last executing test programs: 1m30.698861116s ago: executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x3, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d00)={r1, 0xf, 0x0, 0x0, 0x0, 0x0, 0xc00d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1m30.496186857s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x1c, &(0x7f00000003c0)=@framed={{}, [@ringbuf_query, @snprintf, @printk={@x}]}, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000800)='fib6_table_lookup\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="1e031c003c5ca601288763"], 0xffdd) 1m29.301632984s ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000001040)='sys_enter\x00', r0}, 0xe) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) 1m29.204532109s ago: executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x12) write$cgroup_type(r1, &(0x7f0000000200), 0x9) 1m29.096357846s ago: executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000001080), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x5, &(0x7f0000000040)=@framed={{0x25, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x64}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) 1m13.430565947s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0xb, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='/\x00') ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x20000000) 1m13.065290224s ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000a0000000151000000000000045000000020000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x8c, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x23) 1m13.02286849s ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x4}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000004007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b703000000000000850000000300000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='ext4_allocate_inode\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='ext4_allocate_inode\x00', r0}, 0x10) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) 1m12.831149131s ago: executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000580)='qdisc_reset\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 1m12.793311696s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x20, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000004000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x7, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='ext4_allocate_blocks\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='ext4_allocate_blocks\x00', r3}, 0x10) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000dd00000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x37}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 1m11.720016813s ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_es_find_extent_range_enter\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='ext4_es_find_extent_range_enter\x00', r2}, 0x10) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) 1m11.660330803s ago: executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000001080), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x5, &(0x7f0000000040)=@framed={{0x25, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x64}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) 1m11.653616844s ago: executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB=';cpu'], 0xb) 1m11.608022751s ago: executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f00000013c0), 0xfffffdef) 1m11.524159604s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x19}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1m11.489534589s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000a0000000151000000000000045000000020000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x8c, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x23) 1m11.381429596s ago: executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000045b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000000c0)='timer_start\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 1m11.333925434s ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='rpcgss_svc_seqno_bad\x00', r1}, 0xfe97) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x19, &(0x7f0000000100), 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f0000000ec0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ext4_unlink_enter\x00', r3}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000199500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x10, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1m7.999161503s ago: executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000000), 0x9) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='ext4_begin_ordered_truncate\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 1m6.998630519s ago: executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00'}, 0x39) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x3, 0x8, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='ext4_da_update_reserve_space\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="000000000000e12eb7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000950000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x200000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0xffffffffffffff93}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r6, &(0x7f0000000080), 0x0}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000004000000bb7f1b00d600feff0000000a9500000000000001"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 1m6.925293221s ago: executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x0, 0x5, 0x1000}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0xfffffffffffffdd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x40000000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_type(0xffffffffffffffff, &(0x7f00000015c0), 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xc, 0x10, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2}, 0x48) openat$cgroup_ro(r2, &(0x7f0000000740)='devices.list\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x9, &(0x7f0000001600)=ANY=[@ANYBLOB="18080000000000000000000000000000852000000700000018000000", @ANYRES32, @ANYBLOB="885d7900000000002f0000000000000085000000a20000009500000c000000009500007000000000f200010000c58186d307cd597be17d764e9a2ddea3dc01b4f35c40a19ad951cd0a1e1064a8f01db1b52bd12fff4161663796e0a6cdfeddf4ff4dec87935d87597f487b4ca8e66543dd2e589d210d4535f1465ac83d167055"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x90) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) socketpair$unix(0x2, 