Warning: Permanently added '10.128.1.34' (ED25519) to the list of known hosts. 2024/05/19 08:22:54 fuzzer started 2024/05/19 08:22:54 dialing manager at 10.128.0.163:30005 [ 20.810039][ T30] audit: type=1400 audit(1716106974.402:66): avc: denied { node_bind } for pid=283 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 20.830298][ T30] audit: type=1400 audit(1716106974.402:67): avc: denied { name_bind } for pid=283 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 20.884096][ T30] audit: type=1400 audit(1716106974.472:69): avc: denied { integrity } for pid=293 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 20.909455][ T293] cgroup: Unknown subsys name 'net' [ 20.913588][ T30] audit: type=1400 audit(1716106974.472:68): avc: denied { integrity } for pid=292 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 20.937876][ T293] cgroup: Unknown subsys name 'devices' [ 20.943257][ T298] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.943645][ T30] audit: type=1400 audit(1716106974.472:70): avc: denied { mounton } for pid=295 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.976188][ T30] audit: type=1400 audit(1716106974.472:71): avc: denied { mount } for pid=295 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.999207][ T30] audit: type=1400 audit(1716106974.502:72): avc: denied { mounton } for pid=293 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.021745][ T30] audit: type=1400 audit(1716106974.502:73): avc: denied { mount } for pid=293 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.044036][ T30] audit: type=1400 audit(1716106974.512:74): avc: denied { setattr } for pid=294 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.067053][ T30] audit: type=1400 audit(1716106974.512:75): avc: denied { unmount } for pid=293 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.086825][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.208585][ T293] cgroup: Unknown subsys name 'hugetlb' [ 21.214139][ T293] cgroup: Unknown subsys name 'rlimit' 2024/05/19 08:22:55 starting 5 executor processes [ 21.966628][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.973580][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.980853][ T302] device bridge_slave_0 entered promiscuous mode [ 21.990510][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.997385][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.004595][ T302] device bridge_slave_1 entered promiscuous mode [ 22.030261][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.037119][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.044239][ T303] device bridge_slave_0 entered promiscuous mode [ 22.053759][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.060658][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.067846][ T303] device bridge_slave_1 entered promiscuous mode [ 22.147424][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.154264][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.161421][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.168260][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.178326][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.185151][ T303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.192256][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.199055][ T303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.226933][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.233956][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.241368][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.248354][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.255733][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.262953][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.272595][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.280062][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.288034][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.294851][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.303253][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.311242][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.318085][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.327379][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.335316][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.342157][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.349289][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.357213][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.364028][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.378851][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.386532][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.394280][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.403353][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.420170][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.429498][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.440892][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.448887][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.456032][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.464718][ T303] device veth0_vlan entered promiscuous mode [ 22.472001][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.479734][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.486986][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.494541][ T302] device veth0_vlan entered promiscuous mode [ 22.504917][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.513925][ T303] device veth1_macvtap entered promiscuous mode [ 22.524419][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.535451][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready executing program 4: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000ffffffffffff0500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r3, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_freezer_state(r5, &(0x7f0000000140), 0x2, 0x0) r7 = openat$cgroup_procs(r5, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_mballoc_alloc\x00', r8}, 0x10) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(r6, &(0x7f0000000400)='FROZEN\x00', 0x7) write$cgroup_freezer_state(r6, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061140400000000005e000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fcae68da850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f00000020c0)}], 0x5}, 0x0) [ 22.543411][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.552342][ T302] device veth1_macvtap entered promiscuous mode [ 22.566653][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.590401][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000240)="b0", 0x1}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r5}, &(0x7f0000000080), &(0x7f0000000200)='%-010d \x00'}, 0x20) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/65, 0x41}], 0x1}, 0x0) executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000ffffffffffff0500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r3, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_freezer_state(r5, &(0x7f0000000140), 0x2, 0x0) r7 = openat$cgroup_procs(r5, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_mballoc_alloc\x00', r8}, 0x10) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(r6, &(0x7f0000000400)='FROZEN\x00', 0x7) write$cgroup_freezer_state(r6, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061140400000000005e000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa084}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) [ 22.983459][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.990502][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.998427][ T333] device bridge_slave_0 entered promiscuous mode [ 23.005860][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.012891][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.020151][ T333] device bridge_slave_1 entered promiscuous mode [ 23.063865][ T336] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.070825][ T336] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.078279][ T336] device bridge_slave_0 entered promiscuous mode [ 23.088351][ T336] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.095419][ T336] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.102795][ T336] device bridge_slave_1 entered promiscuous mode [ 23.146625][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.153840][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.161577][ T337] device bridge_slave_0 entered promiscuous mode [ 23.197247][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.204179][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.211710][ T337] device bridge_slave_1 entered promiscuous mode [ 23.258753][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.265770][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.272860][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.279648][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000880)=ANY=[], 0x0}, 0x90) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000e00)='pids.max\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000f80), 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x2d, 'perf_event'}, {0x2d, 'pids'}, {0x2d, 'pids'}, {0x54f21d1a1e5bb8ca, 'hugetlb'}, {0x2b, 'net'}]}, 0x26) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff, 0x37}, 0x24) executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa084}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)=0x1) [ 23.321886][ T336] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.328763][ T336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.335814][ T336] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.342644][ T336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.419038][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.425890][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.433007][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.439796][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.458183][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.466319][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.476530][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.497035][ T39] bridge0: port 2(bridge_slave_1) entered disabled state executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r2) executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0xc00) [ 23.512939][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.520495][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.528162][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.542052][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.553224][ T357] device pim6reg1 entered promiscuous mode executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001020000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\xff\xd3r\xa3\xc81U\x8ez.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcd\x01t\r=\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') [ 23.596301][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.604121][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.612562][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.620360][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.633169][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.640135][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.653784][ T333] device veth0_vlan entered promiscuous mode [ 123.656755][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 123.663315][ C0] rcu: 0-...!: (10000 ticks this GP) idle=e39/1/0x4000000000000000 softirq=2361/2366 fqs=0 last_accelerate: 93c2/bad6 dyntick_enabled: 1 [ 123.677185][ C0] (t=10002 jiffies g=809 q=164) [ 123.681954][ C0] rcu: rcu_preempt kthread timer wakeup didn't happen for 10001 jiffies! g809 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 [ 123.694020][ C0] rcu: Possible timer handling issue on cpu=1 timer-softirq=218 [ 123.701575][ C0] rcu: rcu_preempt kthread starved for 10004 jiffies! g809 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=1 [ 123.712595][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 123.722403][ C0] rcu: RCU grace-period kthread stack dump: [ 123.728134][ C0] task:rcu_preempt state:I stack:28328 pid: 14 ppid: 2 flags:0x00004000 [ 123.737167][ C0] Call Trace: [ 123.740283][ C0] [ 123.743073][ C0] __schedule+0xccc/0x1590 [ 123.747316][ C0] ? __sched_text_start+0x8/0x8 [ 123.751999][ C0] ? __kasan_check_write+0x14/0x20 [ 123.756948][ C0] schedule+0x11f/0x1e0 [ 123.760940][ C0] schedule_timeout+0x18c/0x370 [ 123.765624][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 123.770663][ C0] ? console_conditional_schedule+0x30/0x30 [ 123.776388][ C0] ? update_process_times+0x200/0x200 [ 123.781598][ C0] ? prepare_to_swait_event+0x308/0x320 [ 123.786977][ C0] rcu_gp_fqs_loop+0x2af/0xf80 [ 123.791581][ C0] ? debug_smp_processor_id+0x17/0x20 [ 123.796801][ C0] ? __note_gp_changes+0x4ab/0x920 [ 123.801733][ C0] ? rcu_gp_init+0xc30/0xc30 [ 123.806158][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 123.811194][ C0] ? rcu_gp_init+0x9cf/0xc30 [ 123.815617][ C0] rcu_gp_kthread+0xa4/0x350 [ 123.820044][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 123.824729][ C0] ? rcu_barrier_callback+0x50/0x50 [ 123.829767][ C0] ? __kasan_check_read+0x11/0x20 [ 123.834625][ C0] ? __kthread_parkme+0xb2/0x200 [ 123.839398][ C0] kthread+0x421/0x510 [ 123.843305][ C0] ? rcu_barrier_callback+0x50/0x50 [ 123.848337][ C0] ? kthread_blkcg+0xd0/0xd0 [ 123.852764][ C0] ret_from_fork+0x1f/0x30 [ 123.857022][ C0] [ 123.859886][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 123.866047][ C0] Sending NMI from CPU 0 to CPUs 1: [ 123.871106][ C1] NMI backtrace for cpu 1 [ 123.871131][ C1] CPU: 1 PID: 25 Comm: ksoftirqd/1 Not tainted 5.15.149-syzkaller-00490-g5d96939590c0 #0 [ 123.871150][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 123.871163][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 123.871185][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 5b 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 123.871199][ C1] RSP: 0018:ffffc900001a7680 EFLAGS: 00000246 [ 123.871215][ C1] RAX: 0000000000000001 RBX: 1ffff92000034ed4 RCX: 1ffffffff0d1aa9c [ 123.871228][ C1] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7137ed4 [ 123.871239][ C1] RBP: ffffc900001a7730 R08: dffffc0000000000 R09: ffffed103ee26fdb [ 123.871253][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 123.871265][ C1] R13: ffff8881f7137ed4 R14: 0000000000000001 R15: 1ffff92000034ed8 [ 