last executing test programs: 14.135012494s ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000003c0)='hrtimer_init\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80ffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13.643692489s ago: executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeff, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12.539612568s ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000003c0)='hrtimer_init\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80ffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11.378473206s ago: executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeff, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 9.979880321s ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000003c0)='hrtimer_init\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80ffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 9.889959314s ago: executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeff, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 7.4395484s ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000003c0)='hrtimer_init\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80ffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 6.809618457s ago: executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeff, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 4.062492147s ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000003c0)='hrtimer_init\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80ffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 4.061128568s ago: executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeff, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.065973197s ago: executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000000)='ext4_request_blocks\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_request_blocks\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000020b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r4, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f00000003c0)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000680)=ANY=[@ANYRES16, @ANYRESDEC], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r6, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r5, &(0x7f0000000500)="cbc7ba2b3c8e6b16fd274220e93c7ce40e188d0774b064da99749cf43517e720dd060364bc8bdc1686eea322db5f52f6f4da73ebb5aa72b0d91e6d767d6f684ec2467c51916a07253ae5fcdd423e32481fadefb3fdc4c9b2199792e971cf5b727f7aa95c9f8c1d0153821140f5a38a29c8f58f6b3358bede946dc4cfe2a5c867bbb9f84f2db66887d65cd79c6bf524531a79445ebdd8650f4c9673ca6dd084b082c3701391c87ee7867e92c70d94fb8380d57e12c068b3", &(0x7f0000000780)=""/212}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) 909.459741ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0xe, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x2}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x9a}]}, &(0x7f0000000400)='syzkaller\x00'}, 0x80) write$cgroup_int(r2, &(0x7f0000000000), 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='io.stat\x00', 0x0, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000240)={0x1b, 0x0, 0x0, 0x6, 0x0, r0, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x18, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe5}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0x4b}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffb}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0x4d, &(0x7f0000000140)=""/77, 0x41100, 0x2, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f00000001c0)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000002c0)=[r0, r1, r0, r0, r1, r1, r3, r0, r0, r4], &(0x7f0000000300)=[{0x4, 0x4, 0x2, 0xa}, {0x0, 0x2, 0x0, 0xc}, {0x5, 0x4, 0x9}, {0x1, 0x5, 0xf, 0xa}, {0x4, 0x2, 0x5, 0x2}, {0x4, 0x3, 0x9, 0x6}], 0x10, 0x8c9d}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r5}, &(0x7f00000004c0), &(0x7f0000000500)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000), 0x248800) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7020000e88b0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='scsi_dispatch_cmd_start\x00', r10}, 0x10) write$cgroup_type(r8, &(0x7f0000000000), 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x15, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 876.292536ms ago: executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40c5) perf_event_open(&(0x7f00000002c0)={0x0, 0xffffffffffffff50, 0xfe, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5}, 0x8, 0xfffffffffffffffc, 0x2, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'veth1_to_batadv\x00', 0x7101}) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x63) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r4 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x11, &(0x7f0000000680)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000000), 0xffe000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYRES16, @ANYRESDEC=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6fe71af2c28a95}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x9, 0xa4e95020c50d7a06, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000440), 0xc}, 0x0, 0x0, 0x400, 0x0, 0x6}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xb) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x23, 0x69f, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000080)={r6, 0x0, 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f00000006c0)={0xffffffffffffffff, &(0x7f00000019c0), &(0x7f0000000700)=""/223}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 810.188107ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000000), &(0x7f00000003c0)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r4}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r9, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r8}, &(0x7f00000006c0), &(0x7f0000000700)=r7}, 0x20) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r6, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0x1c5380}], 0x1}, 0x3) 622.840665ms ago: executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b70300000000000085000000720000"], &(0x7f0000000200)='GPL\x00', 0x7ff, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008180000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r4}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000), 0x248800) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8021, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000000), 0x400000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) 524.90056ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xb}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000020001801000020646c2100000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000200), &(0x7f0000000400)}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x30020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 485.764506ms ago: executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r1, r0}, 0xc) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x20001, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1100}, 0x1d) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x3, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r3}, 0x10) 456.17695ms ago: executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e00)={{}, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f00000002c0)={0x1, 0xffffffffffffff36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0xe91, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x222c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000070200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="939de43e7378fd870e1da621327b49655bb9ce2504f9a0eaba6f101b95f19d04728217fb22b37d2cae22040faf84e42c69976633cc12ac1b23c2c4c5bbfbd89a8c6509671751c6ffcdefdbce149f5f11624650752c674a474fdd08f320613adc8303d4863f487166391bd4b73ba5f51fd47fa3bcd7c5400418e29f5a2835909ac36326acff4b40bb9e82d592a636da3028326b8d54fbe39190a81b00b9ae471ef670a6"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) 397.49053ms ago: executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000200)='task_rename\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x2000003, 0xe0, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0xe901, &(0x7f00000001c0)={r0, 0x0, 0x0}, 0x20) 381.772102ms ago: executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x1001) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x3, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 311.650973ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000800000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff89, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x9, 0x0}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{r0, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000600)=r1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r3, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xfa, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x2e, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d40)={&(0x7f0000000c00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xa, 0x3}]}]}, {0x0, [0x2e, 0x0, 0x61, 0x0]}}, &(0x7f0000000c40)=""/202, 0x32, 0xca, 0x1, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0x17, 0x8, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000004000000000000000700000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000002b703000000000000850000000c000000b700000000000000950000000000000048fd323e5d665ab15ff3493e6afefee7b8b1b5ad06008d568f9d73b2ff476b6be4e16fa8c6057808f148478a4f9a410616b79bdd43077448e3becdb9ea03812723af321aaa902c79c117d65ad5e11389a8da4029a9190b129999668795fb324d0b0a2d99abd0d9ac896172505319c0024de0649a481252130f56949b50a7"], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000780), 0x41100, 0x5, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000d80)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000dc0)={0x1, 0xc, 0x200, 0x3}, 0x10, r4, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)=[r2, r0, r0], &(0x7f0000000e40)=[{0x1, 0x5, 0xe, 0x3}, {0x0, 0x5, 0xd, 0xa7cb8595ff48b1bf}, {0x3, 0x2, 0x2, 0x9}, {0x0, 0x3, 0xd, 0x7}, {0x0, 0x4, 0x3, 0x1}, {0x4, 0x2, 0x10, 0xc}, {0x0, 0x6, 0x2, 0xaecf6fb2460ad7bb}, {0x2, 0x1, 0xd, 0x5}], 0x10, 0x9}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x27, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x0, 0x0, 0x21, 0x0, 0x0, 0xfffffc9a, r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000001040)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000090000001000000003000006040000000f0000000700000002000000000000000c000000050000001000000000000002040000000000302e2e305f00003e34c29b917133e733f4581ec1a53b313ebaab2d9b0266ca4f359cda0a7c0c1032cd98978e12aae56d7a340d0bc1e21f429b5a7a5472e95e92c36003f4f94e886ad1665816fc8642dd2bcb63f7453432b76a7e8f3c6795750fae5648dc2a30111a"], &(0x7f0000000300)=""/37, 0x51, 0x25, 0x1, 0x9}, 0x20) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x7, 0x42, 0x40}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0xfffffffa, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f00000003c0)=ANY=[@ANYRES64, @ANYRES32, @ANYRESOCT=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1d, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffd1d, 0x0, 0x0, 0x0, r9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000080850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b708000000000010"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001380)={{r10}, &(0x7f0000001200), &(0x7f0000001240)=r11}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r12}, 0x10) 129.089001ms ago: executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeff, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 128.945291ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000003c0)='hrtimer_init\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80ffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 107.537034ms ago: executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x14, 0x4, 0x4, 0x10002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x13}, 0x48) 60.983241ms ago: executing program 3: gettid() (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000002200b704000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000017c0)={r0, 0xe0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001500)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, &(0x7f0000001540)=[0x0, 0x0], &(0x7f0000001580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe0, &(0x7f00000015c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001600), &(0x7f0000001640), 0x8, 0x9a, 0x8, 0x8, &(0x7f0000001680)}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x40, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r5}, 0x10) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0x2f9, 0xffffca88, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004000638877fb7f0200017f020001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) (async) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x7c2de5c90810a991}}) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r2}, 0x10) (rerun: 32) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000014c0)={&(0x7f0000000340)="5fc20165a039fe149ea09ec6fb81d0769465ec7e9b11a00cd2faefdc7635a0e173c522cd69de505867b85bf5c6308ad152346156784b408804672eba68c5dd1e822d86b0ff5e18a9f05b2543759d50c60de6dba5e14f3195f62f87c9061615da4024b1a0438d4c6638fb8eb520c59c5068915bb216952b4168285369bed7f499de023c24c74a694f1cb86864cb140ed6462986877169a70ed942f3b1eec6374227d4d449d0e00bb8bcd8656bf98788025a2e7cc0fc05724896d7b9b52f5201794dd97a257a12d25afb5a277233ccf6d2538466ede66be229b96855dc14fb5d4b6cca7509389ff5cfbaeaeda8392a7b1a7826d76cd9ee", &(0x7f00000004c0)=""/4096, &(0x7f0000000040)="c051ddb0273ab183533374fd0752e0f81d4a39872159650fcb5c9411e82b47ab3da58dc878bd207c7c28a04c1194c1a7deec8b", &(0x7f0000001900)="d1ccf12bc6caacb37153aba124006bbb4ab5f6ea9f010c245e3a458dbd406305a41ac99a3283e96564b78faa7cbac4745470a9db389e4870a94c4047f91bdb8f97b9210e7144dbbe54f6b88bd7eb0a48508d5a138473fad48ff7f52d0b776ee4a62bc8c2440a2b24dc01c0f93623b1b8158f2bbf023035eef5a2ba102f159939aeb91867358029e09d25e37bb34f2ae6ad6fa7792dd683fe0365ceac20dc14aefb832c5f3860211120b1f3ef8249e80b98384d2081e1286ce1fd5d00977267d8fc37b41a26435d2a206b9ec8d89b9c89db288ff7bcd24b8ea5f495a689e16b34465067529e10c044096bd1a151", 0x3, r4, 0x4}, 0x38) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x90) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0xf1c, 0xcf1, 0x9, 0x2518, r1, 0x5881, '\x00', r3, 0xffffffffffffffff, 0x4, 0x5, 0x4, 0x6}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000001800)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095", @ANYRES32=r1, @ANYRES16=r0, @ANYRES32=r10, @ANYRESDEC=r6, @ANYRES32=r8], 0x0}, 0x90) (async, rerun: 64) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00', r12}, 0x10) (async, rerun: 32) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00', r13}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 53.805662ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0xf0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1a, 0x4, &(0x7f0000000040)=ANY=[@ANYRESDEC=r0], 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cpuset.memory_pressure_enabled\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_pressure(r4, &(0x7f0000000000)='io.pressure\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00', r5}, 0x10) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[], 0x7) socketpair(0x29, 0x80000, 0x3, &(0x7f0000000180)) 48.436243ms ago: executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) 44.589384ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r1}, 0x10) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}, 0x2000000}) 34.094645ms ago: executing program 3: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r0, 0x6}, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'rose0\x00', 0x1000}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r2, &(0x7f0000000140)="856f199fcde958e616d9aa4e045fdb207f7dd64333a775dbb7e107c15a9caed5f0ebe77a144b23757501d0ce2020c573c33684fd008a1d1613e5929ac4212774961e23b9aaaa124dc0f295a6ab55b55aa370802b79254939a2e4c4505f81df37db10abcd6a1a23bdc0c561295de867ecbf2ad1f2c996d6a2b4990370fa5261", &(0x7f00000001c0)=""/91, 