0x5, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340)={0x0, 0xe}, 0x10}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ipvlan0\x00', 0xf45df936f68cfd52}) ioctl$TUNGETDEVNETNS(r3, 0x400454ce, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x7a, 0x8000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1m3.963655612s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x20, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000004000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x7, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='ext4_allocate_blocks\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='ext4_allocate_blocks\x00', r3}, 0x10) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000dd00000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x37}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 1m2.135121497s ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x40305839, &(0x7f0000000540)={'\x00', @link_local={0x1, 0x80, 0xc2, 0x5}}) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[], 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x5, 0x0, &(0x7f00000021c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000130100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000009500"/88], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0, r0}, &(0x7f0000000300), &(0x7f0000000340)='%-010d \x00'}, 0x1c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r0, r0}, 0x4) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x92, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc91bfc9fc8746f3f, 0x9, 0x0, 0x5}, 0x0, 0x2000000000000000, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x92, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x2, 0x1, 0x106, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000040), 0x3b) 1m0.00130632s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_es_find_extent_range_enter\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='ext4_es_find_extent_range_enter\x00', r2}, 0x10) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) 39.640799352s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0xb, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='/\x00') ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x20000000) 39.639050233s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x4}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000004007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b703000000000000850000000300000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='ext4_allocate_inode\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='ext4_allocate_inode\x00', r0}, 0x10) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) 39.637849183s ago: executing program 0: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) 39.622872635s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x19}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 39.130083582s ago: executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059000000"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x5, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r2, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xfffffffffffffff0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4c) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'vlan0\x00'}) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYRES8=0x0, @ANYRESHEX=r5, @ANYBLOB='9', @ANYBLOB="8a9f58a71bf5c2089233f391eb2e71c9ceb9d808fbd0901aa3035d07cdcce71a8e1096cf8e6850607e2f4ba538af4525f36b08f507bb2ebe379c9439f93dea7c49461e7a89315c2f3f6a6c0f369ceb668b4fbc51d7f0944b2e8388edc0dd46f7cb10a85d4d1977cd284bc91a416edeb04229383d8bcf55ac09510c31ef2148483866dfe4f16e136192625bdf6b24b6a62ebca7dfc1b422d4e6f9734e798ba6a413b869ded6ab4afc24f01453bf19014fe525937e96ee7ca4e960233b0e8cb9559c99d5dbb70ab85dc685f4715cc85fd29db86958d69cd8772dc9b89bef7892ca75a1eb4682b1bef5b3e644f1"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, 0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffff7f850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='ext4_es_remove_extent\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x19, 0x4, 0x8, 0x7f}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000077b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_es_remove_extent\x00', r10}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x13c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 0s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r0}, &(0x7f0000000400), &(0x7f0000000600)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) close(r4) kernel console output (not intermixed with test programs): 41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.772447][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.780238][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.816149][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.824967][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.833211][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.843043][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 96.851864][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 96.874140][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.910484][ T482] device veth0_vlan entered promiscuous mode [ 96.918471][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 96.926721][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.949995][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 96.957738][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.965584][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 96.974364][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 96.983053][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 96.992005][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 97.020924][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 97.030014][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 97.044816][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 97.054113][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.078277][ T479] device veth0_vlan entered promiscuous mode [ 97.086366][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.094079][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.101838][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 