2e4/0x620 [ 72.667292][ T1890] ? eth_get_headlen+0x240/0x240 [ 72.672063][ T1890] ? convert___skb_to_skb+0x44/0x570 [ 72.677187][ T1890] bpf_prog_test_run_skb+0xb41/0x1420 [ 72.682392][ T1890] ? __kasan_check_write+0x14/0x20 [ 72.687347][ T1890] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 72.693070][ T1890] ? __kasan_check_write+0x14/0x20 [ 72.698014][ T1890] ? fput_many+0x160/0x1b0 [ 72.702269][ T1890] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 72.707997][ T1890] bpf_prog_test_run+0x3b0/0x630 [ 72.712773][ T1890] ? bpf_prog_query+0x220/0x220 [ 72.717459][ T1890] ? selinux_bpf+0xd2/0x100 [ 72.721808][ T1890] ? security_bpf+0x82/0xb0 [ 72.726152][ T1890] __sys_bpf+0x525/0x760 [ 72.730217][ T1890] ? fput_many+0x160/0x1b0 [ 72.734469][ T1890] ? bpf_link_show_fdinfo+0x300/0x300 [ 72.739679][ T1890] ? debug_smp_processor_id+0x17/0x20 [ 72.744881][ T1890] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 72.750786][ T1890] __x64_sys_bpf+0x7c/0x90 [ 72.755042][ T1890] x64_sys_call+0x87f/0x9a0 [ 72.759377][ T1890] do_syscall_64+0x3b/0xb0 [ 72.763631][ T1890] ? clear_bhb_loop+0x35/0x90 [ 72.768146][ T1890] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 72.773870][ T1890] RIP: 0033:0x7f99ecc01169 [ 72.778126][ T1890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 72.797569][ T1890] RSP: 002b:00007f99eb26b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 72.805811][ T1890] RAX: ffffffffffffffda RBX: 00007f99ece19fa0 RCX: 00007f99ecc01169 [ 72.813624][ T1890] RDX: 000000000000002c RSI: 0000400000000080 RDI: 000000000000000a [ 72.821435][ T1890] RBP: 00007f99eb26b090 R08: 0000000000000000 R09: 0000000000000000 [ 72.829249][ T1890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 72.837059][ T1890] R13: 0000000000000000 R14: 00007f99ece19fa0 R15: 00007ffc05e3e3e8 [ 72.844875][ T1890] [ 74.978338][ T1929] device syzkaller0 entered promiscuous mode [ 79.882102][ T2049] device syzkaller0 entered promiscuous mode [ 81.439354][ T2091] device veth1_macvtap left promiscuous mode [ 81.445922][ T2093] FAULT_INJECTION: forcing a failure. [ 81.445922][ T2093] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 81.551135][ T2093] CPU: 0 PID: 2093 Comm: syz.2.648 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 81.560788][ T2093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 81.570683][ T2093] Call Trace: [ 81.573914][ T2093] [ 81.576690][ T2093] dump_stack_lvl+0x151/0x1c0 [ 81.581204][ T2093] ? io_uring_drop_tctx_refs+0x190/0x190 [ 81.586672][ T2093] ? ____fput+0x15/0x20 [ 81.590671][ T2093] ? syscall_exit_to_user_mode+0x26/0x160 [ 81.596221][ T2093] dump_stack+0x15/0x20 [ 81.600213][ T2093] should_fail+0x3c6/0x510 [ 81.604465][ T2093] should_fail_usercopy+0x1a/0x20 [ 81.609323][ T2093] _copy_to_user+0x20/0x90 [ 81.613575][ T2093] simple_read_from_buffer+0xc7/0x150 [ 81.618784][ T2093] proc_fail_nth_read+0x1a3/0x210 [ 81.623647][ T2093] ? proc_fault_inject_write+0x390/0x390 [ 81.629122][ T2093] ? fsnotify_perm+0x269/0x5b0 [ 81.633713][ T2093] ? security_file_permission+0x86/0xb0 [ 81.639093][ T2093] ? proc_fault_inject_write+0x390/0x390 [ 81.644561][ T2093] vfs_read+0x27d/0xd40 [ 81.648555][ T2093] ? kernel_read+0x1f0/0x1f0 [ 81.652981][ T2093] ? __kasan_check_write+0x14/0x20 [ 81.657926][ T2093] ? mutex_lock+0xb6/0x1e0 [ 81.662181][ T2093] ? wait_for_completion_killable_timeout+0x10/0x10 [ 81.668604][ T2093] ? __fdget_pos+0x2e7/0x3a0 [ 81.673029][ T2093] ? ksys_read+0x77/0x2c0 [ 81.677198][ T2093] ksys_read+0x199/0x2c0 [ 81.681277][ T2093] ? __blkcg_punt_bio_submit+0x180/0x180 [ 81.686744][ T2093] ? vfs_write+0x1110/0x1110 [ 81.691172][ T2093] ? debug_smp_processor_id+0x17/0x20 [ 81.696378][ T2093] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 81.702280][ T2093] __x64_sys_read+0x7b/0x90 [ 81.706618][ T2093] x64_sys_call+0x28/0x9a0 [ 81.710870][ T2093] do_syscall_64+0x3b/0xb0 [ 81.715123][ T2093] ? clear_bhb_loop+0x35/0x90 [ 81.719638][ T2093] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 81.725372][ T2093] RIP: 0033:0x7fb6dd80ab7c [ 81.729621][ T2093] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 81.749153][ T2093] RSP: 002b:00007fb6dbe76030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 81.757401][ T2093] RAX: ffffffffffffffda RBX: 00007fb6dda24fa0 RCX: 00007fb6dd80ab7c [ 81.765208][ T2093] RDX: 000000000000000f RSI: 00007fb6dbe760a0 RDI: 0000000000000007 [ 81.773021][ T2093] RBP: 00007fb6dbe76090 R08: 0000000000000000 R09: 0000000000000000 [ 81.780830][ T2093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.788641][ T2093] R13: 0000000000000000 R14: 00007fb6dda24fa0 R15: 00007ffe870dad18 [ 81.796457][ T2093] [ 82.102091][ T30] audit: type=1400 audit(1741907873.614:132): avc: denied { ioctl } for pid=2103 comm="syz.1.652" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5828 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 82.224439][ T30] audit: type=1400 audit(1741907873.614:133): avc: denied { create } for pid=2103 comm="syz.1.652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 90.127553][ T30] audit: type=1400 audit(1741907881.634:134): avc: denied { create } for pid=2325 comm="syz.4.739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 92.859205][ T2419] FAULT_INJECTION: forcing a failure. [ 92.859205][ T2419] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 93.553131][ T2419] CPU: 0 PID: 2419 Comm: syz.3.773 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 93.562781][ T2419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 93.572678][ T2419] Call Trace: [ 93.575795][ T2419] [ 93.578576][ T2419] dump_stack_lvl+0x151/0x1c0 [ 93.583087][ T2419] ? io_uring_drop_tctx_refs+0x190/0x190 [ 93.588553][ T2419] ? __stack_depot_save+0x34/0x470 [ 93.593504][ T2419] dump_stack+0x15/0x20 [ 93.597495][ T2419] should_fail+0x3c6/0x510 [ 93.601802][ T2419] should_fail_alloc_page+0x5a/0x80 [ 93.606870][ T2419] prepare_alloc_pages+0x15c/0x700 [ 93.611816][ T2419] ? __alloc_pages+0x8f0/0x8f0 [ 93.616431][ T2419] ? __alloc_pages_bulk+0xd80/0xd80 [ 93.621451][ T2419] __alloc_pages+0x18c/0x8f0 [ 93.625879][ T2419] ? prep_new_page+0x110/0x110 [ 93.630477][ T2419] ? __kasan_kmalloc+0x9/0x10 [ 93.634991][ T2419] ? __kmalloc+0x13f/0x2c0 [ 93.639242][ T2419] ? __vmalloc_node_range+0x2d6/0x8d0 [ 93.644452][ T2419] __vmalloc_node_range+0x482/0x8d0 [ 93.649491][ T2419] bpf_map_area_alloc+0xd9/0xf0 [ 93.654169][ T2419] ? htab_map_alloc+0x3ed/0x1650 [ 93.658944][ T2419] htab_map_alloc+0x3ed/0x1650 [ 93.663547][ T2419] map_create+0x411/0x2050 [ 93.667799][ T2419] __sys_bpf+0x296/0x760 [ 93.671877][ T2419] ? bpf_link_show_fdinfo+0x300/0x300 [ 93.677090][ T2419] ? debug_smp_processor_id+0x17/0x20 [ 93.682294][ T2419] __x64_sys_bpf+0x7c/0x90 [ 93.686543][ T2419] x64_sys_call+0x87f/0x9a0 [ 93.690887][ T2419] do_syscall_64+0x3b/0xb0 [ 93.695136][ T2419] ? clear_bhb_loop+0x35/0x90 [ 93.699650][ T2419] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 93.705379][ T2419] RIP: 0033:0x7f4ce8a7e169 [ 93.709633][ T2419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.729073][ T2419] RSP: 002b:00007f4ce70e8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 93.737318][ T2419] RAX: ffffffffffffffda RBX: 00007f4ce8c96fa0 RCX: 00007f4ce8a7e169 [ 93.745131][ T2419] RDX: 0000000000000048 RSI: 00004000000002c0 RDI: 0000000000000000 [ 93.752942][ T2419] RBP: 00007f4ce70e8090 R08: 0000000000000000 R09: 0000000000000000 [ 93.760751][ T2419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 93.768566][ T2419] R13: 0000000000000000 R14: 00007f4ce8c96fa0 R15: 00007ffd16531748 [ 93.776382][ T2419] [ 98.272613][ T2535] FAULT_INJECTION: forcing a failure. [ 98.272613][ T2535] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 98.396337][ T2535] CPU: 0 PID: 2535 Comm: syz.3.829 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 98.405990][ T2535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 98.415891][ T2535] Call Trace: [ 98.419006][ T2535] [ 98.421785][ T2535] dump_stack_lvl+0x151/0x1c0 [ 98.426301][ T2535] ? io_uring_drop_tctx_refs+0x190/0x190 [ 98.431765][ T2535] ? tick_program_event+0x9f/0x120 [ 98.436714][ T2535] dump_stack+0x15/0x20 [ 98.440707][ T2535] should_fail+0x3c6/0x510 [ 98.444957][ T2535] should_fail_alloc_page+0x5a/0x80 [ 98.449989][ T2535] prepare_alloc_pages+0x15c/0x700 [ 98.454941][ T2535] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 98.461186][ T2535] ? __alloc_pages_bulk+0xd80/0xd80 [ 98.466217][ T2535] ? lapic_next_event+0x5f/0x70 [ 98.470910][ T2535] __alloc_pages+0x18c/0x8f0 [ 98.475333][ T2535] ? prep_new_page+0x110/0x110 [ 98.479938][ T2535] wp_page_copy+0x1d4/0x1b00 [ 98.484370][ T2535] ? perf_pmu_nop_void+0x9/0x10 [ 98.489047][ T2535] ? insert_page_into_pte_locked+0x4e0/0x4e0 [ 98.494865][ T2535] ? irqentry_exit+0x30/0x40 [ 98.499287][ T2535] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 98.504934][ T2535] do_wp_page+0x9ca/0xc90 [ 98.509102][ T2535] handle_pte_fault+0x7f1/0x28f0 [ 98.513874][ T2535] ? fault_around_bytes_set+0xc0/0xc0 [ 98.519075][ T2535] ? ktime_get+0x12f/0x160 [ 98.523333][ T2535] ? cgroup_rstat_updated+0xe5/0x370 [ 98.528456][ T2535] do_handle_mm_fault+0x20bc/0x2400 [ 98.533487][ T2535] ? numa_migrate_prep+0xe0/0xe0 [ 98.538267][ T2535] ? ctx_flexible_sched_in+0xa8/0x100 [ 98.543483][ T2535] ? irqentry_exit+0x30/0x40 [ 98.547892][ T2535] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 98.553537][ T2535] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 98.559624][ T2535] ? vmacache_find+0x215/0x4d0 [ 98.564225][ T2535] ? __sanitizer_cov_trace_pc+0x1/0x60 [ 98.569525][ T2535] ? __find_vma+0x136/0x150 [ 98.573856][ T2535] exc_page_fault+0x3b5/0x7f0 [ 98.578376][ T2535] asm_exc_page_fault+0x27/0x30 [ 98.583053][ T2535] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 98.589481][ T2535] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 98.608928][ T2535] RSP: 0018:ffffc90001117698 EFLAGS: 00050206 [ 98.614819][ T2535] RAX: ffffffff82643801 RBX: 0000400000000400 RCX: 000000000000f5d0 [ 98.622632][ T2535] RDX: 00000000000101d0 RSI: ffff88812c2c0cc8 RDI: 0000400000001000 [ 98.630444][ T2535] RBP: ffffc90001117800 R08: dffffc0000000000 R09: ffffed102585a053 [ 98.638345][ T2535] R10: 0000000000000003 R11: dffffc0000000001 R12: ffffc90001117cc8 [ 98.646155][ T2535] R13: 00000000000101d0 R14: ffff88812c2c00c8 R15: 00007ffffffff000 [ 98.653969][ T2535] ? _copy_to_iter+0x251/0xde0 [ 98.658564][ T2535] ? _copy_to_iter+0x2a3/0xde0 [ 98.663166][ T2535] ? iov_iter_init+0x190/0x190 [ 98.667766][ T2535] ? __check_object_size+0x73/0x3d0 [ 98.672799][ T2535] ? __check_object_size+0x161/0x3d0 [ 98.677920][ T2535] ? __kasan_check_read+0x11/0x20 [ 98.682778][ T2535] ? __check_object_size+0x2ec/0x3d0 [ 98.687900][ T2535] simple_copy_to_iter+0x50/0x70 [ 98.692674][ T2535] __skb_datagram_iter+0xd4/0x780 [ 98.697533][ T2535] ? tipc_sk_anc_data_recv+0x69c/0x990 [ 98.702829][ T2535] ? tsk_importance+0x150/0x150 [ 98.707513][ T2535] ? skb_copy_datagram_iter+0x170/0x170 [ 98.712901][ T2535] skb_copy_datagram_iter+0x43/0x170 [ 98.718020][ T2535] tipc_recvstream+0x7a4/0xf70 [ 98.722623][ T2535] ? tipc_sendstream+0x70/0x70 [ 98.727218][ T2535] ? security_socket_recvmsg+0x87/0xb0 [ 98.732527][ T2535] ? tipc_sendstream+0x70/0x70 [ 98.737115][ T2535] ____sys_recvmsg+0x286/0x530 [ 98.741712][ T2535] ? __sys_recvmsg_sock+0x50/0x50 [ 98.746580][ T2535] ? import_iovec+0xe5/0x120 [ 98.750998][ T2535] ___sys_recvmsg+0x1ec/0x690 [ 98.755513][ T2535] ? __sys_recvmsg+0x260/0x260 [ 98.760114][ T2535] ? enqueue_hrtimer+0xca/0x240 [ 98.764813][ T2535] ? __hrtimer_run_queues+0xa6f/0xad0 [ 98.770012][ T2535] ? __fdget+0x1bc/0x240 [ 98.774086][ T2535] __x64_sys_recvmsg+0x1dc/0x2b0 [ 98.778861][ T2535] ? ___sys_recvmsg+0x690/0x690 [ 98.783550][ T2535] x64_sys_call+0x171/0x9a0 [ 98.787885][ T2535] do_syscall_64+0x3b/0xb0 [ 98.792138][ T2535] ? clear_bhb_loop+0x35/0x90 [ 98.796654][ T2535] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 98.802381][ T2535] RIP: 0033:0x7f4ce8a7e169 [ 98.806634][ T2535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 98.826075][ T2535] RSP: 002b:00007f4ce70e8038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 98.834325][ T2535] RAX: ffffffffffffffda RBX: 00007f4ce8c96fa0 RCX: 00007f4ce8a7e169 [ 98.842131][ T2535] RDX: 0000000000001f00 RSI: 0000400000000500 RDI: 0000000000000005 [ 98.849943][ T2535] RBP: 00007f4ce70e8090 R08: 0000000000000000 R09: 0000000000000000 [ 98.857763][ T2535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 98.865705][ T2535] R13: 0000000000000000 R14: 00007f4ce8c96fa0 R15: 00007ffd16531748 [ 98.873502][ T2535] [ 102.842789][ T2629] FAULT_INJECTION: forcing a failure. [ 102.842789][ T2629] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 102.904775][ T2629] CPU: 0 PID: 2629 Comm: syz.1.855 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 102.914427][ T2629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 102.924323][ T2629] Call Trace: [ 102.927536][ T2629] [ 102.930308][ T2629] dump_stack_lvl+0x151/0x1c0 [ 102.934825][ T2629] ? io_uring_drop_tctx_refs+0x190/0x190 [ 102.940290][ T2629] ? free_unref_page+0x2b3/0x750 [ 102.945157][ T2629] dump_stack+0x15/0x20 [ 102.949153][ T2629] should_fail+0x3c6/0x510 [ 102.953404][ T2629] should_fail_usercopy+0x1a/0x20 [ 102.958258][ T2629] _copy_to_user+0x20/0x90 [ 102.962511][ T2629] simple_read_from_buffer+0xc7/0x150 [ 102.967719][ T2629] proc_fail_nth_read+0x1a3/0x210 [ 102.972670][ T2629] ? proc_fault_inject_write+0x390/0x390 [ 102.978137][ T2629] ? fsnotify_perm+0x269/0x5b0 [ 102.982738][ T2629] ? security_file_permission+0x86/0xb0 [ 102.988112][ T2629] ? proc_fault_inject_write+0x390/0x390 [ 102.993583][ T2629] vfs_read+0x27d/0xd40 [ 102.997574][ T2629] ? kernel_read+0x1f0/0x1f0 [ 103.002002][ T2629] ? __kasan_check_write+0x14/0x20 [ 103.006944][ T2629] ? mutex_lock+0xb6/0x1e0 [ 103.011205][ T2629] ? wait_for_completion_killable_timeout+0x10/0x10 [ 103.017628][ T2629] ? __fdget_pos+0x2e7/0x3a0 [ 103.022050][ T2629] ? ksys_read+0x77/0x2c0 [ 103.026327][ T2629] ksys_read+0x199/0x2c0 [ 103.030397][ T2629] ? vfs_write+0x1110/0x1110 [ 103.034824][ T2629] ? __kasan_check_write+0x14/0x20 [ 103.039773][ T2629] ? switch_fpu_return+0x15f/0x2e0 [ 103.044718][ T2629] __x64_sys_read+0x7b/0x90 [ 103.049069][ T2629] x64_sys_call+0x28/0x9a0 [ 103.053309][ T2629] do_syscall_64+0x3b/0xb0 [ 103.057568][ T2629] ? clear_bhb_loop+0x35/0x90 [ 103.062079][ T2629] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 103.067805][ T2629] RIP: 0033:0x7f59db978b7c [ 103.072059][ T2629] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 103.091503][ T2629] RSP: 002b:00007f59d9fe4030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 103.099750][ T2629] RAX: ffffffffffffffda RBX: 00007f59dbb92fa0 RCX: 00007f59db978b7c [ 103.107641][ T2629] RDX: 000000000000000f RSI: 00007f59d9fe40a0 RDI: 0000000000000005 [ 103.115452][ T2629] RBP: 00007f59d9fe4090 R08: 0000000000000000 R09: 0000000000000000 [ 103.123272][ T2629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.131079][ T2629] R13: 0000000000000000 R14: 00007f59dbb92fa0 R15: 00007ffe7c1161e8 [ 103.138897][ T2629] [ 106.805249][ T2727] device pim6reg1 entered promiscuous mode [ 108.077843][ T2751] device sit0 entered promiscuous mode [ 108.263578][ T2762] FAULT_INJECTION: forcing a failure. [ 108.263578][ T2762] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 108.290186][ T2762] CPU: 1 PID: 2762 Comm: syz.4.911 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 108.299926][ T2762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 108.309815][ T2762] Call Trace: [ 108.312950][ T2762] [ 108.315717][ T2762] dump_stack_lvl+0x151/0x1c0 [ 108.320232][ T2762] ? io_uring_drop_tctx_refs+0x190/0x190 [ 108.325710][ T2762] dump_stack+0x15/0x20 [ 108.329693][ T2762] should_fail+0x3c6/0x510 [ 108.333946][ T2762] should_fail_alloc_page+0x5a/0x80 [ 108.338979][ T2762] prepare_alloc_pages+0x15c/0x700 [ 108.343928][ T2762] ? __alloc_pages+0x8f0/0x8f0 [ 108.348534][ T2762] ? __alloc_pages_bulk+0xd80/0xd80 [ 108.353562][ T2762] __alloc_pages+0x18c/0x8f0 [ 108.357986][ T2762] ? prep_new_page+0x110/0x110 [ 108.362589][ T2762] ? __kasan_kmalloc+0x9/0x10 [ 108.367097][ T2762] ? __kmalloc+0x13f/0x2c0 [ 108.371352][ T2762] __vmalloc_node_range+0x482/0x8d0 [ 108.376389][ T2762] bpf_map_area_alloc+0xd9/0xf0 [ 108.381071][ T2762] ? dev_map_create_hash+0x29/0x1c0 [ 108.386105][ T2762] dev_map_create_hash+0x29/0x1c0 [ 108.390961][ T2762] ? bpf_map_init_from_attr+0x15b/0x380 [ 108.396343][ T2762] dev_map_alloc+0x2d4/0x530 [ 108.400775][ T2762] map_create+0x411/0x2050 [ 108.405023][ T2762] __sys_bpf+0x296/0x760 [ 108.409099][ T2762] ? fput_many+0x160/0x1b0 [ 108.413353][ T2762] ? bpf_link_show_fdinfo+0x300/0x300 [ 108.418566][ T2762] ? debug_smp_processor_id+0x17/0x20 [ 108.423769][ T2762] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 108.429673][ T2762] __x64_sys_bpf+0x7c/0x90 [ 108.433925][ T2762] x64_sys_call+0x87f/0x9a0 [ 108.438263][ T2762] do_syscall_64+0x3b/0xb0 [ 108.442521][ T2762] ? clear_bhb_loop+0x35/0x90 [ 108.447031][ T2762] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 108.452760][ T2762] RIP: 0033:0x7fd75dce9169 [ 108.457013][ T2762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 108.476457][ T2762] RSP: 002b:00007fd75c353038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 108.484702][ T2762] RAX: ffffffffffffffda RBX: 00007fd75df01fa0 RCX: 00007fd75dce9169 [ 108.492508][ T2762] RDX: 0000000000000048 RSI: 0000400000000000 RDI: 0000000000000000 [ 108.500320][ T2762] RBP: 00007fd75c353090 R08: 0000000000000000 R09: 0000000000000000 [ 108.508135][ T2762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 108.515944][ T2762] R13: 0000000000000000 R14: 00007fd75df01fa0 R15: 00007fff298eda58 [ 108.523761][ T2762] [ 109.492971][ T289] syz-executor (289) used greatest stack depth: 20688 bytes left [ 109.845762][ T2807] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.892465][ T2807] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.928388][ T2807] device bridge_slave_0 entered promiscuous mode [ 109.938772][ T2807] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.945947][ T2807] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.953513][ T2807] device bridge_slave_1 entered promiscuous mode [ 110.085991][ T2807] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.092917][ T2807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.099995][ T2807] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.106877][ T2807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.121720][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.129388][ T312] device bridge_slave_0 left promiscuous mode [ 110.135708][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.157250][ T312] device veth0_vlan left promiscuous mode [ 110.304811][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.312603][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.319887][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.332169][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 