0x4}, 0x20) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_ext={0x1c, 0x11, &(0x7f00000002c0)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffd}], &(0x7f0000000380)='GPL\x00', 0x0, 0x9e, &(0x7f00000003c0)=""/158, 0x40f00, 0x20, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x1, 0x8, 0x8000}, 0x10, 0x1987c, 0xffffffffffffffff, 0x2, &(0x7f0000000500)=[r2, r2, r2], &(0x7f0000000540)=[{0x4, 0x4, 0x4, 0x5}, {0x3, 0x3, 0xc, 0x4}], 0x10, 0x2}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r2, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f0000000640)=r3}, 0x20) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f00000007c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x2, 0xf2f8}}]}, {0x0, [0x1e, 0x61, 0x2e, 0x2e, 0x5f, 0x1e, 0x0]}}, &(0x7f0000000800)=""/165, 0x39, 0xa5, 0x0, 0x80b1}, 0x20) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x10000}, [@jmp={0x5, 0x1, 0x0, 0x8, 0x3, 0xffffffffffffffff, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000700)='GPL\x00', 0x2, 0x77, &(0x7f0000000740)=""/119, 0xe8eddc98be5cdabb, 0x1, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000900)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000940)={0x4, 0x6, 0x7f, 0x5}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[r4, r4, r4, r4, r2, r4, r4, r4, r4], &(0x7f00000009c0)=[{0x2, 0x1, 0x2, 0x2}, {0x3, 0x1, 0xb}, {0x1, 0x1, 0x4, 0x5}, {0x3, 0x4, 0xe, 0x5}, {0x2, 0x4, 0x4}, {0x2, 0x4, 0xa, 0xb}, {0x1, 0x1, 0x2, 0xb}, {0x4, 0x5, 0xb, 0x9}, {0x0, 0x2, 0xd, 0x9}, {0x4, 0x4, 0x8, 0xa}], 0x10, 0x7}, 0x90) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d00)={0x1, 0x58, &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e00)={0x11, 0x12, &(0x7f0000000b80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0xd1}, @map_val={0x18, 0x2, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x39}, @generic={0x1, 0xd, 0x7, 0x6a, 0x8}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x7}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xca4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000c40)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000c80)=""/4096, 0x41000, 0x8, '\x00', r8, 0x0, r5, 0x8, &(0x7f0000001d40)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001d80)={0x1, 0x0, 0x1, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=[r4, r4], 0x0, 0x10, 0x2}, 0x90) mkdir(&(0x7f0000001ec0)='./file0\x00', 0x166) r10 = openat$cgroup_procs(r7, &(0x7f0000001f00)='tasks\x00', 0x2, 0x0) r11 = gettid() write$cgroup_pid(r10, &(0x7f0000001f40)=r11, 0x12) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002040)={r2, &(0x7f0000001f80)="fa5216e1d60cef91d98c8b61c0ee052820525fd5cfc0bd6d98710d1491ba00edef768e47a943f346733ddee6b18d0adc1ae6ae2cc10038530e78991779f0c8bf1ca147a9cb3e0e06c73c9a46cd90becc35af5872f90d8234", &(0x7f0000002000)}, 0x20) ioctl$TUNSETQUEUE(r9, 0x400454d9, &(0x7f0000002080)={'ip6gretap0\x00', 0x400}) unlink(&(0x7f00000020c0)='./file1\x00') r12 = openat$cgroup_ro(r9, &(0x7f0000002100)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002180)={&(0x7f0000002140)='nmi_noise\x00', r12}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002200)={&(0x7f00000021c0)='btrfs_qgroup_account_extent\x00', r9}, 0x10) ioctl$PERF_EVENT_IOC_ID(r10, 0x80082407, &(0x7f0000002240)) r15 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r15, &(0x7f00000022c0)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r13, 0x40082404, &(0x7f0000002300)=0xcd5) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000002440)={0x1, &(0x7f0000002340)="7e1983cfed1c814f6caee9f0b2656f40bcba64df79a6b5c8625bb2ae749292dc3a7877c2639e30b5b67af9ab8c25f9a676179edd3019790e115fbd21218a5bae7e37ac58c7f221ffc77ca51e1742d2e9de005477825086f5813b79e8af3f12a14f1b51f9135d61d570ee81df253521636f5c97c2f4a55a74e63c361587c4b782149454f5ad8fa0592ff99b611953900af5065f9db2a30735a356b89928d134d427aba456f6178b45ed7ec2763f3f6e0984da7ebe9a2f3326a8721c5c1672fff8a86441054087a02bb1"}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002800)={r6, 0xe0, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000002540)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, &(0x7f0000002580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000025c0)=[0x0, 0x0, 0x0], 0x0, 0x2c, &(0x7f0000002600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000002640), &(0x7f0000002680), 0x8, 0x51, 0x8, 0x8, &(0x7f00000026c0)}}, 0x10) r17 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002840)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x5, 0x5, &(0x7f0000002480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff0001, 0x0, 0x0, 0x0, 0x3}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x4}]}, &(0x7f00000024c0)='GPL\x00', 0x5, 0x0, 0x0, 0x40f00, 0x65, '\x00', 0x0, 0x7, r5, 0x8, &(0x7f0000002500)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, r16, 0xffffffffffffffff, 0x5, &(0x7f00000028c0)=[r17, r2, r4, r12, r14, r4], &(0x7f0000002900)=[{0x5, 0x2, 0x4, 0x2}, {0x2, 0x2, 0x1, 0x3}, {0x1, 0x3, 0x2, 0x7}, {0x4, 0x4, 0x7}, {0x4, 0x4, 0x10, 0x9}], 0x10, 0x3ff}, 0x90) unlink(&(0x7f0000002a40)='./file1\x00') 0s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x0, 0x8, 0x7fe2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800001000000000000000000000000004000000bb7f1a00c600feff0000000a9500000000000001357dd29896ca7cea8c5161ec17d56b7a8c41b25425761df73a4db37553d4b243ec684ec8f42c23c459192a6265d55911f9519371e47b25b6ffb6959aaa6a7cb9e3b9452e4989a418fcbeefedcd2c68c9648af8f4bbb27ecaa6cfc7344aac81eaf9532ed32ef44c42605b1d47705b3885790789d1c3f12d"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000001c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x17, 0x0, @perf_config_ext={0x0, 0xffffffff00000001}, 0x0, 0x0, 0x0, 0x3}) kernel console output (not intermixed with test programs): =system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 34.333614][ T733] bpf_get_probe_write_proto: 2 callbacks suppressed [ 34.333631][ T733] syz-executor.3[733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.340788][ T733] syz-executor.3[733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.631150][ T763] syz-executor.3[763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.657148][ T763] syz-executor.3[763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.202862][ T28] audit: type=1400 audit(1719193029.599:110): avc: denied { cpu } for pid=798 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 35.322261][ T805] syz-executor.0[805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.322324][ T805] syz-executor.0[805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.948186][ T836] syz-executor.2[836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.975722][ T836] syz-executor.2[836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.186699][ T864] bridge0: port 3(veth1_macvtap) entered blocking state [ 36.204981][ T864] bridge0: port 3(veth1_macvtap) entered disabled state [ 36.312234][ T878] syz-executor.4[878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.312307][ T878] syz-executor.4[878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.268176][ T956] FAULT_INJECTION: forcing a failure. [ 37.268176][ T956] name failslab, interval 1, probability 0, space 0, times 1 [ 37.292206][ T956] CPU: 1 PID: 956 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 37.301994][ T956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 37.311901][ T956] Call Trace: [ 37.315013][ T956] [ 37.317791][ T956] dump_stack_lvl+0x151/0x1b7 [ 37.322306][ T956] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 37.327600][ T956] dump_stack+0x15/0x1b [ 37.331591][ T956] should_fail_ex+0x3d0/0x520 [ 37.336107][ T956] ? __alloc_skb+0xcc/0x2d0 [ 37.340532][ T956] __should_failslab+0xaf/0xf0 [ 37.345134][ T956] should_failslab+0x9/0x20 [ 37.349481][ T956] kmem_cache_alloc_node+0x3e/0x2d0 [ 37.354506][ T956] ? kasan_quarantine_put+0x34/0x1a0 [ 37.359626][ T956] __alloc_skb+0xcc/0x2d0 [ 37.363791][ T956] __pskb_copy_fclone+0xb4/0x1120 [ 37.368654][ T956] ? tipc_dest_pop+0x1e2/0x270 [ 37.373250][ T956] ? kfree+0x7a/0xf0 [ 37.376982][ T956] tipc_sk_mcast_rcv+0x745/0x1420 [ 37.381842][ T956] ? __copy_skb_header+0x4b0/0x640 [ 37.386794][ T956] ? tipc_sk_bind+0x7f0/0x7f0 [ 37.391305][ T956] ? _copy_from_iter+0x2bb/0xe00 [ 37.396081][ T956] tipc_mcast_xmit+0x144f/0x1b40 [ 37.400853][ T956] ? __build_skb_around+0x23f/0x3d0 [ 37.405886][ T956] ? tipc_bcbase_xmit+0xb60/0xb60 [ 37.410747][ T956] ? memcpy+0x56/0x70 [ 37.414564][ T956] ? tipc_msg_build+0x498/0x1190 [ 37.419339][ T956] ? __kasan_check_write+0x14/0x20 [ 37.424284][ T956] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 37.429321][ T956] ? tipc_msg_fragment+0x760/0x760 [ 37.434267][ T956] ? tipc_nametbl_lookup_mcast_nodes+0x424/0xa10 [ 37.440431][ T956] __tipc_sendmsg+0x2617/0x3240 [ 37.445119][ T956] ? avc_has_perm_noaudit+0x2dd/0x430 [ 37.450332][ T956] ? rht_lock+0x130/0x130 [ 37.454490][ T956] ? page_ext_put+0x1c/0x30 [ 37.458830][ T956] ? post_alloc_hook+0x213/0x220 [ 37.463605][ T956] ? wait_woken+0x100/0x100 [ 37.467943][ T956] ? avc_has_perm+0x16f/0x260 [ 37.472459][ T956] ? avc_has_perm_noaudit+0x430/0x430 [ 37.477663][ T956] ? __kasan_check_write+0x14/0x20 [ 37.482610][ T956] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 37.487474][ T956] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 37.492506][ T956] ? __local_bh_enable_ip+0x58/0x80 [ 37.497539][ T956] ? lock_sock_nested+0x261/0x300 [ 37.502405][ T956] ? sock_init_data+0xc0/0xc0 [ 37.507108][ T956] ? tipc_recvmsg+0x13b0/0x13b0 [ 37.511773][ T956] tipc_sendmsg+0x55/0x70 [ 37.515939][ T956] ____sys_sendmsg+0x5d3/0x9a0 [ 37.520541][ T956] ? __sys_sendmsg_sock+0x40/0x40 [ 37.525404][ T956] __sys_sendmsg+0x2a9/0x390 [ 37.529826][ T956] ? ____sys_sendmsg+0x9a0/0x9a0 [ 37.534601][ T956] ? __kasan_check_write+0x14/0x20 [ 37.539556][ T956] ? mutex_unlock+0xb2/0x260 [ 37.543975][ T956] ? __kasan_check_write+0x14/0x20 [ 37.548925][ T956] ? debug_smp_processor_id+0x17/0x20 [ 37.554131][ T956] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 37.560031][ T956] __x64_sys_sendmsg+0x7f/0x90 [ 37.564633][ T956] do_syscall_64+0x3d/0xb0 [ 37.568883][ T956] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 37.574611][ T956] RIP: 0033:0x7fb4f7c7d0a9 [ 37.578865][ T956] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 37.598415][ T956] RSP: 002b:00007fb4f896c0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 37.606645][ T956] RAX: ffffffffffffffda RBX: 00007fb4f7db3f80 RCX: 00007fb4f7c7d0a9 [ 37.614543][ T956] RDX: 00000000000101d0 RSI: 0000000020004440 RDI: 0000000000000004 [ 37.622357][ T956] RBP: 00007fb4f896c120 R08: 0000000000000000 R09: 0000000000000000 [ 37.630166][ T956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 37.637977][ T956] R13: 000000000000000b R14: 00007fb4f7db3f80 R15: 00007ffe217639d8 [ 37.645796][ T956] [ 37.674744][ T956] tipc: Failed to clone mcast rcv buffer [ 37.706973][ T968] bond_slave_1: mtu less than device minimum [ 37.715912][ T968] device pim6reg1 entered promiscuous mode [ 37.846528][ T992] device pim6reg1 entered promiscuous mode [ 41.229311][ T311] syz-executor.3 (311) used greatest stack depth: 21520 bytes left [ 41.819293][ T10] device bridge_slave_1 left promiscuous mode [ 41.825250][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.878441][ T28] audit: type=1400 audit(1719193036.279:111): avc: denied { setopt } for pid=1058 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 41.964431][ T10] device bridge_slave_0 left promiscuous mode [ 42.009483][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.033513][ T10] device veth1_macvtap left promiscuous mode [ 42.063935][ T10] device veth0_vlan left promiscuous mode [ 42.157971][ T1071] bpf_get_probe_write_proto: 6 callbacks suppressed [ 42.158107][ T1071] syz-executor.0[1071] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.298429][ T1052] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.444135][ T1052] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.504573][ T1052] device bridge_slave_0 entered promiscuous mode [ 42.523972][ T1052] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.539473][ T1052] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.549186][ T1052] device bridge_slave_1 entered promiscuous mode [ 42.578548][ T1090] device pim6reg1 entered promiscuous mode [ 42.735521][ T1052] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.742423][ T1052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.749522][ T1052] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.756364][ T1052] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.786494][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.794172][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.803085][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.827593][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 42.837346][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 42.849154][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.855997][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.863641][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 42.872033][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 42.880332][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.887189][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.910995][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 42.919017][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 42.939087][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 42.947250][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 42.955091][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 42.963567][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 42.977358][ T1052] device veth0_vlan entered promiscuous mode [ 42.984794][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 42.992935][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.008127][ T1052] device veth1_macvtap entered promiscuous mode [ 43.015231][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 43.022958][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 43.030308][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 43.038297][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 43.046219][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 43.061233][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 43.082575][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 43.104774][ T28] audit: type=1400 audit(1719193037.499:112): avc: denied { write } for pid=1119 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 43.130297][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 43.155420][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 43.173234][ T28] audit: type=1400 audit(1719193037.569:113): avc: denied { create } for pid=1115 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 43.479277][ T1175] syz-executor.1[1175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.479325][ T1175] syz-executor.1[1175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.198355][ T1248] device pim6reg1 entered promiscuous mode [ 44.249653][ T1255] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 45.003397][ T1347] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 45.202550][ T28] audit: type=1400 audit(1719193039.599:114): avc: denied { create } for pid=1352 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 45.264658][ T1354] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.272058][ T1354] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.279852][ T1354] device bridge_slave_0 entered promiscuous mode [ 45.286990][ T1354] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.293949][ T1354] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.307817][ T1354] device bridge_slave_1 entered promiscuous mode [ 45.379510][ T1354] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.386420][ T1354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.393435][ T1354] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.400273][ T1354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.426456][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.434725][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.456929][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.506319][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.514742][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.521650][ T314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.528993][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.537204][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.544092][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.552084][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.568843][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 45.579470][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.592526][ T1354] device veth0_vlan entered promiscuous mode [ 45.603492][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.611628][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.619566][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.641295][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.667657][ T1354] device veth1_macvtap entered promiscuous mode [ 45.686654][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 45.702148][ T1392] syz-executor.1[1392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.702260][ T1392] syz-executor.1[1392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.735266][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 45.898276][ T10] device bridge_slave_1 left promiscuous mode [ 45.923444][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.970428][ T10] device bridge_slave_0 left promiscuous mode [ 46.041770][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.090519][ T10] device veth1_macvtap left promiscuous mode [ 46.125719][ T10] device veth0_vlan left promiscuous mode [ 47.370722][ T1487] syz-executor.4[1487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.370795][ T1487] syz-executor.4[1487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.132267][ T1511] Â: renamed from pim6reg1 [ 51.443982][ T28] audit: type=1400 audit(1719193045.839:115): avc: denied { relabelfrom } for pid=1531 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 51.500291][ T28] audit: type=1400 audit(1719193045.869:116): avc: denied { relabelto } for pid=1531 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 52.116925][ T1590] tap0: tun_chr_ioctl cmd 2147767506 [ 52.396956][ T1620] device pim6reg1 entered promiscuous mode [ 53.751623][ T1696] syz-executor.1[1696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.751687][ T1696] syz-executor.1[1696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.803323][ T1699] syz-executor.1[1699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.936312][ T1699] syz-executor.1[1699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.138127][ T28] audit: type=1400 audit(1719193048.529:117): avc: denied { create } for pid=1702 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 54.380884][ T1721] device veth0_vlan left promiscuous mode [ 54.389586][ T1721] device veth0_vlan entered promiscuous mode [ 54.416263][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 54.424294][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 54.515775][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 54.812894][ T1759] bond_slave_1: mtu less than device minimum [ 56.090410][ T1869] syz-executor.4[1869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.090469][ T1869] syz-executor.4[1869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.296735][ T1869] syz-executor.4[1869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.409092][ T1869] syz-executor.4[1869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.804141][ T1901] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 56.937207][ T1909] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.944815][ T1909] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.129140][ T1939] device pim6reg1 entered promiscuous mode [ 57.549026][ T1999] Driver unsupported XDP return value 0 on prog (id 980) dev N/A, expect packet loss! [ 57.613501][ T28] audit: type=1400 audit(1719193052.009:118): avc: denied { write } for pid=2012 comm="syz-executor.0" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 57.807566][ T2032] syz-executor.3[2032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.807626][ T2032] syz-executor.3[2032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.122077][ T2059] device pim6reg1 entered promiscuous mode [ 59.567493][ T2154] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 60.551068][ T2213] Â: renamed from pim6reg1 [ 61.700336][ T2322] bridge0: port 3(veth1_macvtap) entered blocking state [ 61.707227][ T2322] bridge0: port 3(veth1_macvtap) entered disabled state [ 61.903405][ T2349] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 26624 (only 8 groups) [ 62.314891][ T2377] device pim6reg1 entered promiscuous mode [ 62.360666][ T2385] bpf_get_probe_write_proto: 4 callbacks suppressed [ 62.360682][ T2385] syz-executor.4[2385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.367457][ T2385] syz-executor.4[2385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.906818][ T2437] syz-executor.4[2437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.970259][ T2437] syz-executor.4[2437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.177387][ T2461] device syzkaller0 entered promiscuous mode [ 63.614577][ T2499] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.645041][ T2499] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.662378][ T2499] device bridge_slave_0 entered promiscuous mode [ 63.674295][ T2499] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.691275][ T2499] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.723372][ T2499] device bridge_slave_1 entered promiscuous mode [ 64.208137][ T410] device bridge_slave_1 left promiscuous mode [ 64.214172][ T410] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.240995][ T410] device bridge_slave_0 left promiscuous mode [ 64.276346][ T410] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.307295][ T410] device veth1_macvtap left promiscuous mode [ 64.323256][ T410] device veth0_vlan left promiscuous mode [ 64.584899][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.598534][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.615118][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.625792][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.642882][ T2364] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.649772][ T2364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.656950][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.665282][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.674070][ T2364] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.680919][ T2364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.688684][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.705538][ T28] audit: type=1400 audit(1719193059.099:119): avc: denied { create } for pid=2593 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 64.732341][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 64.741068][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.756928][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 64.768341][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.783066][ T2499] device veth0_vlan entered promiscuous mode [ 64.811728][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 64.820411][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 64.828695][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 64.836014][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 64.874699][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 64.886052][ T2499] device veth1_macvtap entered promiscuous mode [ 64.948443][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 64.997105][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 65.046541][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 65.091706][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 65.801734][ T28] audit: type=1400 audit(1719193060.199:120): avc: denied { write } for pid=2652 comm="syz-executor.1" name="net" dev="proc" ino=22230 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 65.898393][ T28] audit: type=1400 audit(1719193060.229:121): avc: denied { add_name } for pid=2652 comm="syz-executor.1" name="blkio.throttle.io_service_bytes_recursive" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 65.922011][ T28] audit: type=1400 audit(1719193060.229:122): avc: denied { create } for pid=2652 comm="syz-executor.1" name="blkio.throttle.io_service_bytes_recursive" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 65.978516][ T28] audit: type=1400 audit(1719193060.229:123): avc: denied { associate } for pid=2652 comm="syz-executor.1" name="blkio.throttle.io_service_bytes_recursive" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 66.003345][ T28] audit: type=1400 audit(1719193060.319:124): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 66.048476][ T2675] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 67.062300][ T2740] syz-executor.2[2740] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.062364][ T2740] syz-executor.2[2740] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.176992][ T2744] device pim6reg1 entered promiscuous mode [ 67.504639][ T2772] syz-executor.0[2772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.504685][ T2772] syz-executor.0[2772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.516944][ T2772] syz-executor.0[2772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.528640][ T2772] syz-executor.0[2772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.590621][ T2772] syz-executor.0[2772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.608576][ T2778] syz-executor.3[2778] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.621842][ T2772] syz-executor.0[2772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.644820][ T2778] syz-executor.3[2778] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.816427][ T28] audit: type=1400 audit(1719193062.209:125): avc: denied { create } for pid=2806 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 68.004848][ T2819] device syzkaller0 entered promiscuous mode [ 68.121266][ T2831] syz-executor.0[2831] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.121339][ T2831] syz-executor.0[2831] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.309699][ T2848] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 68.444289][ T2851] bond_slave_1: mtu greater than device maximum [ 68.580572][ T2859] FAULT_INJECTION: forcing a failure. [ 68.580572][ T2859] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 68.612514][ T2859] CPU: 1 PID: 2859 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 68.622406][ T2859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 68.632308][ T2859] Call Trace: [ 68.635426][ T2859] [ 68.638206][ T2859] dump_stack_lvl+0x151/0x1b7 [ 68.642720][ T2859] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 68.648011][ T2859] ? __alloc_pages+0x780/0x780 [ 68.652612][ T2859] dump_stack+0x15/0x1b [ 68.656603][ T2859] should_fail_ex+0x3d0/0x520 [ 68.661119][ T2859] should_fail_alloc_page+0x68/0x90 [ 68.666149][ T2859] __alloc_pages+0x1f4/0x780 [ 68.670580][ T2859] ? prep_new_page+0x110/0x110 [ 68.675180][ T2859] ? _raw_spin_trylock_bh+0x190/0x190 [ 68.680387][ T2859] __get_free_pages+0xe/0x30 [ 68.684810][ T2859] kasan_populate_vmalloc_pte+0x39/0x130 [ 68.690279][ T2859] ? __apply_to_page_range+0x8ca/0xbe0 [ 68.695575][ T2859] __apply_to_page_range+0x8dd/0xbe0 [ 68.700697][ T2859] ? kasan_populate_vmalloc+0x70/0x70 [ 68.705904][ T2859] ? kasan_populate_vmalloc+0x70/0x70 [ 68.711113][ T2859] apply_to_page_range+0x3b/0x50 [ 68.715891][ T2859] kasan_populate_vmalloc+0x65/0x70 [ 68.720921][ T2859] alloc_vmap_area+0x1961/0x1aa0 [ 68.725698][ T2859] ? vm_map_ram+0x940/0x940 [ 68.730032][ T2859] ? __kasan_kmalloc+0x9c/0xb0 [ 68.734630][ T2859] ? kmalloc_node_trace+0x3d/0xb0 [ 68.739492][ T2859] __get_vm_area_node+0x171/0x370 [ 68.744354][ T2859] __vmalloc_node_range+0x36e/0x1540 [ 68.749473][ T2859] ? reuseport_array_alloc+0xc3/0x160 [ 68.754687][ T2859] ? vmap+0x2b0/0x2b0 [ 68.758502][ T2859] bpf_map_area_alloc+0xdc/0xf0 [ 68.763185][ T2859] ? reuseport_array_alloc+0xc3/0x160 [ 68.768393][ T2859] reuseport_array_alloc+0xc3/0x160 [ 68.773428][ T2859] map_create+0x44a/0xcf0 [ 68.777596][ T2859] __sys_bpf+0x2e6/0x7f0 [ 68.781674][ T2859] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 68.786889][ T2859] ? debug_smp_processor_id+0x17/0x20 [ 68.792090][ T2859] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 68.797993][ T2859] __x64_sys_bpf+0x7c/0x90 [ 68.802242][ T2859] do_syscall_64+0x3d/0xb0 [ 68.806495][ T2859] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 68.812223][ T2859] RIP: 0033:0x7fb4f7c7d0a9 [ 68.816479][ T2859] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 68.835923][ T2859] RSP: 002b:00007fb4f896c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 68.844164][ T2859] RAX: ffffffffffffffda RBX: 00007fb4f7db3f80 RCX: 00007fb4f7c7d0a9 [ 68.851974][ T2859] RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000000 [ 68.859784][ T2859] RBP: 00007fb4f896c120 R08: 0000000000000000 R09: 0000000000000000 [ 68.867599][ T2859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 68.875408][ T2859] R13: 000000000000000b R14: 00007fb4f7db3f80 R15: 00007ffe217639d8 [ 68.883314][ T2859] [ 69.320022][ T2932] tap0: tun_chr_ioctl cmd 1074025673 [ 69.325241][ T2930] tap0: tun_chr_ioctl cmd 1074025677 [ 69.330358][ T2930] tap0: linktype set to 769 [ 69.549635][ T2953] bridge0: port 3(veth1_macvtap) entered blocking state [ 69.568129][ T2953] bridge0: port 3(veth1_macvtap) entered disabled state [ 69.621105][ T2970] FAULT_INJECTION: forcing a failure. [ 69.621105][ T2970] name failslab, interval 1, probability 0, space 0, times 0 [ 69.633983][ T2970] CPU: 1 PID: 2970 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 69.643866][ T2970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 69.653765][ T2970] Call Trace: [ 69.656884][ T2970] [ 69.659748][ T2970] dump_stack_lvl+0x151/0x1b7 [ 69.664264][ T2970] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 69.669557][ T2970] ? selinux_kernfs_init_security+0x14a/0x720 [ 69.675461][ T2970] ? idr_alloc_cyclic+0x369/0x5d0 [ 69.680324][ T2970] dump_stack+0x15/0x1b [ 69.684310][ T2970] should_fail_ex+0x3d0/0x520 [ 69.688827][ T2970] ? __kernfs_new_node+0xdb/0x700 [ 69.693684][ T2970] __should_failslab+0xaf/0xf0 [ 69.698286][ T2970] should_failslab+0x9/0x20 [ 69.702623][ T2970] kmem_cache_alloc+0x3b/0x2c0 [ 69.707227][ T2970] __kernfs_new_node+0xdb/0x700 [ 69.711915][ T2970] ? kernfs_new_node+0x230/0x230 [ 69.716864][ T2970] ? rwsem_write_trylock+0x15b/0x290 [ 69.721987][ T2970] ? up_write+0x79/0x1f0 [ 69.726061][ T2970] ? kernfs_activate+0x1e6/0x200 [ 69.730835][ T2970] kernfs_new_node+0x130/0x230 [ 69.735437][ T2970] __kernfs_create_file+0x4a/0x270 [ 69.740383][ T2970] sysfs_add_file_mode_ns+0x1c8/0x270 [ 69.745594][ T2970] internal_create_group+0x545/0xed0 [ 69.750731][ T2970] ? sysfs_create_group+0x30/0x30 [ 69.755575][ T2970] ? up_write+0x79/0x1f0 [ 69.759669][ T2970] ? kernfs_activate+0x1e6/0x200 [ 69.764425][ T2970] sysfs_create_groups+0x5b/0x130 [ 69.769286][ T2970] device_add_attrs+0xe1/0x5f0 [ 69.773882][ T2970] ? kernfs_put+0x4e5/0x520 [ 69.778225][ T2970] ? get_device_parent+0x410/0x410 [ 69.783176][ T2970] ? sysfs_do_create_link_sd+0xe2/0x110 [ 69.788559][ T2970] device_add+0x5f7/0xf10 [ 69.792725][ T2970] netdev_register_kobject+0x177/0x320 [ 69.798012][ T2970] ? raw_notifier_call_chain+0xdf/0xf0 [ 69.803307][ T2970] register_netdevice+0xe43/0x1490 [ 69.808258][ T2970] ? netif_stacked_transfer_operstate+0x240/0x240 [ 69.814502][ T2970] ? alloc_netdev_mqs+0xb75/0xf90 [ 69.819370][ T2970] ip6_tnl_create2+0xc3/0x3e0 [ 69.823880][ T2970] ip6_tnl_locate+0x640/0x750 [ 69.828393][ T2970] ? ip6_tnl_link_config+0x940/0x940 [ 69.833511][ T2970] ? ip6_tnl_siocdevprivate+0x9d4/0x16e0 [ 69.838982][ T2970] ? memcpy+0x56/0x70 [ 69.842804][ T2970] ip6_tnl_siocdevprivate+0x9fa/0x16e0 [ 69.848092][ T2970] ? __kasan_check_read+0x11/0x20 [ 69.852960][ T2970] ? ip6_tnl_start_xmit+0x1520/0x1520 [ 69.858166][ T2970] ? full_name_hash+0x9d/0xf0 [ 69.862676][ T2970] dev_ifsioc+0xd40/0x1150 [ 69.866926][ T2970] ? ioctl_has_perm+0x3f0/0x560 [ 69.871701][ T2970] ? dev_ioctl+0xe60/0xe60 [ 69.875962][ T2970] ? __mutex_lock_slowpath+0xe/0x10 [ 69.880987][ T2970] ? mutex_lock+0x130/0x1e0 [ 69.885329][ T2970] ? bit_wait_io_timeout+0x120/0x120 [ 69.890462][ T2970] dev_ioctl+0x5e9/0xe60 [ 69.894529][ T2970] sock_ioctl+0x665/0x740 [ 69.898781][ T2970] ? sock_poll+0x400/0x400 [ 69.903036][ T2970] ? security_file_ioctl+0x84/0xb0 [ 69.907982][ T2970] ? sock_poll+0x400/0x400 [ 69.912322][ T2970] __se_sys_ioctl+0x114/0x190 [ 69.916834][ T2970] __x64_sys_ioctl+0x7b/0x90 [ 69.921257][ T2970] do_syscall_64+0x3d/0xb0 [ 69.925514][ T2970] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 69.931241][ T2970] RIP: 0033:0x7f8a6b87d0a9 [ 69.935494][ T2970] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 69.954941][ T2970] RSP: 002b:00007f8a6c6c80c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 69.963182][ T2970] RAX: ffffffffffffffda RBX: 00007f8a6b9b3f80 RCX: 00007f8a6b87d0a9 [ 69.970991][ T2970] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000006 [ 69.978802][ T2970] RBP: 00007f8a6c6c8120 R08: 0000000000000000 R09: 0000000000000000 [ 69.986614][ T2970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 69.994427][ T2970] R13: 000000000000000b R14: 00007f8a6b9b3f80 R15: 00007ffd831e6638 [ 70.002243][ T2970] [ 70.829193][ T3080] FAULT_INJECTION: forcing a failure. [ 70.829193][ T3080] name failslab, interval 1, probability 0, space 0, times 0 [ 70.911148][ T3080] CPU: 1 PID: 3080 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 70.921042][ T3080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 70.930939][ T3080] Call Trace: [ 70.934058][ T3080] [ 70.936832][ T3080] dump_stack_lvl+0x151/0x1b7 [ 70.941347][ T3080] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 70.946643][ T3080] dump_stack+0x15/0x1b [ 70.950633][ T3080] should_fail_ex+0x3d0/0x520 [ 70.955148][ T3080] ? security_inode_alloc+0x29/0x120 [ 70.960269][ T3080] __should_failslab+0xaf/0xf0 [ 70.964872][ T3080] should_failslab+0x9/0x20 [ 70.969208][ T3080] kmem_cache_alloc+0x3b/0x2c0 [ 70.973807][ T3080] ? from_kuid_munged+0x7b0/0x7b0 [ 70.978667][ T3080] ? slab_pre_alloc_hook+0x2e/0x1b0 [ 70.983797][ T3080] security_inode_alloc+0x29/0x120 [ 70.988737][ T3080] inode_init_always+0x720/0x970 [ 70.993511][ T3080] ? sockfs_init_fs_context+0xb0/0xb0 [ 70.998718][ T3080] new_inode_pseudo+0x98/0x1d0 [ 71.003318][ T3080] __sock_create+0x135/0x760 [ 71.007749][ T3080] __sys_socketpair+0x29f/0x6e0 [ 71.012518][ T3080] ? __ia32_sys_socket+0x90/0x90 [ 71.017294][ T3080] ? debug_smp_processor_id+0x17/0x20 [ 71.022498][ T3080] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 71.028408][ T3080] __x64_sys_socketpair+0x9b/0xb0 [ 71.033261][ T3080] do_syscall_64+0x3d/0xb0 [ 71.037513][ T3080] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 71.043241][ T3080] RIP: 0033:0x7fb4f7c7d0a9 [ 71.047497][ T3080] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 71.066937][ T3080] RSP: 002b:00007fb4f896c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 71.075178][ T3080] RAX: ffffffffffffffda RBX: 00007fb4f7db3f80 RCX: 00007fb4f7c7d0a9 [ 71.082990][ T3080] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 71.090802][ T3080] RBP: 00007fb4f896c120 R08: 0000000000000000 R09: 0000000000000000 [ 71.098612][ T3080] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 71.106685][ T3080] R13: 000000000000000b R14: 00007fb4f7db3f80 R15: 00007ffe217639d8 [ 71.114501][ T3080] [ 71.207674][ T3080] socket: no more sockets [ 71.430266][ T28] audit: type=1400 audit(1719193065.829:126): avc: denied { create } for pid=3111 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 71.468511][ T3117] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 71.685297][ T3137] device pim6reg1 entered promiscuous mode [ 71.715331][ T3143] device sit0 entered promiscuous mode [ 71.938161][ T3172] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 72.145548][ T3179] device sit0 entered promiscuous mode [ 72.423379][ T28] audit: type=1400 audit(1719193066.819:127): avc: denied { tracepoint } for pid=3187 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 72.562874][ T3217] bpf_get_probe_write_proto: 6 callbacks suppressed [ 72.562891][ T3217] syz-executor.3[3217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.589289][ T3217] syz-executor.3[3217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.738343][ T3217] device sit0 entered promiscuous mode [ 73.296477][ T3262] syz-executor.4[3262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.296549][ T3262] syz-executor.4[3262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.350391][ T3263] device sit0 entered promiscuous mode [ 74.358307][ T3322] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 74.550447][ T28] audit: type=1400 audit(1719193068.949:128): avc: denied { create } for pid=3346 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 74.953768][ T3368] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 75.154272][ T3399] Â: renamed from pim6reg1 [ 75.568170][ T3414] syz-executor.2[3414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.568241][ T3414] syz-executor.2[3414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.898021][ T3421] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 76.058856][ T3446] Â: renamed from pim6reg1 [ 76.188517][ T28] audit: type=1400 audit(1719193070.589:129): avc: denied { create } for pid=3463 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 76.422825][ T3484] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 76.479357][ T3488] Â: renamed from pim6reg1 [ 76.568909][ T3495] syz-executor.2[3495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.568977][ T3495] syz-executor.2[3495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.011232][ T3526] Â: renamed from pim6reg1 [ 77.148595][ T3533] device pim6reg1 entered promiscuous mode [ 77.237071][ T3539] syz-executor.4[3539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.237142][ T3539] syz-executor.4[3539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.684044][ T3573] bridge0: port 3(veth1_macvtap) entered blocking state [ 77.836795][ T3573] bridge0: port 3(veth1_macvtap) entered disabled state [ 77.911064][ T3577] Â: renamed from pim6reg1 [ 78.545088][ T3627] syz-executor.0 (3627) used greatest stack depth: 19784 bytes left [ 79.089675][ T28] audit: type=1400 audit(1719193073.489:130): avc: denied { create } for pid=3687 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 80.007060][ T3788] syz-executor.4[3788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.007139][ T3788] syz-executor.4[3788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.928805][ T3952] syz-executor.0[3952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.069226][ T3952] syz-executor.0[3952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.485507][ T3982] syz-executor.2[3982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.641060][ T3982] syz-executor.2[3982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.844736][ T4024] syz-executor.2[4024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.867202][ T4024] syz-executor.2[4024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.212920][ T28] audit: type=1400 audit(1719193077.609:131): avc: denied { create } for pid=4053 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 83.349741][ T4068] syz-executor.3[4068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.349800][ T4068] syz-executor.3[4068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.937467][ T4112] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 84.788412][ T4187] device sit0 left promiscuous mode [ 85.119188][ T4236] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 86.408205][ T28] audit: type=1400 audit(1719193080.809:132): avc: denied { create } for pid=4417 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 86.478583][ T4432] device pim6reg1 entered promiscuous mode [ 87.672606][ T28] audit: type=1400 audit(1719193082.069:133): avc: denied { create } for pid=4527 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 88.311242][ T4567] bpf_get_probe_write_proto: 12 callbacks suppressed [ 88.311257][ T4567] syz-executor.0[4567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.319060][ T4567] syz-executor.0[4567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.355225][ T4567] syz-executor.0[4567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.386341][ T4567] syz-executor.0[4567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.600848][ T4585] device syzkaller0 entered promiscuous mode [ 88.830513][ T28] audit: type=1400 audit(1719193083.229:134): avc: denied { create } for pid=4613 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 89.783505][ T4679] syz-executor.2[4679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.783586][ T4679] syz-executor.2[4679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.316621][ T4710] syz-executor.3[4710] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.335141][ T4710] syz-executor.3[4710] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.440328][ T4745] syz-executor.3[4745] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.451950][ T4745] syz-executor.3[4745] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.248389][ T4768] device pim6reg1 entered promiscuous mode [ 91.589692][ T4808] device pim6reg1 entered promiscuous mode [ 92.112526][ T4835] device syzkaller0 entered promiscuous mode [ 92.217378][ T4835] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 92.531787][ T4849] device pim6reg1 entered promiscuous mode [ 92.832006][ T4881] device pim6reg1 entered promiscuous mode [ 92.843142][ T4886] Â: renamed from pim6reg1 [ 93.000607][ T4894] bridge0: port 3(veth1_macvtap) entered blocking state [ 93.056179][ T4894] bridge0: port 3(veth1_macvtap) entered disabled state [ 93.409368][ T4937] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 93.776481][ T4959] bpf_get_probe_write_proto: 17 callbacks suppressed [ 93.776500][ T4959] syz-executor.2[4959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.796578][ T4959] syz-executor.2[4959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.808372][ T4957] syz-executor.1[4957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.864383][ T4957] syz-executor.1[4957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.348382][ T4990] syz-executor.1[4990] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.444130][ T4990] syz-executor.1[4990] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.547214][ T5000] syz-executor.4[5000] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.561441][ T5000] syz-executor.4[5000] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.677766][ T5022] syz-executor.2[5022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.786087][ T5022] syz-executor.2[5022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.088679][ T5060] device sit0 entered promiscuous mode [ 95.345221][ T5071] device pim6reg1 entered promiscuous mode [ 96.319688][ T5119] device pim6reg1 entered promiscuous mode [ 96.654710][ T5154] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.662281][ T5154] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.692712][ T5156] device pim6reg1 entered promiscuous mode [ 96.714205][ T5154] device bridge_slave_1 left promiscuous mode [ 96.721464][ T5154] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.729005][ T28] audit: type=1400 audit(1719193091.129:135): avc: denied { remove_name } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 96.751958][ T28] audit: type=1400 audit(1719193091.129:136): avc: denied { rename } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 96.752592][ T5154] device bridge_slave_0 left promiscuous mode [ 96.781078][ T5154] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.998581][ T5269] device pim6reg1 entered promiscuous mode [ 98.934594][ T5370] bpf_get_probe_write_proto: 27 callbacks suppressed [ 98.934609][ T5370] syz-executor.4[5370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.002690][ T5370] syz-executor.4[5370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.306310][ T5386] device veth0_vlan left promiscuous mode [ 99.363923][ T5386] device veth0_vlan entered promiscuous mode [ 99.468097][ T5404] syz-executor.3[5404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.468157][ T5404] syz-executor.3[5404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.863607][ T5494] FAULT_INJECTION: forcing a failure. [ 100.863607][ T5494] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 100.972083][ T5494] CPU: 1 PID: 5494 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 100.981984][ T5494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 100.991882][ T5494] Call Trace: [ 100.994998][ T5494] [ 100.997782][ T5494] dump_stack_lvl+0x151/0x1b7 [ 101.002295][ T5494] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 101.007596][ T5494] ? vfs_write+0xbb3/0xeb0 [ 101.011927][ T5494] dump_stack+0x15/0x1b [ 101.016091][ T5494] should_fail_ex+0x3d0/0x520 [ 101.020606][ T5494] should_fail+0xb/0x10 [ 101.024599][ T5494] should_fail_usercopy+0x1a/0x20 [ 101.029459][ T5494] _copy_from_user+0x1e/0xc0 [ 101.033885][ T5494] __sys_bpf+0x23b/0x7f0 [ 101.037963][ T5494] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 101.043181][ T5494] ? debug_smp_processor_id+0x17/0x20 [ 101.048377][ T5494] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 101.054281][ T5494] __x64_sys_bpf+0x7c/0x90 [ 101.058533][ T5494] do_syscall_64+0x3d/0xb0 [ 101.062788][ T5494] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 101.068512][ T5494] RIP: 0033:0x7fd560e7d0a9 [ 101.072801][ T5494] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 101.092210][ T5494] RSP: 002b:00007fd561c1c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 101.100455][ T5494] RAX: ffffffffffffffda RBX: 00007fd560fb3f80 RCX: 00007fd560e7d0a9 [ 101.108350][ T5494] RDX: 000000000000000c RSI: 0000000020000500 RDI: 000000000000000a [ 101.116162][ T5494] RBP: 00007fd561c1c120 R08: 0000000000000000 R09: 0000000000000000 [ 101.123974][ T5494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.131790][ T5494] R13: 000000000000000b R14: 00007fd560fb3f80 R15: 00007ffcd6848c38 [ 101.139602][ T5494] [ 101.149530][ T5501] syz-executor.0[5501] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.149598][ T5501] syz-executor.0[5501] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.459100][ T5527] device wg2 entered promiscuous mode [ 101.856527][ T5561] FAULT_INJECTION: forcing a failure. [ 101.856527][ T5561] name failslab, interval 1, probability 0, space 0, times 0 [ 101.876495][ T5561] CPU: 1 PID: 5561 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 101.886479][ T5561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 101.896372][ T5561] Call Trace: [ 101.899497][ T5561] [ 101.902276][ T5561] dump_stack_lvl+0x151/0x1b7 [ 101.906788][ T5561] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 101.912083][ T5561] dump_stack+0x15/0x1b [ 101.916073][ T5561] should_fail_ex+0x3d0/0x520 [ 101.920587][ T5561] ? __hw_addr_add_ex+0x1fd/0x770 [ 101.925449][ T5561] __should_failslab+0xaf/0xf0 [ 101.930048][ T5561] should_failslab+0x9/0x20 [ 101.934391][ T5561] __kmem_cache_alloc_node+0x3d/0x250 [ 101.939603][ T5561] ? __hw_addr_add_ex+0x1fd/0x770 [ 101.944455][ T5561] kmalloc_trace+0x2a/0xa0 [ 101.948800][ T5561] __hw_addr_add_ex+0x1fd/0x770 [ 101.953486][ T5561] dev_addr_init+0x13f/0x220 [ 101.957912][ T5561] ? dev_addr_flush+0x230/0x230 [ 101.962773][ T5561] alloc_netdev_mqs+0x29d/0xf90 [ 101.967455][ T5561] ? ppp_ioctl+0x1e1/0x1990 [ 101.971796][ T5561] ? ppp_ccp_closed+0x2c0/0x2c0 [ 101.976482][ T5561] ppp_ioctl+0x588/0x1990 [ 101.980650][ T5561] ? __mutex_lock_slowpath+0x10/0x10 [ 101.985769][ T5561] ? ppp_poll+0x250/0x250 [ 101.989936][ T5561] ? __fget_files+0x2cb/0x330 [ 101.994453][ T5561] ? security_file_ioctl+0x84/0xb0 [ 101.999396][ T5561] ? ppp_poll+0x250/0x250 [ 102.003564][ T5561] __se_sys_ioctl+0x114/0x190 [ 102.008078][ T5561] __x64_sys_ioctl+0x7b/0x90 [ 102.012506][ T5561] do_syscall_64+0x3d/0xb0 [ 102.016755][ T5561] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 102.022481][ T5561] RIP: 0033:0x7fd560e7d0a9 [ 102.026737][ T5561] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 102.046180][ T5561] RSP: 002b:00007fd561c1c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 102.054434][ T5561] RAX: ffffffffffffffda RBX: 00007fd560fb3f80 RCX: 00007fd560e7d0a9 [ 102.062234][ T5561] RDX: 0000000020001400 RSI: 00000000c004743e RDI: 0000000000000005 [ 102.070045][ T5561] RBP: 00007fd561c1c120 R08: 0000000000000000 R09: 0000000000000000 [ 102.077855][ T5561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 102.085667][ T5561] R13: 000000000000000b R14: 00007fd560fb3f80 R15: 00007ffcd6848c38 [ 102.093484][ T5561] [ 102.210813][ T5581] syz-executor.2[5581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.210881][ T5581] syz-executor.2[5581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.223673][ T5581] syz-executor.2[5581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.235390][ T5581] syz-executor.2[5581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.265411][ T5579] bridge0: port 3(veth1_macvtap) entered blocking state [ 102.283848][ T5579] bridge0: port 3(veth1_macvtap) entered disabled state [ 104.145775][ T5667] device wg2 left promiscuous mode [ 104.230939][ T5667] bpf_get_probe_write_proto: 2 callbacks suppressed [ 104.230957][ T5667] syz-executor.3[5667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.254168][ T5667] syz-executor.3[5667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.311176][ T5678] bond_slave_1: mtu less than device minimum [ 104.328572][ T5677] bond_slave_1: mtu less than device minimum [ 104.335492][ T5682] bond_slave_1: mtu less than device minimum [ 104.591473][ T5707] device veth0_vlan left promiscuous mode [ 104.637949][ T5707] device veth0_vlan entered promiscuous mode [ 105.164078][ T5736] device veth0_vlan left promiscuous mode [ 105.178115][ T5736] device veth0_vlan entered promiscuous mode [ 105.219329][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.243609][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.292547][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.330465][ T5745] device wg2 entered promiscuous mode [ 105.362098][ T5747] syz-executor.0[5747] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.362157][ T5747] syz-executor.0[5747] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.629362][ T5766] device veth0_vlan left promiscuous mode [ 105.662375][ T5766] device veth0_vlan entered promiscuous mode [ 105.687284][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.700774][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.719223][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.730720][ T5780] syz-executor.4[5780] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.730777][ T5780] syz-executor.4[5780] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.779663][ T5780] syz-executor.4[5780] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.792788][ T5780] syz-executor.4[5780] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.865430][ T5791] device syzkaller0 entered promiscuous mode [ 105.963393][ T5804] geneve1: tun_chr_ioctl cmd 1074025672 [ 105.970118][ T5804] geneve1: ignored: set checksum enabled [ 106.018733][ T5808] device veth0_vlan left promiscuous mode [ 106.025955][ T5808] device veth0_vlan entered promiscuous mode [ 106.036853][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 106.047128][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 106.065479][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 106.586563][ T5853] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 107.729419][ T5940] device syzkaller0 entered promiscuous mode [ 107.989177][ T5961] syz-executor.3[5961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.989263][ T5961] syz-executor.3[5961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.706972][ T6001] device wg2 entered promiscuous mode [ 108.743921][ T6008] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) [ 108.926535][ T6018] device sit0 left promiscuous mode [ 109.068347][ T28] audit: type=1400 audit(1719193103.469:137): avc: denied { create } for pid=6032 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 109.122550][ T6041] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 109.377354][ T28] audit: type=1400 audit(1719193103.779:138): avc: denied { create } for pid=6080 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 109.579546][ T6085] device syzkaller0 entered promiscuous mode [ 109.770676][ T6114] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 111.500714][ T6248] bpf_get_probe_write_proto: 4 callbacks suppressed [ 111.500730][ T6248] syz-executor.2[6248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.538528][ T6248] syz-executor.2[6248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.816957][ T28] audit: type=1400 audit(1719193106.219:139): avc: denied { write } for pid=6261 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 112.040165][ T6278] FAULT_INJECTION: forcing a failure. [ 112.040165][ T6278] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 112.151562][ T6278] CPU: 1 PID: 6278 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 112.161543][ T6278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 112.171433][ T6278] Call Trace: [ 112.174558][ T6278] [ 112.177335][ T6278] dump_stack_lvl+0x151/0x1b7 [ 112.181848][ T6278] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 112.187147][ T6278] dump_stack+0x15/0x1b [ 112.191135][ T6278] should_fail_ex+0x3d0/0x520 [ 112.195648][ T6278] should_fail+0xb/0x10 [ 112.199641][ T6278] should_fail_usercopy+0x1a/0x20 [ 112.204506][ T6278] strncpy_from_user+0x24/0x2b0 [ 112.209187][ T6278] ? getname_flags+0xba/0x520 [ 112.213703][ T6278] getname_flags+0xf2/0x520 [ 112.218043][ T6278] __x64_sys_unlink+0x3c/0x50 [ 112.222555][ T6278] do_syscall_64+0x3d/0xb0 [ 112.226807][ T6278] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 112.232534][ T6278] RIP: 0033:0x7fc998a7d0a9 [ 112.236788][ T6278] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 112.256230][ T6278] RSP: 002b:00007fc9998740c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 112.264476][ T6278] RAX: ffffffffffffffda RBX: 00007fc998bb3f80 RCX: 00007fc998a7d0a9 [ 112.272289][ T6278] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 112.280098][ T6278] RBP: 00007fc999874120 R08: 0000000000000000 R09: 0000000000000000 [ 112.287918][ T6278] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 112.295720][ T6278] R13: 000000000000000b R14: 00007fc998bb3f80 R15: 00007fff5e58d138 [ 112.303537][ T6278] [ 112.324873][ T6283] device pim6reg1 entered promiscuous mode [ 112.403537][ T6300] device pim6reg1 entered promiscuous mode [ 112.605940][ T6333] device lo entered promiscuous mode [ 112.693641][ T6351] syz-executor.3[6351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.693711][ T6351] syz-executor.3[6351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.817070][ T6367] syz-executor.0[6367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.867561][ T6367] syz-executor.0[6367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.121631][ T6389] syz-executor.2[6389] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.452711][ T4281] device bridge_slave_1 left promiscuous mode [ 113.565116][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.639609][ T4281] device bridge_slave_0 left promiscuous mode [ 113.648031][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.662503][ T4281] device veth1_macvtap left promiscuous mode [ 115.158603][ T6408] bond_slave_1: mtu greater than device maximum [ 115.277917][ T6392] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.284775][ T6392] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.292110][ T6392] device bridge_slave_0 entered promiscuous mode [ 115.299104][ T6392] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.305990][ T6392] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.313253][ T6392] device bridge_slave_1 entered promiscuous mode [ 115.411643][ T6460] device pim6reg1 entered promiscuous mode [ 115.458441][ T28] audit: type=1400 audit(1719193109.859:140): avc: denied { create } for pid=6477 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 115.733509][ T6502] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.740648][ T6502] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.766949][ T6392] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.773828][ T6392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.780933][ T6392] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.787721][ T6392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.833350][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 115.841116][ T770] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.849860][ T770] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.871523][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 115.889994][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.896883][ T314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.926330][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 115.944500][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.951378][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.978952][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 116.024572][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 116.034491][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 116.045875][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 116.053718][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 116.061316][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 116.070207][ T6392] device veth0_vlan entered promiscuous mode [ 116.094007][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 116.103353][ T6392] device veth1_macvtap entered promiscuous mode [ 116.114396][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 116.127925][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 116.143406][ T28] audit: type=1400 audit(1719193110.539:141): avc: denied { mounton } for pid=6392 comm="syz-executor.1" path="/dev/binderfs" dev="devtmpfs" ino=370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 116.801669][ T4305] device bridge_slave_1 left promiscuous mode [ 116.856272][ T4305] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.884823][ T4305] device bridge_slave_0 left promiscuous mode [ 116.890931][ T4305] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.934380][ T4305] device veth1_macvtap left promiscuous mode [ 116.940263][ T4305] device veth0_vlan left promiscuous mode [ 117.497873][ T6565] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.574786][ T6565] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.624007][ T6565] device bridge_slave_0 entered promiscuous mode [ 117.646616][ T6565] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.663525][ T6565] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.711450][ T6565] device bridge_slave_1 entered promiscuous mode [ 117.826846][ T6611] Â: renamed from pim6reg1 [ 117.931260][ T6565] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.938112][ T6565] bridge0: port 2(bridge_slave_1) entered forwarding state [ 117.945176][ T6565] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.952013][ T6565] bridge0: port 1(bridge_slave_0) entered forwarding state [ 117.997086][ T770] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.021227][ T770] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.036440][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 118.043790][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 118.075193][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 118.083378][ T770] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.090253][ T770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.099132][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 118.125022][ T770] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.131918][ T770] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.162193][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 118.170088][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 118.189853][ T6565] device veth0_vlan entered promiscuous mode [ 118.198188][ T6652] syz-executor.3[6652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.198263][ T6652] syz-executor.3[6652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.214031][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 118.234385][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.242330][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 118.249726][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 118.273174][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 118.283411][ T6565] device veth1_macvtap entered promiscuous mode [ 118.291282][ T6652] syz-executor.3[6652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.291340][ T6652] syz-executor.3[6652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.303768][ T6652] syz-executor.3[6652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.315385][ T6652] syz-executor.3[6652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.315860][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 118.347084][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 118.984615][ T4281] device bridge_slave_1 left promiscuous mode [ 118.992055][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.029117][ T4281] device bridge_slave_0 left promiscuous mode [ 119.063496][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.165134][ T4281] device veth1_macvtap left promiscuous mode [ 119.201348][ T4281] device veth0_vlan left promiscuous mode [ 119.633796][ T6680] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.745492][ T6680] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.798484][ T6680] device bridge_slave_0 entered promiscuous mode [ 119.833786][ T6680] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.846180][ T6680] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.867227][ T6680] device bridge_slave_1 entered promiscuous mode [ 120.056590][ T6680] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.063471][ T6680] bridge0: port 2(bridge_slave_1) entered forwarding state [ 120.070583][ T6680] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.077433][ T6680] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.185157][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.197300][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.217851][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.271672][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 120.289864][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.296832][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.324314][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 120.337783][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.344651][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 120.366206][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 120.381705][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 120.402422][ T6680] device veth0_vlan entered promiscuous mode [ 120.456161][ T6680] device veth1_macvtap entered promiscuous mode [ 