97.110688][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 97.119633][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 97.128128][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.142379][ T481] device veth0_vlan entered promiscuous mode [ 97.148876][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.156715][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.164820][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 97.173764][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.182104][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 97.190319][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.199276][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.207082][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.214966][ T478] device veth0_vlan entered promiscuous mode [ 97.244329][ T482] device veth1_macvtap entered promiscuous mode [ 97.256842][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 97.264867][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 97.273184][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.291355][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 97.299670][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.308606][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 97.317337][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.326462][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.334223][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.346050][ T480] device veth0_vlan entered promiscuous mode [ 97.362251][ T481] device veth1_macvtap entered promiscuous mode [ 97.374699][ T479] device veth1_macvtap entered promiscuous mode [ 97.405553][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 97.413930][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 97.421978][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 97.431227][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.439733][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 97.448145][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 97.456761][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 97.465255][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 97.473917][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 97.482327][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 97.491730][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 97.500328][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 97.510966][ T478] device veth1_macvtap entered promiscuous mode [ 97.535495][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 97.544200][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 97.552629][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 97.568819][ T480] device veth1_macvtap entered promiscuous mode [ 97.592999][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 97.602322][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.611441][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 97.620902][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 97.629762][ T199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 97.659756][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 97.669580][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 97.687488][ T28] kauditd_printk_skb: 29 callbacks suppressed [ 97.687520][ T28] audit: type=1400 audit(1718463055.987:105): avc: denied { map_create } for pid=503 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 97.716216][ T28] audit: type=1400 audit(1718463055.987:106): avc: denied { map_read map_write } for pid=503 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 97.736436][ T28] audit: type=1400 audit(1718463055.987:107): avc: denied { prog_load } for pid=503 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 97.766956][ T28] audit: type=1400 audit(1718463056.027:108): avc: denied { prog_run } for pid=503 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 97.769098][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 97.822286][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 97.837551][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 97.847260][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 97.857407][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 97.866483][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 97.910190][ T507] device pim6reg1 entered promiscuous mode [ 97.973414][ C0] hrtimer: interrupt took 65468 ns [ 97.989104][ T516] syz-executor.1[516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.989267][ T516] syz-executor.1[516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.364124][ T28] audit: type=1400 audit(1718463056.667:109): avc: denied { setopt } for pid=531 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 98.448913][ T28] audit: type=1400 audit(1718463056.747:110): avc: denied { write } for pid=533 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 99.404089][ T28] audit: type=1400 audit(1718463057.697:111): avc: denied { cpu } for pid=588 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 99.568274][ T596] gretap0: refused to change device tx_queue_len [ 99.600772][ T607] syz-executor.0[607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.600927][ T607] syz-executor.0[607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.217943][ T621] device syzkaller0 entered promiscuous mode [ 100.478692][ T641] syz-executor.2[641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.478846][ T641] syz-executor.2[641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.679748][ T680] syz-executor.2[680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.691763][ T680] syz-executor.2[680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.704169][ T28] audit: type=1400 audit(1718463060.007:112): avc: denied { relabelfrom } for pid=674 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 101.770858][ T28] audit: type=1400 audit(1718463060.047:113): avc: denied { relabelto } for pid=674 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 101.906970][ T28] audit: type=1400 audit(1718463060.207:114): avc: denied { create } for pid=674 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 101.919930][ T675] device syzkaller0 entered promiscuous mode [ 102.187605][ T695] device syzkaller0 entered promiscuous mode [ 102.426337][ T704] device pim6reg1 entered promiscuous mode [ 102.920835][ T735] device pim6reg1 entered promiscuous mode [ 103.070897][ T738] device syzkaller0 entered promiscuous mode [ 103.158265][ T747] device syzkaller0 entered promiscuous mode [ 103.975337][ T785] gretap0: refused to change device tx_queue_len [ 104.640683][ T802] device syzkaller0 entered promiscuous mode [ 105.395612][ T834] device syzkaller0 entered promiscuous mode [ 105.428167][ T846] device pim6reg1 entered promiscuous mode [ 105.835908][ T869] device syzkaller0 entered promiscuous mode [ 106.315858][ T888] device pim6reg1 entered promiscuous mode [ 106.660698][ T895] device syzkaller0 entered promiscuous mode [ 107.635648][ T953] device syzkaller0 entered promiscuous mode [ 107.717784][ T959] device syzkaller0 entered promiscuous mode [ 107.969669][ T963] device syzkaller0 entered promiscuous mode [ 108.323561][ T983] device pim6reg1 entered promiscuous mode [ 108.540450][ T998] syz-executor.4[998] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.540600][ T998] syz-executor.4[998] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.650106][ T995] device syzkaller0 entered promiscuous mode [ 109.089759][ T1017] device syzkaller0 entered promiscuous mode [ 109.193942][ T1026] device pim6reg1 entered promiscuous mode [ 109.807570][ T1037] syz-executor.1[1037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.807731][ T1037] syz-executor.1[1037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.954232][ T1043] device pim6reg1 entered promiscuous mode [ 110.671807][ T1065] device pim6reg1 entered promiscuous mode [ 113.134464][ T1079] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 113.155720][ T1075] device syzkaller0 entered promiscuous mode [ 113.782414][ T28] audit: type=1400 audit(1718463072.077:115): avc: denied { create } for pid=1098 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 114.033399][ T28] audit: type=1400 audit(1718463072.327:116): avc: denied { read } for pid=1098 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 114.133383][ T28] audit: type=1400 audit(1718463072.377:117): avc: denied { write } for pid=1098 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 114.351483][ T1105] device syzkaller0 entered promiscuous mode [ 114.430957][ T480] syz-executor.1 (480) used greatest stack depth: 21200 bytes left [ 114.862828][ T1124] device syzkaller0 entered promiscuous mode [ 116.100105][ T406] device bridge_slave_1 left promiscuous mode [ 116.121337][ T406] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.130475][ T406] device bridge_slave_0 left promiscuous mode [ 116.137290][ T406] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.153205][ T406] device veth1_macvtap left promiscuous mode [ 116.159468][ T406] device veth0_vlan left promiscuous mode [ 117.118671][ T1128] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.128223][ T1128] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.153082][ T1128] device bridge_slave_0 entered promiscuous mode [ 117.188134][ T1128] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.206562][ T1128] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.216648][ T1128] device bridge_slave_1 entered promiscuous mode [ 117.798023][ T28] audit: type=1400 audit(1718463076.097:118): avc: denied { ioctl } for pid=1208 comm="syz-executor.3" path="/dev/ppp" dev="devtmpfs" ino=138 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 117.914248][ T1213] device syzkaller0 entered promiscuous mode [ 118.085694][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 118.094197][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 118.118760][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 118.137832][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 118.153866][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.160805][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.178723][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 118.189313][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 118.213847][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.220780][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 119.084728][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 119.166109][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 119.196581][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 119.213998][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 119.239866][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 119.449883][ T1243] device syzkaller0 entered promiscuous mode [ 119.653041][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 119.662037][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 119.815754][ T1128] device veth0_vlan entered promiscuous mode [ 119.823647][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 119.831835][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 119.841181][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 119.849053][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 120.279583][ T1128] device veth1_macvtap entered promiscuous mode [ 120.457691][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 120.654349][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 120.664633][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 120.893945][ T1272] device syzkaller0 entered promiscuous mode [ 120.926361][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 120.935566][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 120.944519][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 120.990909][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 121.489837][ T1294] device syzkaller0 entered promiscuous mode [ 122.365337][ T1311] device syzkaller0 entered promiscuous mode [ 125.568247][ T1399] syz-executor.4[1399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.568414][ T1399] syz-executor.4[1399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.360669][ T1423] syz-executor.1[1423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.403356][ T1423] syz-executor.1[1423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.659270][ T1445] device pim6reg1 entered promiscuous mode [ 128.715083][ T1451] syz-executor.0[1451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.715250][ T1451] syz-executor.0[1451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.884039][ T1455] device sit0 entered promiscuous mode [ 130.499062][ T1513] syz-executor.1[1513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.499215][ T1513] syz-executor.1[1513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.078609][ T1517] syz-executor.4[1517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.203999][ T1517] syz-executor.4[1517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.809759][ T1566] syz-executor.1[1566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.842906][ T1566] syz-executor.1[1566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.233052][ T1581] device sit0 left promiscuous mode [ 134.148760][ T1609] device syzkaller0 entered promiscuous mode [ 137.717479][ T1693] syz-executor.4[1693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.717637][ T1693] syz-executor.4[1693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.598032][ T28] audit: type=1400 audit(1718463096.897:119): avc: denied { create } for pid=1702 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 139.897183][ T1736] device syzkaller0 entered promiscuous mode [ 140.385272][ T28] audit: type=1400 audit(1718463098.687:120): avc: denied { create } for pid=1752 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 140.481429][ T1761] syz-executor.4[1761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.481578][ T1761] syz-executor.4[1761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.696654][ T1801] syz-executor.2[1801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.733778][ T1801] syz-executor.2[1801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.238359][ T1812] device syzkaller0 entered promiscuous mode [ 142.820241][ T1841] syz-executor.1[1841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.820395][ T1841] syz-executor.1[1841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.365787][ T1860] syz-executor.4[1860] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.403696][ T1860] syz-executor.4[1860] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.256053][ T1862] device syzkaller0 entered promiscuous mode [ 144.400873][ T1885] syz-executor.2[1885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.401033][ T1885] syz-executor.2[1885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.741740][ T1899] device pim6reg1 entered promiscuous mode [ 147.653708][ T1939] device sit0 entered promiscuous mode [ 147.850379][ T1937] syz-executor.3 (1937) used greatest stack depth: 20632 bytes left [ 147.981793][ T1959] syz-executor.2[1959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.981949][ T1959] syz-executor.2[1959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.588545][ T2003] Driver unsupported XDP return value 0 on prog (id 811) dev N/A, expect packet loss! [ 152.385285][ T2077] syz-executor.0[2077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.385437][ T2077] syz-executor.0[2077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.986057][ T2107] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 153.111018][ T2107] device syzkaller0 entered promiscuous mode [ 153.818497][ T28] audit: type=1400 audit(1718463112.107:121): avc: denied { create } for pid=2130 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 153.965023][ T2136] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.972446][ T28] audit: type=1400 audit(1718463112.157:122): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 153.973604][ T2136] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.117719][ T2136] device bridge_slave_1 left promiscuous mode [ 154.139233][ T2136] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.161830][ T2136] device bridge_slave_0 left promiscuous mode [ 154.177033][ T2136] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.544534][ T2186] syz-executor.3[2186] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.544691][ T2186] syz-executor.3[2186] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.808007][ T2234] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 157.864422][ T2234] device syzkaller0 entered promiscuous mode [ 158.791107][ T2268] syz-executor.1[2268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.791769][ T2268] syz-executor.1[2268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.332708][ T2279] syz-executor.4[2279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.417398][ T2279] syz-executor.4[2279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.688234][ T28] audit: type=1400 audit(1718463117.987:123): avc: denied { create } for pid=2287 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 162.233373][ T2375] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.241314][ T2375] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.137156][ T2382] device bridge_slave_1 left promiscuous mode [ 163.146777][ T2382] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.165215][ T2382] device bridge_slave_0 left promiscuous mode [ 163.171446][ T2382] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.472536][ T2387] device syzkaller0 entered promiscuous mode [ 164.366370][ T2438] syz-executor.1[2438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.366526][ T2438] syz-executor.1[2438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.777251][ T2446] device syzkaller0 entered promiscuous mode [ 165.060874][ T2460] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.068915][ T2460] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.271346][ T2468] device bridge_slave_1 left promiscuous mode [ 165.352981][ T2468] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.384003][ T2473] syz-executor.3[2473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.384162][ T2473] syz-executor.3[2473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.495114][ T2468] device bridge_slave_0 left promiscuous mode [ 165.589872][ T2468] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.918284][ T2499] device pim6reg1 entered promiscuous mode [ 166.519671][ T2519] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.527632][ T2519] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.655673][ T2519] device bridge_slave_1 left promiscuous mode [ 166.662186][ T2519] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.999593][ T2519] device bridge_slave_0 left promiscuous mode [ 168.163233][ C1] sched: RT throttling activated [ 168.203597][ T2519] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.493043][ T2551] syz-executor.4[2551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.495146][ T2551] syz-executor.4[2551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.017006][ T2658] device syzkaller0 entered promiscuous mode [ 173.290234][ T2675] syz-executor.4[2675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.290389][ T2675] syz-executor.4[2675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.336721][ T2675] syz-executor.4[2675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.348847][ T2675] syz-executor.4[2675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.226703][ T2804] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 178.270503][ T2804] device syzkaller0 entered promiscuous mode [ 180.978903][ T28] audit: type=1400 audit(1718463139.267:124): avc: denied { create } for pid=2811 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 181.104786][ T2820] device syzkaller0 entered promiscuous mode [ 181.283115][ T2839] Â: renamed from pim6reg1 [ 186.352417][ T28] audit: type=1400 audit(1718463144.647:125): avc: denied { create } for pid=2974 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 186.625389][ T2985] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 186.710468][ T2985] device syzkaller0 entered promiscuous mode [ 187.267141][ T3001] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.299119][ T3001] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.509294][ T3006] ÿÿÿÿÿÿ: renamed from bridge0 [ 188.791557][ T3033] device syzkaller0 entered promiscuous mode [ 190.657282][ T3097] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 191.060517][ T3109] device syzkaller0 entered promiscuous mode [ 191.185629][ T3116] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 191.211749][ T3116] device syzkaller0 entered promiscuous mode [ 191.387333][ T3130] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 193.125712][ T3157] device syzkaller0 entered promiscuous mode [ 193.171127][ T3163] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 193.664279][ T3182] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 193.706301][ T3182] device syzkaller0 entered promiscuous mode [ 194.049663][ T3206] device syzkaller0 entered promiscuous mode [ 195.197410][ T3246] device syzkaller0 entered promiscuous mode [ 196.872102][ T3302] device syzkaller0 entered promiscuous mode [ 201.273870][ T3380] device syzkaller0 entered promiscuous mode [ 203.509553][ T3443] device syzkaller0 entered promiscuous mode [ 204.334799][ T3463] device syzkaller0 entered promiscuous mode [ 205.468134][ T3493] device pim6reg1 entered promiscuous mode [ 206.574676][ T3517] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 206.734727][ T3517] device syzkaller0 entered promiscuous mode [ 207.422901][ T3534] device pim6reg1 entered promiscuous mode [ 208.667472][ T3573] device pim6reg1 entered promiscuous mode [ 208.913172][ T3584] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 209.005492][ T3584] device syzkaller0 entered promiscuous mode [ 210.592036][ T3611] device syzkaller0 entered promiscuous mode [ 210.682554][ T3626] device pim6reg1 entered promiscuous mode [ 212.252019][ T3672] device pim6reg1 entered promiscuous mode [ 212.678451][ T3674] device syzkaller0 entered promiscuous mode [ 213.283147][ T3692] device syzkaller0 entered promiscuous mode [ 217.890325][ T3835] syz-executor.2[3835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.890473][ T3835] syz-executor.2[3835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.437455][ T3888] device syzkaller0 entered promiscuous mode [ 222.940477][ T3937] syz-executor.4[3937] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.940644][ T3937] syz-executor.4[3937] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.371025][ T28] audit: type=1400 audit(1718463181.667:126): avc: denied { create } for pid=3960 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 223.488615][ T3942] device syzkaller0 entered promiscuous mode [ 227.331152][ T3976] syz-executor.3[3976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.331306][ T3976] syz-executor.3[3976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.180734][ T3972] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.199735][ T3972] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.214082][ T3972] device bridge_slave_0 entered promiscuous mode [ 228.222041][ T3972] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.233829][ T3972] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.242067][ T3972] device bridge_slave_1 entered promiscuous mode [ 228.442335][ T28] audit: type=1400 audit(1718463186.737:127): avc: denied { create } for pid=4019 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 228.831440][ T37] device veth1_macvtap left promiscuous mode [ 228.855118][ T37] device veth0_vlan left promiscuous mode [ 230.340580][ T4044] device pim6reg1 entered promiscuous mode [ 230.545655][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.555743][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.573575][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.582394][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.618384][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.625348][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.638140][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.654719][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.664009][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.670908][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.691293][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.699883][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 230.828926][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.005144][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.014245][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.397799][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 231.454072][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.537417][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 231.555964][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.571984][ T3972] device veth0_vlan entered promiscuous mode [ 231.596002][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.625003][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.685056][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 231.706734][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 231.759745][ T3972] device veth1_macvtap entered promiscuous mode [ 231.812839][ T4087] device pim6reg1 entered promiscuous mode [ 