110.340295][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.347280][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.354775][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.364143][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.371057][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.393607][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 110.412165][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 110.420687][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 110.435463][ T2807] device veth0_vlan entered promiscuous mode [ 110.452110][ T2807] device veth1_macvtap entered promiscuous mode [ 110.459204][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.471265][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.485859][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.493736][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 110.517018][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 110.527967][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 110.544249][ T30] audit: type=1400 audit(1741907902.054:135): avc: denied { mounton } for pid=2807 comm="syz-executor" path="/root/syzkaller.Bic6O8/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 110.573215][ T30] audit: type=1400 audit(1741907902.054:136): avc: denied { mount } for pid=2807 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 110.595000][ T30] audit: type=1400 audit(1741907902.084:137): avc: denied { mounton } for pid=2807 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 110.902991][ T30] audit: type=1400 audit(1741907902.414:138): avc: denied { create } for pid=2860 comm="syz.3.948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 110.952108][ T2861] device veth0_vlan left promiscuous mode [ 110.961531][ T2861] device veth0_vlan entered promiscuous mode [ 110.993988][ T30] audit: type=1400 audit(1741907902.504:139): avc: denied { write } for pid=2860 comm="syz.3.948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 111.087935][ T2857] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.101731][ T2857] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.119197][ T2857] device bridge_slave_0 entered promiscuous mode [ 111.138290][ T2857] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.175740][ T2857] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.194910][ T2857] device bridge_slave_1 entered promiscuous mode [ 111.208261][ T2880] device veth0_vlan left promiscuous mode [ 111.214793][ T2880] FAULT_INJECTION: forcing a failure. [ 111.214793][ T2880] name failslab, interval 1, probability 0, space 0, times 0 [ 111.227461][ T2880] CPU: 1 PID: 2880 Comm: syz.3.954 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 111.237093][ T2880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 111.246987][ T2880] Call Trace: [ 111.250108][ T2880] [ 111.252885][ T2880] dump_stack_lvl+0x151/0x1c0 [ 111.257405][ T2880] ? io_uring_drop_tctx_refs+0x190/0x190 [ 111.262867][ T2880] ? __kasan_check_write+0x14/0x20 [ 111.267815][ T2880] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 111.272680][ T2880] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 111.277711][ T2880] dump_stack+0x15/0x20 [ 111.281701][ T2880] should_fail+0x3c6/0x510 [ 111.285960][ T2880] __should_failslab+0xa4/0xe0 [ 111.290555][ T2880] ? fib_table_insert+0x853/0x20c0 [ 111.295511][ T2880] should_failslab+0x9/0x20 [ 111.299841][ T2880] slab_pre_alloc_hook+0x37/0xd0 [ 111.304617][ T2880] ? fib_table_insert+0x853/0x20c0 [ 111.309568][ T2880] kmem_cache_alloc+0x44/0x250 [ 111.314165][ T2880] fib_table_insert+0x853/0x20c0 [ 111.318949][ T2880] ? fib_alias_hw_flags_set+0xb20/0xb20 [ 111.324323][ T2880] fib_add_ifaddr+0xb7d/0x15e0 [ 111.328925][ T2880] ? nlmsg_parse_deprecated_strict+0xf0/0xf0 [ 111.334734][ T2880] ? __local_bh_enable_ip+0x58/0x80 [ 111.339766][ T2880] ? _raw_spin_unlock_bh+0x51/0x60 [ 111.344712][ T2880] ? dev_mc_add+0xa7/0xd0 [ 111.348880][ T2880] ? igmp_group_added+0x1fa/0x800 [ 111.353740][ T2880] ? igmpv3_del_delrec+0x740/0x740 [ 111.358693][ T2880] ? __kasan_check_write+0x14/0x20 [ 111.363635][ T2880] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 111.368504][ T2880] ? igmp_group_added+0x1fa/0x800 [ 111.373355][ T2880] ? igmpv3_del_delrec+0x740/0x740 [ 111.378301][ T2880] ? __local_bh_enable_ip+0x58/0x80 [ 111.383337][ T2880] ? _raw_spin_unlock_bh+0x51/0x60 [ 111.388289][ T2880] ? inetdev_event+0xe0c/0x10a0 [ 111.392972][ T2880] ? devinet_exit_net+0x230/0x230 [ 111.397834][ T2880] fib_netdev_event+0x235/0x5d0 [ 111.402521][ T2880] raw_notifier_call_chain+0x8c/0xf0 [ 111.407639][ T2880] __dev_notify_flags+0x304/0x610 [ 111.412503][ T2880] ? __kasan_check_read+0x11/0x20 [ 111.417364][ T2880] ? __dev_change_flags+0x6e0/0x6e0 [ 111.422393][ T2880] ? __dev_change_flags+0x505/0x6e0 [ 111.427428][ T2880] ? dev_get_flags+0x1e0/0x1e0 [ 111.432031][ T2880] dev_change_flags+0xf0/0x1a0 [ 111.436632][ T2880] dev_ifsioc+0x147/0x10c0 [ 111.440881][ T2880] ? dev_ioctl+0xe70/0xe70 [ 111.445130][ T2880] ? mutex_lock+0x135/0x1e0 [ 111.449473][ T2880] ? wait_for_completion_killable_timeout+0x10/0x10 [ 111.455897][ T2880] dev_ioctl+0x54d/0xe70 [ 111.459974][ T2880] sock_do_ioctl+0x34f/0x5a0 [ 111.464402][ T2880] ? sock_show_fdinfo+0xa0/0xa0 [ 111.469090][ T2880] ? selinux_file_ioctl+0x3cc/0x540 [ 111.474121][ T2880] sock_ioctl+0x455/0x740 [ 111.478287][ T2880] ? sock_poll+0x400/0x400 [ 111.482542][ T2880] ? __fget_files+0x31e/0x380 [ 111.487058][ T2880] ? security_file_ioctl+0x84/0xb0 [ 111.492001][ T2880] ? sock_poll+0x400/0x400 [ 111.496253][ T2880] __se_sys_ioctl+0x114/0x190 [ 111.500768][ T2880] __x64_sys_ioctl+0x7b/0x90 [ 111.505196][ T2880] x64_sys_call+0x98/0x9a0 [ 111.509445][ T2880] do_syscall_64+0x3b/0xb0 [ 111.513701][ T2880] ? clear_bhb_loop+0x35/0x90 [ 111.518212][ T2880] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 111.523939][ T2880] RIP: 0033:0x7f4ce8a7e169 [ 111.528192][ T2880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 111.547641][ T2880] RSP: 002b:00007f4ce70c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 111.555878][ T2880] RAX: ffffffffffffffda RBX: 00007f4ce8c97080 RCX: 00007f4ce8a7e169 [ 111.563692][ T2880] RDX: 0000400000000000 RSI: 0000000000008914 RDI: 0000000000000008 [ 111.571506][ T2880] RBP: 00007f4ce70c7090 R08: 0000000000000000 R09: 0000000000000000 [ 111.579312][ T2880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.587124][ T2880] R13: 0000000000000000 R14: 00007f4ce8c97080 R15: 00007ffd16531748 [ 111.595118][ T2880] [ 111.599538][ T2880] device veth0_vlan entered promiscuous mode [ 111.868623][ T2900] device veth0_vlan left promiscuous mode [ 111.900146][ T2900] device veth0_vlan entered promiscuous mode [ 112.103436][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 112.111504][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 112.173817][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 112.191730][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 112.203091][ T521] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.209951][ T521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.218929][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.238511][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.247216][ T521] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.254098][ T521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.284455][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 112.298080][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.309083][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.335845][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 112.349474][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.357732][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.365391][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.376035][ T2857] device veth0_vlan entered promiscuous mode [ 112.401202][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 112.414818][ T2857] device veth1_macvtap entered promiscuous mode [ 112.428089][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 112.441768][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 112.464198][ T30] audit: type=1400 audit(1741907903.974:140): avc: denied { setopt } for pid=2922 comm="syz.4.971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 112.765139][ T2941] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.772034][ T2941] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.779345][ T2941] device bridge_slave_0 entered promiscuous mode [ 112.787193][ T2941] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.794323][ T2941] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.801942][ T2941] device bridge_slave_1 entered promiscuous mode [ 112.882375][ T312] device bridge_slave_1 left promiscuous mode [ 112.888443][ T30] audit: type=1400 audit(1741907904.384:141): avc: denied { read } for pid=2949 comm="syz.2.988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 112.907856][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.935381][ T312] device bridge_slave_0 left promiscuous mode [ 112.941447][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.954190][ T312] device veth1_macvtap left promiscuous mode [ 112.960155][ T312] device veth0_vlan left promiscuous mode [ 113.151286][ T2941] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.158211][ T2941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.165347][ T2941] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.172203][ T2941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.327804][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.339350][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.361534][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.429589][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.481291][ T521] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.488192][ T521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.509934][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.518186][ T521] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.525098][ T521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.532519][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 113.540454][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.582114][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 113.597562][ T2941] device veth0_vlan entered promiscuous mode [ 113.604464][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.613990][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.621783][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 113.658396][ T2941] device veth1_macvtap entered promiscuous mode [ 113.687322][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 113.745920][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.787243][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 114.259657][ T2997] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.267118][ T2997] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.274969][ T2997] device bridge_slave_0 entered promiscuous mode [ 114.291844][ T2997] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.298972][ T2997] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.306505][ T2997] device bridge_slave_1 entered promiscuous mode [ 114.366881][ T2997] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.373745][ T2997] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.380870][ T2997] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.387724][ T2997] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.418387][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 114.425867][ T361] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.433286][ T361] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.442587][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.450653][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.457511][ T361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.482302][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 114.490482][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.498949][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.505829][ T361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.513152][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.521270][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.531449][ T312] device bridge_slave_1 left promiscuous mode [ 114.537382][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.544822][ T312] device bridge_slave_0 left promiscuous mode [ 114.550908][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.558766][ T312] device veth1_macvtap left promiscuous mode [ 114.564643][ T312] device veth0_vlan left promiscuous mode [ 114.646793][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.654778][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.662281][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.671186][ T2997] device veth0_vlan entered promiscuous mode [ 114.682272][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 114.692496][ T2997] device veth1_macvtap entered promiscuous mode [ 114.701966][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 114.710056][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 114.719912][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 114.728277][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 115.279077][ T3009] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.285973][ T3009] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.293473][ T3009] device bridge_slave_0 entered promiscuous mode [ 115.303232][ T3009] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.310067][ T3009] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.317379][ T3009] device bridge_slave_1 entered promiscuous mode [ 115.367710][ T3009] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.374579][ T3009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.381688][ T3009] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.388446][ T3009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.413782][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 115.421496][ T361] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.428574][ T361] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.442087][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 115.450087][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.456958][ T361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.466048][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 115.474146][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.481003][ T361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.497046][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 115.506577][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 115.521133][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 115.530091][ T312] device bridge_slave_1 left promiscuous mode [ 115.536521][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.543911][ T312] device bridge_slave_0 left promiscuous mode [ 115.549821][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.557827][ T312] device bridge_slave_1 left promiscuous mode [ 115.563816][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.571149][ T312] device bridge_slave_0 left promiscuous mode [ 115.577062][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.585235][ T312] device veth1_macvtap left promiscuous mode [ 115.591058][ T312] device veth0_vlan left promiscuous mode [ 115.596839][ T312] device veth1_macvtap left promiscuous mode [ 115.602705][ T312] device veth0_vlan left promiscuous mode [ 115.777620][ T3009] device veth0_vlan entered promiscuous mode [ 115.784699][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.792903][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.800143][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.812029][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 115.820111][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 115.829834][ T3009] device veth1_macvtap entered promiscuous mode [ 115.839670][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 115.847197][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 115.855562][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 115.865038][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 115.873281][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 116.586584][ T3016] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.593532][ T3016] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.600619][ T3016] device bridge_slave_0 entered promiscuous mode [ 116.607447][ T3016] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.614349][ T3016] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.621593][ T3016] device bridge_slave_1 entered promiscuous mode [ 116.669770][ T3016] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.676632][ T3016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.683753][ T3016] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.690503][ T3016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.713029][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 116.720627][ T361] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.727923][ T361] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.737696][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 116.745956][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.752819][ T361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.763323][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 116.771419][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.778258][ T361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.792666][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 116.800576][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 116.809629][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 116.817644][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 116.835631][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 116.843866][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 116.854822][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 116.862883][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 116.870734][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 116.878038][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 116.888259][ T3016] device veth0_vlan entered promiscuous mode [ 116.899346][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 116.907462][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 116.918148][ T3016] device veth1_macvtap entered promiscuous mode [ 116.927781][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 116.935287][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 116.943570][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 116.952449][ T312] device bridge_slave_1 left promiscuous mode [ 116.958380][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.965877][ T312] device bridge_slave_0 left promiscuous mode [ 