120.497835][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 120.513948][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.522730][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 120.539649][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 120.548422][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 120.584374][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 120.595837][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 120.615225][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 120.631920][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 120.932583][ T6794] syz-executor.0[6794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.932664][ T6794] syz-executor.0[6794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.513589][ T4281] device bridge_slave_1 left promiscuous mode [ 121.633785][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.707122][ T4281] device bridge_slave_0 left promiscuous mode [ 121.722042][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.740248][ T4281] device veth1_macvtap left promiscuous mode [ 121.746217][ T4281] device veth0_vlan left promiscuous mode [ 121.752471][ T6826] tipc: Failed to clone mcast rcv buffer [ 121.929441][ T6803] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.936582][ T6803] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.944148][ T6803] device bridge_slave_0 entered promiscuous mode [ 121.961712][ T6803] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.969027][ T6803] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.977160][ T6803] device bridge_slave_1 entered promiscuous mode [ 121.993875][ T6807] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.001282][ T6807] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.008888][ T6807] device bridge_slave_0 entered promiscuous mode [ 122.026972][ T6807] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.033813][ T6807] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.041674][ T6807] device bridge_slave_1 entered promiscuous mode [ 122.270267][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.280206][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.327758][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.335898][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.376763][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.383631][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.430655][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.465814][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.506999][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.513878][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.555374][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 122.572003][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 122.593940][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 122.643931][ T6803] device veth0_vlan entered promiscuous mode [ 122.669168][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 122.686997][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 122.707777][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 122.730787][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 122.790868][ T6803] device veth1_macvtap entered promiscuous mode [ 122.821397][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 122.831370][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 122.902083][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 122.972779][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 123.034115][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 123.104117][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 123.173623][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 123.181323][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 123.189774][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 123.198348][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.205202][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.214669][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 123.222930][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 123.231251][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.238114][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.339790][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 123.355043][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 123.404579][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 123.440917][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 123.481131][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 123.520831][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 123.561636][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 123.604787][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 123.636478][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 123.676453][ T6807] device veth0_vlan entered promiscuous mode [ 123.708274][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 123.731249][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 123.825780][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 123.904690][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 123.992250][ T6807] device veth1_macvtap entered promiscuous mode [ 124.069533][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 124.089043][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 124.150688][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 124.198122][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 124.208961][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 124.299087][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 124.311706][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 124.339367][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 124.356162][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 124.409025][ T4281] device bridge_slave_1 left promiscuous mode [ 124.414981][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.483700][ T4281] device bridge_slave_0 left promiscuous mode [ 124.506218][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.530835][ T4281] device veth1_macvtap left promiscuous mode [ 124.536950][ T4281] device veth0_vlan left promiscuous mode [ 124.588033][ T6914] syz-executor.4[6914] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.588166][ T6914] syz-executor.4[6914] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.989100][ T6912] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.015160][ T6912] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.022682][ T6912] device bridge_slave_0 entered promiscuous mode [ 125.068131][ T6912] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.105531][ T6912] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.132987][ T6912] device bridge_slave_1 entered promiscuous mode [ 125.155841][ T6930] device syzkaller0 entered promiscuous mode [ 125.179594][ T6949] syz-executor.0[6949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.179662][ T6949] syz-executor.0[6949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.199161][ T6949] syz-executor.0[6949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.210837][ T6949] syz-executor.0[6949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.240027][ T6926] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.258437][ T6926] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.265627][ T6926] device bridge_slave_0 entered promiscuous mode [ 125.307335][ T6926] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.314268][ T6926] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.322462][ T6926] device bridge_slave_1 entered promiscuous mode [ 125.446781][ T6912] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.453720][ T6912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.460864][ T6912] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.467728][ T6912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.549168][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 125.557660][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.564806][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.606395][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.614568][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.621426][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.640601][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.663022][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.669898][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.738915][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 125.755652][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 125.792188][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 125.802703][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 125.818227][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 125.829664][ T7001] syz-executor.0[7001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.829731][ T7001] syz-executor.0[7001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.851382][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.887612][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.894484][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.903495][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 125.911939][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.920437][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.927297][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.940995][ T6912] device veth0_vlan entered promiscuous mode [ 125.972038][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 125.992820][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 126.029606][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 126.040216][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 126.062008][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.120725][ T6912] device veth1_macvtap entered promiscuous mode [ 126.186064][ T7008] device syzkaller0 entered promiscuous mode [ 126.232667][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 126.251450][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 126.297667][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 126.348809][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 126.402947][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 126.441654][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 126.497787][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 126.527609][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 126.535642][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 126.610618][ T6926] device veth0_vlan entered promiscuous mode [ 126.620109][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 126.628660][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 126.642221][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 126.653078][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 126.661775][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 126.670049][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 126.678348][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 126.686518][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.723589][ T4281] device bridge_slave_1 left promiscuous mode [ 126.739893][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.752324][ T4281] device bridge_slave_0 left promiscuous mode [ 126.758976][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.768164][ T4281] device bridge_slave_1 left promiscuous mode [ 126.779877][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.802661][ T4281] device bridge_slave_0 left promiscuous mode [ 126.810145][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.818650][ T4281] device veth1_macvtap left promiscuous mode [ 126.824484][ T4281] device veth0_vlan left promiscuous mode [ 126.830759][ T4281] device veth1_macvtap left promiscuous mode [ 126.836642][ T4281] device veth0_vlan left promiscuous mode [ 131.243114][ T6926] device veth1_macvtap entered promiscuous mode [ 131.251767][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.259295][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.266772][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 131.274692][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 131.282998][ T2364] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 131.308880][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 131.316913][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.324927][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 131.334547][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 132.100024][ T7099] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.107159][ T7099] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.114500][ T7099] device bridge_slave_0 entered promiscuous mode [ 132.122119][ T7099] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.129230][ T7099] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.140785][ T7099] device bridge_slave_1 entered promiscuous mode [ 132.376930][ T7135] syz-executor.3[7135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.377009][ T7135] syz-executor.3[7135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.394668][ T7135] syz-executor.3[7135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.406359][ T7135] syz-executor.3[7135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.448869][ T7110] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.468176][ T7110] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.475474][ T7110] device bridge_slave_0 entered promiscuous mode [ 132.490170][ T4281] device bridge_slave_1 left promiscuous mode [ 132.498475][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.523821][ T4281] device bridge_slave_0 left promiscuous mode [ 132.529929][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.538283][ T4281] device bridge_slave_1 left promiscuous mode [ 132.544275][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.551831][ T4281] device bridge_slave_0 left promiscuous mode [ 132.557919][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.566086][ T4281] device veth1_macvtap left promiscuous mode [ 132.572027][ T4281] device veth0_vlan left promiscuous mode [ 132.579377][ T4281] device veth1_macvtap left promiscuous mode [ 132.585369][ T4281] device veth0_vlan left promiscuous mode [ 132.757887][ T7110] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.765024][ T7110] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.772702][ T7110] device bridge_slave_1 entered promiscuous mode [ 132.813142][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.820921][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.867318][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.878786][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.902656][ T770] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.909538][ T770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.932119][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.940397][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.948742][ T770] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.955595][ T770] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.975798][ T7099] device veth0_vlan entered promiscuous mode [ 133.002390][ T7160] device wg2 entered promiscuous mode [ 133.022776][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.049573][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.093834][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.110923][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.118922][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.127505][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 133.135852][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 133.144185][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 133.152118][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.169240][ T7099] device veth1_macvtap entered promiscuous mode [ 133.184973][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 