123.871278][ C1] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 123.871293][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 123.871306][ C1] CR2: 00000000200012c0 CR3: 000000000680f000 CR4: 00000000003506a0 [ 123.871321][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 123.871332][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 123.871343][ C1] Call Trace: [ 123.871348][ C1] [ 123.871354][ C1] ? show_regs+0x58/0x60 [ 123.871372][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 123.871394][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 123.871415][ C1] ? kvm_wait+0x147/0x180 [ 123.871430][ C1] ? kvm_wait+0x147/0x180 [ 123.871447][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 123.871466][ C1] ? nmi_handle+0xa8/0x280 [ 123.871483][ C1] ? kvm_wait+0x147/0x180 [ 123.871499][ C1] ? default_do_nmi+0x69/0x160 [ 123.871517][ C1] ? exc_nmi+0xaf/0x120 [ 123.871533][ C1] ? end_repeat_nmi+0x16/0x31 [ 123.871554][ C1] ? kvm_wait+0x147/0x180 [ 123.871570][ C1] ? kvm_wait+0x147/0x180 [ 123.871586][ C1] ? kvm_wait+0x147/0x180 [ 123.871601][ C1] [ 123.871606][ C1] [ 123.871611][ C1] ? asm_common_interrupt+0x27/0x40 [ 123.871628][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 123.871657][ C1] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 123.871680][ C1] ? kasan_set_track+0x5d/0x70 [ 123.871696][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 123.871715][ C1] ? rcu_do_batch+0x57a/0xc10 [ 123.871733][ C1] ? rcu_core_si+0x9/0x10 [ 123.871749][ C1] ? __do_softirq+0x26d/0x5bf [ 123.871765][ C1] ? run_ksoftirqd+0x23/0x30 [ 123.871786][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 123.871816][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 123.871835][ C1] ? queue_stack_map_delete_elem+0x10/0x10 [ 123.871863][ C1] sock_map_delete_elem+0x99/0x130 [ 123.871880][ C1] ? shmem_free_in_core_inode+0x75/0xc0 [ 123.871896][ C1] bpf_prog_7328e001cb098779+0x3d/0x358 [ 123.871913][ C1] bpf_trace_run2+0xec/0x210 [ 123.871928][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 123.871943][ C1] ? debug_smp_processor_id+0x17/0x20 [ 123.871958][ C1] ? shmem_free_in_core_inode+0x75/0xc0 [ 123.871972][ C1] ? kmem_cache_free+0x116/0x2e0 [ 123.871988][ C1] ? ____kasan_slab_free+0x131/0x160 [ 123.872002][ C1] ? shmem_free_in_core_inode+0x75/0xc0 [ 123.872016][ C1] __bpf_trace_kfree+0x6f/0x90 [ 123.872030][ C1] ? shmem_free_in_core_inode+0x75/0xc0 [ 123.872057][ C1] kfree+0x1f3/0x220 [ 123.872072][ C1] shmem_free_in_core_inode+0x75/0xc0 [ 123.872086][ C1] ? shmem_destroy_inode+0x10/0x10 [ 123.872099][ C1] i_callback+0x4b/0x70 [ 123.872131][ C1] ? evict+0x630/0x630 [ 123.872146][ C1] rcu_do_batch+0x57a/0xc10 [ 123.872166][ C1] ? local_bh_enable+0x20/0x20 [ 123.872182][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 123.872200][ C1] ? perf_pmu_sched_task+0x190/0x190 [ 123.872217][ C1] ? sched_clock+0x9/0x10 [ 123.872233][ C1] rcu_core+0x517/0x1020 [ 123.872249][ C1] ? _raw_spin_unlock+0x4d/0x70 [ 123.872267][ C1] ? rcu_cpu_kthread_park+0x90/0x90 [ 123.872283][ C1] ? __schedule+0xcd4/0x1590 [ 123.872310][ C1] ? irqtime_account_irq+0x79/0x3c0 [ 123.872326][ C1] rcu_core_si+0x9/0x10 [ 123.872340][ C1] __do_softirq+0x26d/0x5bf [ 123.872354][ C1] ? ksoftirqd_should_run+0x20/0x20 [ 123.872370][ C1] run_ksoftirqd+0x23/0x30 [ 123.872385][ C1] smpboot_thread_fn+0x466/0x8d0 [ 123.872404][ C1] kthread+0x421/0x510 [ 123.872418][ C1] ? cpu_report_death+0x1a0/0x1a0 [ 123.872433][ C1] ? kthread_blkcg+0xd0/0xd0 [ 123.872448][ C1] ret_from_fork+0x1f/0x30 [ 123.872465][ C1] [ 123.873142][ C0] NMI backtrace for cpu 0 [ 124.314705][ C0] CPU: 0 PID: 333 Comm: syz-executor.3 Not tainted 5.15.149-syzkaller-00490-g5d96939590c0 #0 [ 124.324690][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 124.334570][ C0] Call Trace: [ 124.337695][ C0] [ 124.340386][ C0] dump_stack_lvl+0x151/0x1b7 [ 124.344899][ C0] ? io_uring_drop_tctx_refs+0x190/0x190 [ 124.350368][ C0] ? ttwu_do_wakeup+0x187/0x430 [ 124.355053][ C0] dump_stack+0x15/0x17 [ 124.359044][ C0] nmi_cpu_backtrace+0x2f7/0x300 [ 124.363819][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 124.369807][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 124.375101][ C0] ? __kasan_check_write+0x14/0x20 [ 124.380048][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 124.384739][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 124.390654][ C0] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 124.396451][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 124.402617][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 124.408343][ C0] rcu_dump_cpu_stacks+0x1d8/0x330 [ 124.413309][ C0] print_cpu_stall+0x315/0x5f0 [ 124.417892][ C0] rcu_sched_clock_irq+0x989/0x12f0 [ 124.422926][ C0] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 124.428913][ C0] ? hrtimer_run_queues+0x15f/0x440 [ 124.433954][ C0] update_process_times+0x198/0x200 [ 124.438993][ C0] tick_sched_timer+0x188/0x240 [ 124.443685][ C0] ? tick_setup_sched_timer+0x480/0x480 [ 124.449052][ C0] __hrtimer_run_queues+0x41a/0xad0 [ 124.454088][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 124.459032][ C0] ? clockevents_program_event+0x22f/0x300 [ 124.464673][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 124.470583][ C0] hrtimer_interrupt+0x40c/0xaa0 [ 124.475351][ C0] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 124.481078][ C0] sysvec_apic_timer_interrupt+0x95/0xc0 [ 124.486547][ C0] [ 124.489321][ C0] [ 124.492099][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 124.497915][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 124.502688][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 5b 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 124.522129][ C0] RSP: 0018:ffffc900027ee5c0 EFLAGS: 00000246 [ 124.528033][ C0] RAX: 0000000000000003 RBX: 1ffff920004fdcbc RCX: ffffffff8154fa7f [ 124.535842][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888128e3d128 [ 124.543655][ C0] RBP: ffffc900027ee670 R08: dffffc0000000000 R09: ffffed10251c7a26 [ 124.551466][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 124.559279][ C0] R13: ffff888128e3d128 R14: 0000000000000003 R15: 1ffff920004fdcc0 [ 124.567098][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 124.573178][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 124.579375][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 124.584307][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 124.590385][ C0] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 124.596286][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 124.602535][ C0] ? fib6_age+0xf8/0x150 [ 124.606612][ C0] ? fib6_run_gc+0x590/0x590 [ 124.611044][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 124.615813][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 124.620851][ C0] ? fib6_walk_continue+0x114/0x720 [ 124.625884][ C0] ? fib6_walk_continue+0x256/0x720 [ 124.630918][ C0] sock_map_delete_elem+0x99/0x130 [ 124.635861][ C0] ? sock_map_unref+0x352/0x4d0 [ 124.640551][ C0] bpf_prog_7328e001cb098779+0x3d/0x358 [ 124.645931][ C0] bpf_trace_run2+0xec/0x210 [ 124.650358][ C0] ? lock_timer_base+0x270/0x270 [ 124.655131][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 124.659820][ C0] ? sock_map_unref+0x352/0x4d0 [ 124.664503][ C0] ? __local_bh_enable_ip+0x58/0x80 [ 124.669544][ C0] ? sock_map_unref+0x352/0x4d0 [ 124.674225][ C0] __bpf_trace_kfree+0x6f/0x90 [ 124.678825][ C0] ? sock_map_unref+0x352/0x4d0 [ 124.683513][ C0] kfree+0x1f3/0x220 [ 124.687456][ C0] sock_map_unref+0x352/0x4d0 [ 124.691953][ C0] sock_map_delete_elem+0xc1/0x130 [ 124.696900][ C0] ? do_setlink+0x8a2/0x3ae0 [ 124.701329][ C0] bpf_prog_7328e001cb098779+0x3d/0x358 [ 124.706712][ C0] bpf_trace_run2+0xec/0x210 [ 124.711144][ C0] ? asm_exc_int3+0x3a/0x40 [ 124.715472][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 124.720159][ C0] ? do_setlink+0x8a2/0x3ae0 [ 124.724586][ C0] ? do_setlink+0x8a2/0x3ae0 [ 124.729011][ C0] __bpf_trace_kfree+0x6f/0x90 [ 124.733613][ C0] ? do_setlink+0x8a2/0x3ae0 [ 124.738038][ C0] kfree+0x1f3/0x220 [ 124.741786][ C0] ? up_write+0x79/0x1f0 [ 124.745850][ C0] do_setlink+0x8a2/0x3ae0 [ 124.750107][ C0] ? stack_trace_save+0x113/0x1c0 [ 124.754970][ C0] ? kasan_save_stack+0x4b/0x60 [ 124.759653][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 124.764600][ C0] ? __stack_depot_save+0x34/0x470 [ 124.769545][ C0] ? nlmsg_parse_deprecated_strict+0x110/0x110 [ 124.775534][ C0] ? ____kasan_kmalloc+0xed/0x110 [ 124.780394][ C0] ? ____kasan_kmalloc+0xdb/0x110 [ 124.785253][ C0] ? __kasan_kmalloc+0x9/0x10 [ 124.789766][ C0] ? kmem_cache_alloc_trace+0x115/0x210 [ 124.795147][ C0] ? rtnl_newlink+0x10a/0x2050 [ 124.799749][ C0] ? __nla_validate_parse+0x1e6b/0x27f0 [ 124.805140][ C0] ? __nla_validate+0x50/0x50 [ 124.809647][ C0] ? __kasan_check_read+0x11/0x20 [ 124.814516][ C0] rtnl_newlink+0x1779/0x2050 [ 124.819031][ C0] ? rtnl_newlink+0x561/0x2050 [ 124.823621][ C0] ? rtnl_setlink+0x540/0x540 [ 124.828138][ C0] ? stack_trace_save+0x113/0x1c0 [ 124.833003][ C0] ? __mutex_lock_slowpath+0xe/0x10 [ 124.838026][ C0] ? mutex_lock+0x135/0x1e0 [ 124.842362][ C0] ? security_capable+0x87/0xb0 [ 124.847049][ C0] ? wait_for_completion_killable_timeout+0x10/0x10 [ 124.853475][ C0] ? ns_capable+0x89/0xe0 [ 124.857643][ C0] ? netlink_net_capable+0x125/0x160 [ 124.862760][ C0] ? rtnl_setlink+0x540/0x540 [ 124.867274][ C0] rtnetlink_rcv_msg+0x951/0xc40 [ 124.872052][ C0] ? rtnetlink_bind+0x80/0x80 [ 124.876560][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 124.881425][ C0] ? __kernel_text_address+0x9b/0x110 [ 124.886629][ C0] ? unwind_get_return_address+0x4d/0x90 [ 124.892100][ C0] ? avc_has_perm_noaudit+0x348/0x430 [ 124.897306][ C0] ? memcpy+0x56/0x70 [ 124.901126][ C0] ? avc_has_perm_noaudit+0x2dd/0x430 [ 124.906333][ C0] ? avc_denied+0x1b0/0x1b0 [ 124.910697][ C0] ? avc_has_perm+0x16f/0x260 [ 124.915182][ C0] ? ____kasan_kmalloc+0xed/0x110 [ 124.920045][ C0] ? avc_has_perm_noaudit+0x430/0x430 [ 124.925253][ C0] netlink_rcv_skb+0x1cf/0x410 [ 124.929853][ C0] ? rtnetlink_bind+0x80/0x80 [ 124.934363][ C0] ? netlink_ack+0xb10/0xb10 [ 124.938793][ C0] ? __netlink_lookup+0x37b/0x3a0 [ 124.943651][ C0] rtnetlink_rcv+0x1c/0x20 [ 124.947905][ C0] netlink_unicast+0x8df/0xac0 [ 124.952510][ C0] ? netlink_detachskb+0x90/0x90 [ 124.957277][ C0] ? security_netlink_send+0x7b/0xa0 [ 124.962399][ C0] netlink_sendmsg+0xa0a/0xd20 [ 124.967000][ C0] ? netlink_getsockopt+0x560/0x560 [ 124.972031][ C0] ? call_rcu+0xcfd/0x12a0 [ 124.976286][ C0] ? security_socket_sendmsg+0x82/0xb0 [ 124.981582][ C0] ? netlink_getsockopt+0x560/0x560 [ 124.986612][ C0] __sys_sendto+0x564/0x720 [ 124.990958][ C0] ? __ia32_sys_getpeername+0x90/0x90 [ 124.996168][ C0] ? ____fput+0x15/0x20 [ 125.000155][ C0] ? debug_smp_processor_id+0x17/0x20 [ 125.005358][ C0] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 125.011266][ C0] __x64_sys_sendto+0xe5/0x100 [ 125.015864][ C0] do_syscall_64+0x3d/0xb0 [ 125.020116][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 125.025844][ C0] RIP: 0033:0x7f0d7b518b83 [ 125.030110][ C0] Code: 64 89 02 48 c7 c0 ff ff ff ff eb b7 66 2e 0f 1f 84 00 00 00 00 00 90 80 3d 81 03 10 00 00 41 89 ca 74 14 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 75 c3 0f 1f 40 00 55 48 83 ec 30 44 89 4c 24 [ 125.049731][ C0] RSP: 002b:00007ffd0c1553d8 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 125.057975][ C0] RAX: ffffffffffffffda RBX: 00007f0d7c16e620 RCX: 00007f0d7b518b83 [ 125.065785][ C0] RDX: 000000000000002c RSI: 00007f0d7c16e670 RDI: 0000000000000003 [ 125.073597][ C0] RBP: 0000000000000001 R08: 00007ffd0c1553f4 R09: 000000000000000c [ 125.081409][ C0] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000003 [ 125.089221][ C0] R13: 0000000000000000 R14: 00007f0d7c16e670 R15: 0000000000000000 [ 125.097038][ C0] [ 264.993994][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 225s! [ksoftirqd/1:25] [ 265.001992][ C1] Modules linked in: [ 265.005722][ C1] CPU: 1 PID: 25 Comm: ksoftirqd/1 Not tainted 5.15.149-syzkaller-00490-g5d96939590c0 #0 [ 265.015352][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 265.025255][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 265.030027][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 5b 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 265.049924][ C1] RSP: 0018:ffffc900001a7680 EFLAGS: 00000246 [ 265.055807][ C1] RAX: 0000000000000001 RBX: 1ffff92000034ed4 RCX: 1ffffffff0d1aa9c [ 265.063620][ C1] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7137ed4 [ 265.071431][ C1] RBP: ffffc900001a7730 R08: dffffc0000000000 R09: ffffed103ee26fdb [ 265.079240][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 265.087055][ C1] R13: ffff8881f7137ed4 R14: 0000000000000001 R15: 1ffff92000034ed8 [ 265.094863][ C1] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 265.103631][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 265.110055][ C1] CR2: 00000000200012c0 CR3: 000000000680f000 CR4: 00000000003506a0 [ 265.117876][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 265.125674][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 265.133486][ C1] Call Trace: [ 265.136620][ C1] [ 265.139306][ C1] ? show_regs+0x58/0x60 [ 265.143381][ C1] ? watchdog_timer_fn+0x4b1/0x5f0 [ 265.148330][ C1] ? proc_watchdog_cpumask+0xd0/0xd0 [ 265.153451][ C1] ? __hrtimer_run_queues+0x41a/0xad0 [ 265.158658][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 265.163604][ C1] ? clockevents_program_event+0x22f/0x300 [ 265.169354][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 265.175256][ C1] ? hrtimer_interrupt+0x40c/0xaa0 [ 265.180211][ C1] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 265.186104][ C1] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 265.191749][ C1] [ 265.194522][ C1] [ 265.197302][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 265.203354][ C1] ? kvm_wait+0x147/0x180 [ 265.207458][ C1] ? asm_common_interrupt+0x27/0x40 [ 265.212492][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 265.217442][ C1] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 265.223429][ C1] ? kasan_set_track+0x5d/0x70 [ 265.228028][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 265.234277][ C1] ? rcu_do_batch+0x57a/0xc10 [ 265.238792][ C1] ? rcu_core_si+0x9/0x10 [ 265.242956][ C1] ? __do_softirq+0x26d/0x5bf [ 265.247470][ C1] ? run_ksoftirqd+0x23/0x30 [ 265.251911][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 