116.971853][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.979600][ T312] device veth1_macvtap left promiscuous mode [ 116.985504][ T312] device veth0_vlan left promiscuous mode [ 117.093729][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 117.101853][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 117.844180][ T3022] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.851453][ T3022] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.858730][ T3022] device bridge_slave_0 entered promiscuous mode [ 117.868134][ T3022] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.875022][ T3022] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.882362][ T3022] device bridge_slave_1 entered promiscuous mode [ 117.944340][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 117.951816][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 117.960365][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 117.968691][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 117.977073][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.983950][ T361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 117.991512][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 118.002135][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 118.010299][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 118.018311][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.025172][ T361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.037848][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 118.047061][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 118.062747][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 118.074397][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.082694][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 118.089885][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 118.097996][ T312] device bridge_slave_1 left promiscuous mode [ 118.104076][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.111696][ T312] device bridge_slave_0 left promiscuous mode [ 118.117616][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.125517][ T312] device veth1_macvtap left promiscuous mode [ 118.131376][ T312] device veth0_vlan left promiscuous mode [ 118.253459][ T3022] device veth0_vlan entered promiscuous mode [ 118.263874][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 118.272848][ T3022] device veth1_macvtap entered promiscuous mode [ 118.282399][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 118.292674][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 119.151935][ T3028] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.158782][ T3028] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.166230][ T3028] device bridge_slave_0 entered promiscuous mode [ 119.175003][ T3028] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.181863][ T3028] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.189040][ T3028] device bridge_slave_1 entered promiscuous mode [ 119.236713][ T3028] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.243598][ T3028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 119.250647][ T3028] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.257477][ T3028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 119.271451][ T312] device bridge_slave_1 left promiscuous mode [ 119.277385][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.284854][ T312] device bridge_slave_0 left promiscuous mode [ 119.290812][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.298647][ T312] device veth1_macvtap left promiscuous mode [ 119.304889][ T312] device veth0_vlan left promiscuous mode [ 119.379003][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 119.386649][ T361] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.394200][ T361] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.403606][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 119.411664][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.418496][ T361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 119.427008][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 119.435046][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.441907][ T361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 119.455732][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 119.464790][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 119.478547][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 119.489949][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 119.497943][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 119.505340][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 119.513596][ T3028] device veth0_vlan entered promiscuous mode [ 119.523959][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 119.533595][ T3028] device veth1_macvtap entered promiscuous mode [ 119.544021][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 119.554049][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 120.411797][ T312] device bridge_slave_1 left promiscuous mode [ 120.417751][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.425109][ T312] device bridge_slave_0 left promiscuous mode [ 120.431070][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.438786][ T312] device veth1_macvtap left promiscuous mode [ 120.444659][ T312] device veth0_vlan left promiscuous mode [ 120.602659][ T3035] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.609506][ T3035] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.616866][ T3035] device bridge_slave_0 entered promiscuous mode [ 120.624073][ T3035] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.630982][ T3035] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.638121][ T3035] device bridge_slave_1 entered promiscuous mode [ 120.686214][ T3035] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.693076][ T3035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 120.700241][ T3035] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.707069][ T3035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.726875][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.734476][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.741812][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.751123][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 120.759144][ T521] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.766013][ T521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.774645][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 120.782695][ T521] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.789522][ T521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 120.802470][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 120.811627][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 120.836853][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 120.848855][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.856963][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 120.864594][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 120.872887][ T3035] device veth0_vlan entered promiscuous mode [ 120.883601][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 120.892679][ T3035] device veth1_macvtap entered promiscuous mode [ 120.902144][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 120.910257][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 120.919810][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 120.928175][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 121.891758][ T521] device bridge_slave_1 left promiscuous mode [ 121.897701][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.905634][ T521] device bridge_slave_0 left promiscuous mode [ 121.911628][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.919564][ T521] device veth1_macvtap left promiscuous mode [ 121.925736][ T521] device veth0_vlan left promiscuous mode [ 122.082775][ T3041] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.089621][ T3041] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.097246][ T3041] device bridge_slave_0 entered promiscuous mode [ 122.104687][ T3041] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.111551][ T3041] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.118796][ T3041] device bridge_slave_1 entered promiscuous mode [ 122.167525][ T3041] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.174405][ T3041] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.181518][ T3041] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.188284][ T3041] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.208431][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.216153][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.224069][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.233593][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.241621][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.248454][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.257262][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.265410][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.272287][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.287059][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 122.295647][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 122.313367][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 122.324854][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 122.332846][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 122.340043][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 122.348400][ T3041] device veth0_vlan