133.199917][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.207587][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 133.215735][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 133.280407][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 133.308632][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 133.331254][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 133.341018][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 133.403024][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 133.411031][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.431536][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.440471][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.448506][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.455353][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.462619][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 133.470846][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.478892][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.485824][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.494266][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.502243][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.529189][ T7193] device syzkaller0 entered promiscuous mode [ 133.543076][ T7110] device veth0_vlan entered promiscuous mode [ 133.554880][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.562608][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.570533][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.579049][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 133.587192][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 133.595266][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 133.603119][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.629565][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 133.637011][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.652898][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 133.670167][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 133.687304][ T7110] device veth1_macvtap entered promiscuous mode [ 133.721883][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 133.738269][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 133.789572][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 133.845099][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 133.853657][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 133.937840][ T7194] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.952289][ T7194] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.967262][ T7194] device bridge_slave_0 entered promiscuous mode [ 133.983901][ T7194] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.994278][ T7194] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.001580][ T7194] device bridge_slave_1 entered promiscuous mode [ 134.281199][ T7194] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.288090][ T7194] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.295163][ T7194] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.301966][ T7194] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.326074][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.333643][ T7121] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.348173][ T7121] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.438841][ T28] audit: type=1400 audit(1719193128.839:142): avc: denied { setopt } for pid=7221 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 134.460045][ T4281] device bridge_slave_1 left promiscuous mode [ 134.465999][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.568298][ T4281] device bridge_slave_0 left promiscuous mode [ 134.574287][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.583412][ T4281] device veth1_macvtap left promiscuous mode [ 134.589350][ T4281] device veth0_vlan left promiscuous mode [ 134.660279][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.668500][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.668609][ T7236] syz-executor.0[7236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.676501][ T7236] syz-executor.0[7236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.676950][ T7121] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.706265][ T7121] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.713650][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.722114][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.730115][ T7121] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.736956][ T7121] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.744164][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 134.752320][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.760065][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 134.767942][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.786938][ T7194] device veth0_vlan entered promiscuous mode [ 134.800338][ T7194] device veth1_macvtap entered promiscuous mode [ 134.829321][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 134.841337][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 134.850388][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 134.877069][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.885536][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 134.901847][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.911519][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 134.919246][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 134.927684][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 134.935935][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 134.944263][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 134.960374][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.967923][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.995978][ T7217] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.002943][ T7217] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.010396][ T7217] device bridge_slave_0 entered promiscuous mode [ 135.017250][ T7217] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.024147][ T7217] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.031778][ T7217] device bridge_slave_1 entered promiscuous mode [ 135.136535][ T7217] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.143406][ T7217] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.150511][ T7217] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.157287][ T7217] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.247009][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 135.267478][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.405502][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.532998][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.541996][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.549214][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.565076][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 135.581592][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.588479][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.638204][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 135.650202][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.728416][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 135.767244][ T770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.835020][ T7217] device veth0_vlan entered promiscuous mode [ 135.886394][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 135.894700][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 135.903148][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 135.911363][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 135.919498][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 135.927075][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 135.973684][ T7217] device veth1_macvtap entered promiscuous mode [ 135.980655][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 135.990187][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 135.999973][ T7290] syz-executor.0[7290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.000075][ T7290] syz-executor.0[7290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.013763][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 136.037213][ T7292] syz-executor.3[7292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.037278][ T7292] syz-executor.3[7292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.052493][ T7259] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.071367][ T7259] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.079285][ T7259] device bridge_slave_0 entered promiscuous mode [ 136.115000][ T7259] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.121947][ T7259] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.129790][ T7259] device bridge_slave_1 entered promiscuous mode [ 136.139143][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 136.147429][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 136.164835][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 136.178410][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 136.269536][ T7302] Â: renamed from pim6reg1 [ 136.474241][ T7259] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.481117][ T7259] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.488238][ T7259] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.494984][ T7259] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.550089][ T4281] device bridge_slave_1 left promiscuous mode [ 136.562044][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.570490][ T4281] device bridge_slave_0 left promiscuous mode [ 136.576565][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.584964][ T4281] device bridge_slave_1 left promiscuous mode [ 136.613826][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.624197][ T4281] device bridge_slave_0 left promiscuous mode [ 136.630574][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.639266][ T4281] device veth1_macvtap left promiscuous mode [ 136.645291][ T4281] device veth0_vlan left promiscuous mode [ 136.651762][ T4281] device veth1_macvtap left promiscuous mode [ 136.657846][ T4281] device veth0_vlan left promiscuous mode [ 136.837538][ T314] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.844850][ T314] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.865057][ T7332] device pim6reg1 entered promiscuous mode [ 136.873592][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 136.881084][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.888867][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 136.897380][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 136.905416][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.912269][ T314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.928129][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 136.936513][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 136.944829][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.951700][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.981431][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 136.990708][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.007662][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 137.018565][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.038319][ T7319] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.045248][ T7319] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.052511][ T7319] device bridge_slave_0 entered promiscuous mode [ 137.059826][ T7319] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.066916][ T7319] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.074227][ T7319] device bridge_slave_1 entered promiscuous mode [ 137.097370][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 137.105741][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 137.152684][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 137.160588][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 137.168369][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 137.175598][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 137.207998][ T7259] device veth0_vlan entered promiscuous mode [ 137.242789][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.269089][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.278088][ T2773] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.284935][ T2773] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.310098][ T7259] device veth1_macvtap entered promiscuous mode [ 137.329650][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 137.338939][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.347291][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.354147][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.363577][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.371564][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.383980][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 137.392157][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 137.400324][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 137.445199][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 137.454023][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 137.461892][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 137.469714][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 137.477000][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 137.484977][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 137.493340][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 137.501646][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 137.511091][ T7319] device veth0_vlan entered promiscuous mode [ 137.548018][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 137.557562][ T7319] device veth1_macvtap entered promiscuous mode [ 137.568978][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 137.607687][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 137.957848][ T7402] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.996218][ T7402] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.003545][ T7402] device bridge_slave_0 entered promiscuous mode [ 138.013077][ T7402] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.020425][ T7402] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.027890][ T7402] device bridge_slave_1 entered promiscuous mode [ 138.204001][ T4281] device bridge_slave_1 left promiscuous mode [ 138.220247][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.275151][ T4281] device bridge_slave_0 left promiscuous mode [ 138.327201][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.406829][ T4281] device veth1_macvtap left promiscuous mode [ 138.412677][ T4281] device veth0_vlan left promiscuous mode [ 138.865044][ T7402] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.871923][ T7402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.879013][ T7402] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.885791][ T7402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.895569][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.904684][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.086166][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.105180][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.199540][ T7410] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.256295][ T7410] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.306967][ T7410] device bridge_slave_0 entered promiscuous mode [ 139.356795][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.364967][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.433305][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.440183][ T314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.534073][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.591727][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.642611][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.649487][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.726251][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 