265.256671][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 265.261793][ C1] ? queue_stack_map_delete_elem+0x10/0x10 [ 265.267433][ C1] sock_map_delete_elem+0x99/0x130 [ 265.272377][ C1] ? shmem_free_in_core_inode+0x75/0xc0 [ 265.277760][ C1] bpf_prog_7328e001cb098779+0x3d/0x358 [ 265.283139][ C1] bpf_trace_run2+0xec/0x210 [ 265.287571][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 265.292253][ C1] ? debug_smp_processor_id+0x17/0x20 [ 265.297462][ C1] ? shmem_free_in_core_inode+0x75/0xc0 [ 265.302842][ C1] ? kmem_cache_free+0x116/0x2e0 [ 265.307617][ C1] ? ____kasan_slab_free+0x131/0x160 [ 265.312738][ C1] ? shmem_free_in_core_inode+0x75/0xc0 [ 265.318117][ C1] __bpf_trace_kfree+0x6f/0x90 [ 265.322720][ C1] ? shmem_free_in_core_inode+0x75/0xc0 [ 265.328102][ C1] kfree+0x1f3/0x220 [ 265.331842][ C1] shmem_free_in_core_inode+0x75/0xc0 [ 265.337038][ C1] ? shmem_destroy_inode+0x10/0x10 [ 265.341988][ C1] i_callback+0x4b/0x70 [ 265.345977][ C1] ? evict+0x630/0x630 [ 265.349882][ C1] rcu_do_batch+0x57a/0xc10 [ 265.354224][ C1] ? local_bh_enable+0x20/0x20 [ 265.358823][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 265.364204][ C1] ? perf_pmu_sched_task+0x190/0x190 [ 265.369326][ C1] ? sched_clock+0x9/0x10 [ 265.373492][ C1] rcu_core+0x517/0x1020 [ 265.377574][ C1] ? _raw_spin_unlock+0x4d/0x70 [ 265.382259][ C1] ? rcu_cpu_kthread_park+0x90/0x90 [ 265.387292][ C1] ? __schedule+0xcd4/0x1590 [ 265.391726][ C1] ? irqtime_account_irq+0x79/0x3c0 [ 265.396755][ C1] rcu_core_si+0x9/0x10 [ 265.400745][ C1] __do_softirq+0x26d/0x5bf [ 265.405086][ C1] ? ksoftirqd_should_run+0x20/0x20 [ 265.410117][ C1] run_ksoftirqd+0x23/0x30 [ 265.414382][ C1] smpboot_thread_fn+0x466/0x8d0 [ 265.419145][ C1] kthread+0x421/0x510 [ 265.423051][ C1] ? cpu_report_death+0x1a0/0x1a0 [ 265.427912][ C1] ? kthread_blkcg+0xd0/0xd0 [ 265.432334][ C1] ret_from_fork+0x1f/0x30 [ 265.436594][ C1] [ 265.439458][ C1] Sending NMI from CPU 1 to CPUs 0: [ 265.444516][ C0] NMI backtrace for cpu 0 [ 265.444525][ C0] CPU: 0 PID: 333 Comm: syz-executor.3 Not tainted 5.15.149-syzkaller-00490-g5d96939590c0 #0 [ 265.444541][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 265.444550][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 265.444568][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 5b 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 265.444580][ C0] RSP: 0018:ffffc900027ee5c0 EFLAGS: 00000246 [ 265.444593][ C0] RAX: 0000000000000003 RBX: 1ffff920004fdcbc RCX: ffffffff8154fa7f [ 265.444604][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888128e3d128 [ 265.444615][ C0] RBP: ffffc900027ee670 R08: dffffc0000000000 R09: ffffed10251c7a26 [ 265.444626][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 265.444636][ C0] R13: ffff888128e3d128 R14: 0000000000000003 R15: 1ffff920004fdcc0 [ 265.444647][ C0] FS: 00005555555bf480(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 265.444660][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 265.444670][ C0] CR2: 0000001b2e922000 CR3: 0000000126c52000 CR4: 00000000003506b0 [ 265.444684][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 265.444692][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 265.444701][ C0] Call Trace: [ 265.444706][ C0] [ 265.444711][ C0] ? show_regs+0x58/0x60 [ 265.444727][ C0] ? nmi_cpu_backtrace+0x29f/0x300 [ 265.444745][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 265.444769][ C0] ? kvm_wait+0x147/0x180 [ 265.444781][ C0] ? kvm_wait+0x147/0x180 [ 265.444794][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 265.444810][ C0] ? nmi_handle+0xa8/0x280 [ 265.444825][ C0] ? kvm_wait+0x147/0x180 [ 265.444838][ C0] ? default_do_nmi+0x69/0x160 [ 265.444853][ C0] ? exc_nmi+0xaf/0x120 [ 265.444866][ C0] ? end_repeat_nmi+0x16/0x31 [ 265.444881][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 265.444899][ C0] ? kvm_wait+0x147/0x180 [ 265.444912][ C0] ? kvm_wait+0x147/0x180 [ 265.444925][ C0] ? kvm_wait+0x147/0x180 [ 265.444938][ C0] [ 265.444942][ C0] [ 265.444947][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 265.444961][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 265.444976][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 265.444993][ C0] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 265.445012][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 265.445028][ C0] ? fib6_age+0xf8/0x150 [ 265.445041][ C0] ? fib6_run_gc+0x590/0x590 [ 265.445055][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 265.445072][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 265.445088][ C0] ? fib6_walk_continue+0x114/0x720 [ 265.445101][ C0] ? fib6_walk_continue+0x256/0x720 [ 265.445115][ C0] sock_map_delete_elem+0x99/0x130 [ 265.445130][ C0] ? sock_map_unref+0x352/0x4d0 [ 265.445145][ C0] bpf_prog_7328e001cb098779+0x3d/0x358 [ 265.445157][ C0] bpf_trace_run2+0xec/0x210 [ 265.445172][ C0] ? lock_timer_base+0x270/0x270 [ 265.445188][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 265.445203][ C0] ? sock_map_unref+0x352/0x4d0 [ 265.445218][ C0] ? __local_bh_enable_ip+0x58/0x80 [ 265.445233][ C0] ? sock_map_unref+0x352/0x4d0 [ 265.445248][ C0] __bpf_trace_kfree+0x6f/0x90 [ 265.445262][ C0] ? sock_map_unref+0x352/0x4d0 [ 265.445276][ C0] kfree+0x1f3/0x220 [ 265.445293][ C0] sock_map_unref+0x352/0x4d0 [ 265.445309][ C0] sock_map_delete_elem+0xc1/0x130 [ 265.445324][ C0] ? do_setlink+0x8a2/0x3ae0 [ 265.445337][ C0] bpf_prog_7328e001cb098779+0x3d/0x358 [ 265.445349][ C0] bpf_trace_run2+0xec/0x210 [ 265.445364][ C0] ? asm_exc_int3+0x3a/0x40 [ 265.445376][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 265.445390][ C0] ? do_setlink+0x8a2/0x3ae0 [ 265.445403][ C0] ? do_setlink+0x8a2/0x3ae0 [ 265.445416][ C0] __bpf_trace_kfree+0x6f/0x90 [ 265.445430][ C0] ? do_setlink+0x8a2/0x3ae0 [ 265.445442][ C0] kfree+0x1f3/0x220 [ 265.445456][ C0] ? up_write+0x79/0x1f0 [ 265.445471][ C0] do_setlink+0x8a2/0x3ae0 [ 265.445485][ C0] ? stack_trace_save+0x113/0x1c0 [ 265.445499][ C0] ? kasan_save_stack+0x4b/0x60 [ 265.445513][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 265.445528][ C0] ? __stack_depot_save+0x34/0x470 [ 265.445545][ C0] ? nlmsg_parse_deprecated_strict+0x110/0x110 [ 265.445560][ C0] ? ____kasan_kmalloc+0xed/0x110 [ 265.445573][ C0] ? ____kasan_kmalloc+0xdb/0x110 [ 265.445586][ C0] ? __kasan_kmalloc+0x9/0x10 [ 265.445598][ C0] ? kmem_cache_alloc_trace+0x115/0x210 [ 265.445613][ C0] ? rtnl_newlink+0x10a/0x2050 [ 265.445627][ C0] ? __nla_validate_parse+0x1e6b/0x27f0 [ 265.445646][ C0] ? __nla_validate+0x50/0x50 [ 265.445663][ C0] ? __kasan_check_read+0x11/0x20 [ 265.445678][ C0] rtnl_newlink+0x1779/0x2050 [ 265.445694][ C0] ? rtnl_newlink+0x561/0x2050 [ 265.445708][ C0] ? rtnl_setlink+0x540/0x540 [ 265.445728][ C0] ? stack_trace_save+0x113/0x1c0 [ 265.445760][ C0] ? __mutex_lock_slowpath+0xe/0x10 [ 265.445774][ C0] ? mutex_lock+0x135/0x1e0 [ 265.445787][ C0] ? security_capable+0x87/0xb0 [ 265.445802][ C0] ? wait_for_completion_killable_timeout+0x10/0x10 [ 265.445818][ C0] ? ns_capable+0x89/0xe0 [ 265.445831][ C0] ? netlink_net_capable+0x125/0x160 [ 265.445847][ C0] ? rtnl_setlink+0x540/0x540 [ 265.445859][ C0] rtnetlink_rcv_msg+0x951/0xc40 [ 265.445874][ C0] ? rtnetlink_bind+0x80/0x80 [ 265.445887][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 265.445901][ C0] ? __kernel_text_address+0x9b/0x110 [ 265.445915][ C0] ? unwind_get_return_address+0x4d/0x90 [ 265.445931][ C0] ? avc_has_perm_noaudit+0x348/0x430 [ 265.445946][ C0] ? memcpy+0x56/0x70 [ 265.445960][ C0] ? avc_has_perm_noaudit+0x2dd/0x430 [ 265.445976][ C0] ? avc_denied+0x1b0/0x1b0 [ 265.445992][ C0] ? avc_has_perm+0x16f/0x260 [ 265.446006][ C0] ? ____kasan_kmalloc+0xed/0x110 [ 265.446020][ C0] ? avc_has_perm_noaudit+0x430/0x430 [ 265.446036][ C0] netlink_rcv_skb+0x1cf/0x410 [ 265.446051][ C0] ? rtnetlink_bind+0x80/0x80 [ 265.446064][ C0] ? netlink_ack+0xb10/0xb10 [ 265.446080][ C0] ? __netlink_lookup+0x37b/0x3a0 [ 265.446096][ C0] rtnetlink_rcv+0x1c/0x20 [ 265.446109][ C0] netlink_unicast+0x8df/0xac0 [ 265.446125][ C0] ? netlink_detachskb+0x90/0x90 [ 265.446141][ C0] ? security_netlink_send+0x7b/0xa0 [ 265.446154][ C0] netlink_sendmsg+0xa0a/0xd20 [ 265.446172][ C0] ? netlink_getsockopt+0x560/0x560 [ 265.446187][ C0] ? call_rcu+0xcfd/0x12a0 [ 265.446202][ C0] ? security_socket_sendmsg+0x82/0xb0 [ 265.446215][ C0] ? netlink_getsockopt+0x560/0x560 [ 265.446231][ C0] __sys_sendto+0x564/0x720 [ 265.446245][ C0] ? __ia32_sys_getpeername+0x90/0x90 [ 265.446264][ C0] ? ____fput+0x15/0x20 [ 265.446278][ C0] ? debug_smp_processor_id+0x17/0x20 [ 265.446293][ C0] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 265.446310][ C0] __x64_sys_sendto+0xe5/0x100 [ 265.446324][ C0] do_syscall_64+0x3d/0xb0 [ 265.446337][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 265.446353][ C0] RIP: 0033:0x7f0d7b518b83 [ 265.446375][ C0] Code: 64 89 02 48 c7 c0 ff ff ff ff eb b7 66 2e 0f 1f 84 00 00 00 00 00 90 80 3d 81 03 10 00 00 41 89 ca 74 14 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 75 c3 0f 1f 40 00 55 48 83 ec 30 44 89 4c 24 [ 265.446386][ C0] RSP: 002b:00007ffd0c1553d8 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 265.446400][ C0] RAX: ffffffffffffffda RBX: 00007f0d7c16e620 RCX: 00007f0d7b518b83 [ 265.446411][ C0] RDX: 000000000000002c RSI: 00007f0d7c16e670 RDI: 0000000000000003 [ 265.446420][ C0] RBP: 0000000000000001 R08: 00007ffd0c1553f4 R09: 000000000000000c [ 265.446429][ C0] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000003 [ 265.446437][ C0] R13: 0000000000000000 R14: 00007f0d7c16e670 R15: 0000000000000000 [ 265.446450][ C0]