entered promiscuous mode [ 122.358719][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 122.368146][ T3041] device veth1_macvtap entered promiscuous mode [ 122.377948][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 122.388085][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 123.132313][ T521] device bridge_slave_1 left promiscuous mode [ 123.138256][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.145649][ T521] device bridge_slave_0 left promiscuous mode [ 123.151656][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.159252][ T521] device veth1_macvtap left promiscuous mode [ 123.165207][ T521] device veth0_vlan left promiscuous mode [ 123.518451][ T3048] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.525428][ T3048] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.532837][ T3048] device bridge_slave_0 entered promiscuous mode [ 123.539562][ T3048] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.546576][ T3048] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.553723][ T3048] device bridge_slave_1 entered promiscuous mode [ 123.606921][ T3048] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.613932][ T3048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.621043][ T3048] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.627802][ T3048] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.648122][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 123.655909][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.663082][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.673197][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 123.681221][ T521] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.688044][ T521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.696839][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 123.704818][ T521] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.711666][ T521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.724427][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 123.733631][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 123.747466][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 123.758877][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 123.767023][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 123.774532][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 123.783033][ T3048] device veth0_vlan entered promiscuous mode [ 123.793144][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 123.802240][ T3048] device veth1_macvtap entered promiscuous mode [ 123.811632][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 123.821996][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 124.571690][ T521] device bridge_slave_1 left promiscuous mode [ 124.577624][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.585182][ T521] device bridge_slave_0 left promiscuous mode [ 124.591143][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.598745][ T521] device veth1_macvtap left promiscuous mode [ 124.604610][ T521] device veth0_vlan left promiscuous mode [ 125.055939][ T3054] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.062819][ T3054] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.069990][ T3054] device bridge_slave_0 entered promiscuous mode [ 125.076771][ T3054] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.083621][ T3054] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.090845][ T3054] device bridge_slave_1 entered promiscuous mode [ 125.136599][ T3054] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.143455][ T3054] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.150533][ T3054] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.157377][ T3054] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.165541][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.172798][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.192097][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 125.199427][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 125.208296][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 125.216476][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.224519][ T521] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.231371][ T521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.239919][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 125.248250][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.256584][ T521] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.263438][ T521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.275504][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 125.283467][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 125.292520][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 125.300438][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 125.314026][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 125.322306][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 125.334128][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 125.341904][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.350131][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.357494][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 125.365974][ T3054] device veth0_vlan entered promiscuous mode [ 125.376757][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 125.384820][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 125.393961][ T3054] device veth1_macvtap entered promiscuous mode [ 125.403354][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 125.411197][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 125.419284][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 125.428937][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 125.437135][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 126.451443][ T521] device bridge_slave_1 left promiscuous mode [ 126.457375][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.464785][ T521] device bridge_slave_0 left promiscuous mode [ 126.470702][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.478693][ T521] device veth1_macvtap left promiscuous mode [ 126.484524][ T521] device veth0_vlan left promiscuous mode [ 126.807333][ T3061] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.814374][ T3061] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.821891][ T3061] device bridge_slave_0 entered promiscuous mode [ 126.828644][ T3061] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.835552][ T3061] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.842712][ T3061] device bridge_slave_1 entered promiscuous mode [ 126.895329][ T3061] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.902188][ T3061] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.909257][ T3061] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.916088][ T3061] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.935770][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 126.943318][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.950421][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.960350][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 126.968391][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.975258][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.983858][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 126.991890][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.998721][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.011510][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 127.020573][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 127.034852][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 127.046180][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 127.054244][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 127.061798][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 127.069808][ T3061] device veth0_vlan entered promiscuous mode [ 127.080191][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 127.089331][ T3061] device veth1_macvtap entered promiscuous mode [ 127.098790][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 127.109185][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 127.811570][ T312] device bridge_slave_1 left promiscuous mode [ 127.817501][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.824853][ T312] device bridge_slave_0 left promiscuous mode [ 127.830897][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.838515][ T312] device veth1_macvtap left promiscuous mode [ 127.844378][ T312] device veth0_vlan left promiscuous mode [ 128.550936][ T3068] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.557904][ T3068] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.565251][ T3068] device bridge_slave_0 entered promiscuous mode [ 128.571988][ T3068] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.578824][ T3068] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.586257][ T3068] device bridge_slave_1 entered promiscuous mode [ 128.631201][ T3068] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.638047][ T3068] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.645178][ T3068] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.651954][ T3068] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.672673][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.680074][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.687493][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.696392][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.704575][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.711434][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.719964][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.728172][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.735033][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.747484][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 