139.735217][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.743371][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.751713][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.787637][ T7410] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.794548][ T7410] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.808449][ T7410] device bridge_slave_1 entered promiscuous mode [ 139.824792][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 139.833651][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 139.850851][ T7402] device veth0_vlan entered promiscuous mode [ 139.881059][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 139.888924][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.902349][ T7402] device veth1_macvtap entered promiscuous mode [ 139.921830][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 139.930036][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 139.937602][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 139.953287][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 139.962122][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 140.003677][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 140.012890][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 140.022792][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 140.031477][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 140.178252][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 140.191251][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 140.243997][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 140.255352][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 140.264194][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.271073][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.279070][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 140.287575][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 140.295604][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.302482][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.309739][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 140.317716][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 140.327210][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 140.351784][ T7410] device veth0_vlan entered promiscuous mode [ 140.374615][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 140.386329][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.402896][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.419011][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.434143][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 140.469891][ T7410] device veth1_macvtap entered promiscuous mode [ 140.487504][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 140.518482][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 140.539421][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 140.589614][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 140.618993][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 140.720636][ T4281] device bridge_slave_1 left promiscuous mode [ 140.727769][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.740597][ T4281] device bridge_slave_0 left promiscuous mode [ 140.764538][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.794968][ T4281] device bridge_slave_1 left promiscuous mode [ 140.809051][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.839763][ T4281] device bridge_slave_0 left promiscuous mode [ 140.856508][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.883539][ T4281] device veth1_macvtap left promiscuous mode [ 140.896375][ T4281] device veth0_vlan left promiscuous mode [ 140.917228][ T4281] device veth1_macvtap left promiscuous mode [ 140.939364][ T4281] device veth0_vlan left promiscuous mode [ 141.204784][ T7549] device wg2 left promiscuous mode [ 141.264038][ T7509] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.279794][ T7509] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.325275][ T7509] device bridge_slave_0 entered promiscuous mode [ 141.418515][ T7509] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.425373][ T7509] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.503677][ T7509] device bridge_slave_1 entered promiscuous mode [ 141.522502][ T7550] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.529437][ T7550] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.536751][ T7550] device bridge_slave_0 entered promiscuous mode [ 141.543747][ T7550] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.550630][ T7550] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.558315][ T7550] device bridge_slave_1 entered promiscuous mode [ 141.871244][ T7509] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.878112][ T7509] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.885200][ T7509] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.892012][ T7509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.994855][ T7550] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.001741][ T7550] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.008827][ T7550] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.015598][ T7550] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.092984][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 142.105027][ T331] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.137790][ T331] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.159333][ T331] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.180359][ T331] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.248584][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 142.275232][ T331] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.282200][ T331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.366468][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 142.424973][ T331] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.431856][ T331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.536836][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 142.593087][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 142.600998][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 142.609564][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 142.617797][ T331] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.624640][ T331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.632149][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 142.640593][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 142.648986][ T331] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.655831][ T331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.701472][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 142.760230][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 142.789837][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 142.802126][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 142.856384][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 142.868683][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 142.880441][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 142.896541][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 142.906769][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 142.923384][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 142.960375][ T7509] device veth0_vlan entered promiscuous mode [ 142.973659][ T7550] device veth0_vlan entered promiscuous mode [ 142.980893][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 143.002931][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 143.012822][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 143.020765][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.029337][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 143.037461][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.051732][ T7509] device veth1_macvtap entered promiscuous mode [ 143.108048][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.115905][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 143.132220][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.159279][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 143.167078][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 143.175100][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 143.183371][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 143.203320][ T7550] device veth1_macvtap entered promiscuous mode [ 143.219837][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 143.229800][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 143.250864][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 143.262311][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 143.270514][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 143.278331][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 143.293618][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.336497][ T7662] device syzkaller0 entered promiscuous mode [ 143.342903][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 143.352702][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 143.361306][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 143.371282][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.522016][ T7685] syz-executor.0[7685] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.522110][ T7685] syz-executor.0[7685] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.607874][ T4281] device bridge_slave_1 left promiscuous mode [ 143.645797][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.676515][ T4281] device bridge_slave_0 left promiscuous mode [ 143.682481][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.702688][ T4281] device bridge_slave_1 left promiscuous mode [ 143.717562][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.729843][ T4281] device bridge_slave_0 left promiscuous mode [ 143.735851][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.744048][ T4281] device veth1_macvtap left promiscuous mode [ 143.750129][ T4281] device veth0_vlan left promiscuous mode [ 143.756458][ T4281] device veth1_macvtap left promiscuous mode [ 143.770468][ T4281] device veth0_vlan left promiscuous mode [ 144.192156][ T7719] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.199466][ T7719] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.206971][ T7719] device bridge_slave_0 entered promiscuous mode [ 144.216329][ T7742] syz-executor.4[7742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.216393][ T7742] syz-executor.4[7742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.276354][ T7719] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.294772][ T7719] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.302399][ T7719] device bridge_slave_1 entered promiscuous mode [ 144.316546][ T7724] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.323583][ T7724] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.330871][ T7724] device bridge_slave_0 entered promiscuous mode [ 144.338117][ T7724] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.345142][ T7724] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.352741][ T7724] device bridge_slave_1 entered promiscuous mode [ 144.932551][ T7771] syz-executor.0[7771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.932617][ T7771] syz-executor.0[7771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.950120][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 144.984165][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.991820][ T7775] syz-executor.0[7775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.991885][ T7775] syz-executor.0[7775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.055022][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.168565][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.249084][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 145.296905][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 145.313318][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.320210][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.361185][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.369786][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.378052][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.384908][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.392500][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 145.400693][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 145.408740][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.415566][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.422818][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.430898][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.438892][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.445729][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.452941][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 145.504190][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 145.511808][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 145.519501][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 145.531027][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 145.541073][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 145.563050][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 145.574056][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 145.585794][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 145.594950][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 145.611497][ T7719] device veth0_vlan entered promiscuous mode [ 145.636741][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 145.644523][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 145.703117][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 145.744805][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 145.793498][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 145.816454][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 145.823771][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 145.831396][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 145.857890][ T7724] device veth0_vlan entered promiscuous mode [ 145.880995][ T7719] device veth1_macvtap entered promiscuous mode [ 145.938607][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 145.968578][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 146.016480][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 146.067379][ T4281] device bridge_slave_1 left promiscuous mode [ 146.073325][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.142999][ T4281] device bridge_slave_0 left promiscuous mode [ 146.186479][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.237330][ T4281] device bridge_slave_1 left promiscuous mode [ 146.243276][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.340943][ T4281] device bridge_slave_0 left promiscuous mode [ 146.376297][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.411562][ T4281] device veth1_macvtap left promiscuous mode [ 146.426209][ T4281] device veth0_vlan left promiscuous mode [ 146.447284][ T4281] device veth1_macvtap left promiscuous mode [ 146.453140][ T4281] device veth0_vlan left promiscuous mode [ 147.091293][ T7724] device veth1_macvtap entered promiscuous mode [ 147.106450][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 147.116755][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 147.124805][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 147.155563][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 147.166747][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 147.175334][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 147.183609][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 147.193284][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 147.201573][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 147.331505][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 147.366533][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2024/06/24 01:39:01 SYZFATAL: executor 1 failed 11 times: executor 1: failed to write control pipe: write |1: broken pipe SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67