128.757164][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.771182][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 128.782955][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 128.791354][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 128.798591][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 128.806923][ T3068] device veth0_vlan entered promiscuous mode [ 128.817624][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 128.827200][ T3068] device veth1_macvtap entered promiscuous mode [ 128.836811][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 128.846594][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 129.611745][ T312] device bridge_slave_1 left promiscuous mode [ 129.617700][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.625132][ T312] device bridge_slave_0 left promiscuous mode [ 129.631159][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.638859][ T312] device veth1_macvtap left promiscuous mode [ 129.644784][ T312] device veth0_vlan left promiscuous mode [ 130.373745][ T3074] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.380611][ T3074] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.387883][ T3074] device bridge_slave_0 entered promiscuous mode [ 130.394547][ T3074] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.401408][ T3074] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.408555][ T3074] device bridge_slave_1 entered promiscuous mode [ 130.455035][ T3074] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.461903][ T3074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.468984][ T3074] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.475798][ T3074] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.496130][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.503842][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.510937][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.519946][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 130.528201][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.535053][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.543754][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 130.551850][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.558683][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.571246][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.580499][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.594886][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.606156][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.614233][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.621576][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.629634][ T3074] device veth0_vlan entered promiscuous mode [ 130.639884][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.648981][ T3074] device veth1_macvtap entered promiscuous mode [ 130.658433][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 130.668738][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 131.451927][ T312] device bridge_slave_1 left promiscuous mode [ 131.457895][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.465445][ T312] device bridge_slave_0 left promiscuous mode [ 131.471468][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.479632][ T312] device veth1_macvtap left promiscuous mode [ 131.485582][ T312] device veth0_vlan left promiscuous mode [ 132.313203][ T3081] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.320053][ T3081] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.327399][ T3081] device bridge_slave_0 entered promiscuous mode [ 132.334381][ T3081] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.341275][ T3081] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.348410][ T3081] device bridge_slave_1 entered promiscuous mode [ 132.393703][ T3081] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.400549][ T3081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.407711][ T3081] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.414582][ T3081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.435373][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.442915][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.449923][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.459718][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.467842][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.474701][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.483235][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.491342][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.498183][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.511618][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.521184][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.535795][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 132.547161][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.555233][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.562531][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 132.570583][ T3081] device veth0_vlan entered promiscuous mode [ 132.581620][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 132.590389][ T3081] device veth1_macvtap entered promiscuous mode [ 132.599767][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.612634][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 133.571348][ T312] device bridge_slave_1 left promiscuous mode [ 133.577279][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.584660][ T312] device bridge_slave_0 left promiscuous mode [ 133.590587][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.598354][ T312] device veth1_macvtap left promiscuous mode [ 133.604224][ T312] device veth0_vlan left promiscuous mode [ 134.377653][ T3088] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.384541][ T3088] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.391811][ T3088] device bridge_slave_0 entered promiscuous mode [ 134.398454][ T3088] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.405380][ T3088] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.412626][ T3088] device bridge_slave_1 entered promiscuous mode [ 134.457843][ T3088] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.464735][ T3088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.471848][ T3088] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.478594][ T3088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.499243][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.506723][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.513859][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.523641][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.531635][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.538460][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.547145][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.555265][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.562126][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.575260][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.584703][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.599090][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 134.610533][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.618472][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.625975][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.634447][ T3088] device veth0_vlan entered promiscuous mode [ 134.645196][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.654445][ T3088] device veth1_macvtap entered promiscuous mode [ 134.664576][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 134.674753][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 135.531613][ T312] device bridge_slave_1 left promiscuous mode [ 135.537568][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.544943][ T312] device bridge_slave_0 left promiscuous mode [ 135.550968][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.558570][ T312] device veth1_macvtap left promiscuous mode [ 135.564503][ T312] device veth0_vlan left promiscuous mode [ 136.494021][ T3096] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.500894][ T3096] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.508064][ T3096] device bridge_slave_0 entered promiscuous mode [ 136.514858][ T3096] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.521710][ T3096] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.528926][ T3096] device bridge_slave_1 entered promiscuous mode [ 136.574926][ T3096] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.581799][ T3096] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.588858][ T3096] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.595691][ T3096] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.616409][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.623782][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.630826][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.639844][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 136.647930][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.654770][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.663839][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 136.671854][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.678678][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.692413][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 136.701076][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 136.715315][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 136.726661][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.734657][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 136.742091][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 136.750162][ T3096] device veth0_vlan entered promiscuous mode [ 136.760788][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 136.769897][ T3096] device veth1_macvtap entered promiscuous mode [ 136.779767][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 136.789953][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 137.571414][ T521] device bridge_slave_1 left promiscuous mode [ 137.577548][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.584956][ T521] device bridge_slave_0 left promiscuous mode [ 137.590994][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.598787][ T521] device veth1_macvtap left promiscuous mode [ 137.604644][ T521] device veth0_vlan left promiscuous mode [ 138.725461][ T3103] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.732386][ T3103] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.739529][ T3103] device bridge_slave_0 entered promiscuous mode [ 138.746363][ T3103] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.753359][ T3103] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.760519][ T3103] device bridge_slave_1 entered promiscuous mode [ 138.807134][ T3103] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.814007][ T3103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.821119][ T3103] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.827869][ T3103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.848012][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.855410][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.862524][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.872211][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.880192][ T521] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.887043][ T521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.895795][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.903848][ T521] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.910673][ T521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.923315][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.932577][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.946493][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 138.957701][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.965670][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.973648][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.982059][ T3103] device veth0_vlan entered promiscuous mode [ 138.992343][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 139.001602][ T3103] device veth1_macvtap entered promiscuous mode [ 139.011618][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 139.021656][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 139.731740][ T521] device bridge_slave_1 left promiscuous mode [ 139.737671][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.745037][ T521] device bridge_slave_0 left promiscuous mode [ 139.751096][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.758836][ T521] device veth1_macvtap left promiscuous mode [ 139.764705][ T521] device veth0_vlan left promiscuous mode [ 141.112228][ T3110] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.119073][ T3110] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.126431][ T3110] device bridge_slave_0 entered promiscuous mode [ 141.133135][ T3110] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.139988][ T3110] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.147286][ T3110] device bridge_slave_1 entered promiscuous mode [ 141.193329][ T3110] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.200177][ T3110] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.207321][ T3110] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.214081][ T3110] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.234147][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 141.241551][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.248544][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.258056][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.266509][ T521] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.273388][ T521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.282182][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 141.290190][ T521] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.297054][ T521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.309547][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.318962][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 141.333085][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 141.344480][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.352474][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.359689][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.368140][ T3110] device veth0_vlan entered promiscuous mode [ 141.378711][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 141.387897][ T3110] device veth1_macvtap entered promiscuous mode [ 141.398512][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 141.408904][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 142.211486][ T521] device bridge_slave_1 left promiscuous mode [ 142.217416][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.224761][ T521] device bridge_slave_0 left promiscuous mode [ 142.230674][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.238438][ T521] device veth1_macvtap left promiscuous mode [ 142.244300][ T521] device veth0_vlan left promiscuous mode [ 143.548788][ T3118] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.555759][ T3118] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.563057][ T3118] device bridge_slave_0 entered promiscuous mode [ 143.569713][ T3118] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.576563][ T3118] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.583735][ T3118] device bridge_slave_1 entered promiscuous mode [ 143.642561][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 143.649939][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 143.658972][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 143.667098][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.675108][ T521] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.681957][ T521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.689327][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 143.698063][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 143.706241][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.714286][ T521] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.721142][ T521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.733429][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 143.742488][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 143.756921][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 143.768038][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.776088][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.783572][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 143.791856][ T3118] device veth0_vlan entered promiscuous mode [ 143.802310][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 143.811591][ T3118] device veth1_macvtap entered promiscuous mode [ 143.821261][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 143.829267][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 143.839418][ T521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=1 req=937 state=3 status=67 (errno 9: Bad file descriptor) [ 144.491762][ T521] device bridge_slave_1 left promiscuous mode [ 144.497783][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.505161][ T521] device bridge_slave_0 left promiscuous mode [ 144.511164][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.519107][ T521] device veth1_macvtap left promiscuous mode [ 144.524984][ T521] device veth0_vlan left promiscuous mode [ 146.011967][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.019151][ T521] device bridge_slave_0 left promiscuous mode [ 146.025129][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.033001][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.040150][ T521] device bridge_slave_0 left promiscuous mode [ 146.046157][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.053985][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.061342][ T521] device bridge_slave_0 left promiscuous mode [ 146.067260][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.074982][ T521] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.082121][ T521] device bridge_slave_0 left promiscuous mode [ 146.088022][ T521] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.096329][ T521] device veth1_macvtap left promiscuous mode [ 146.102163][ T521] device veth0_vlan left promiscuous mode [ 146.107832][ T521] device veth1_macvtap left promiscuous mode [ 146.113877][ T521] device veth1_macvtap left promiscuous mode [ 146.119686][ T521] device veth0_vlan left promiscuous mode [ 146.125635][ T521] device veth1_macvtap left promiscuous mode [ 146.131493][ T521] device veth0_vlan left promiscuous mode