231.844486][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 231.862622][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 231.974375][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.101247][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 232.132712][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 232.201096][ T28] audit: type=1400 audit(1718463190.497:128): avc: denied { mounton } for pid=3972 comm="syz-executor.4" path="/dev/binderfs" dev="devtmpfs" ino=370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 234.356280][ T4166] device sit0 left promiscuous mode [ 234.370274][ T4166] device sit0 entered promiscuous mode [ 236.356891][ T4239] device veth1_macvtap left promiscuous mode [ 236.374848][ T4239] device veth1_macvtap entered promiscuous mode [ 236.391381][ T4239] device macsec0 entered promiscuous mode [ 238.546986][ T4287] device veth1_macvtap left promiscuous mode [ 238.552942][ T4287] device macsec0 left promiscuous mode [ 238.722388][ T4287] device veth1_macvtap entered promiscuous mode [ 238.731895][ T4287] device macsec0 entered promiscuous mode [ 239.070311][ T4281] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.085276][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.094491][ T4281] device bridge_slave_0 entered promiscuous mode [ 239.153483][ T4281] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.250148][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.314698][ T4281] device bridge_slave_1 entered promiscuous mode [ 240.111978][ T406] device bridge_slave_1 left promiscuous mode [ 240.131198][ T406] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.189711][ T406] device bridge_slave_0 left promiscuous mode [ 240.214145][ T406] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.271995][ T406] device veth1_macvtap left promiscuous mode [ 240.284478][ T28] audit: type=1400 audit(1718463198.587:129): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 240.313426][ T406] device veth0_vlan left promiscuous mode [ 240.333335][ T28] audit: type=1400 audit(1718463198.587:130): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 240.722528][ T4366] syz-executor.3[4366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.722739][ T4366] syz-executor.3[4366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.801455][ T4351] device sit0 left promiscuous mode [ 240.908672][ T4356] device sit0 entered promiscuous mode [ 241.923891][ T4051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.932193][ T4051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.274941][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 242.284503][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 242.292842][ T379] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.299817][ T379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.307706][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 242.316860][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.327043][ T379] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.334019][ T379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.426042][ T4051] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 242.539221][ T4051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 242.754439][ T4051] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.766128][ T4401] device veth1_macvtap left promiscuous mode [ 242.780604][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 242.801962][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.860189][ T4402] device sit0 entered promiscuous mode [ 243.206761][ T4411] syz-executor.1[4411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.206917][ T4411] syz-executor.1[4411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.327315][ T4413] syz-executor.0[4413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.372413][ T4413] syz-executor.0[4413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.724896][ T4099] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 243.758041][ T4099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 243.787327][ T4281] device veth0_vlan entered promiscuous mode [ 243.801807][ T4099] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 243.819273][ T4099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.863633][ T4099] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.871980][ T4099] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.899659][ T4281] device veth1_macvtap entered promiscuous mode [ 244.070447][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 244.089318][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 244.106149][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 244.128328][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 244.184092][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 244.206681][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 244.230142][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 244.322214][ T4444] device veth1_macvtap left promiscuous mode [ 244.329867][ T4444] device macsec0 left promiscuous mode [ 248.666241][ T4550] syz-executor.4[4550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.666385][ T4550] syz-executor.4[4550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.324842][ T4580] syz-executor.4[4580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.346771][ T4580] syz-executor.4[4580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.345767][ T4653] device veth1_macvtap entered promiscuous mode [ 254.373612][ T4653] device macsec0 entered promiscuous mode [ 254.433628][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.970366][ T4662] syz-executor.1[4662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.970521][ T4662] syz-executor.1[4662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.724359][ T4673] device sit0 left promiscuous mode [ 255.820530][ T4674] device sit0 entered promiscuous mode [ 257.944472][ T4747] syz-executor.1[4747] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.944620][ T4747] syz-executor.1[4747] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.694593][ T4780] syz-executor.2[4780] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.713525][ T4780] syz-executor.2[4780] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.613342][ T28] audit: type=1400 audit(1718463222.907:131): avc: denied { create } for pid=4846 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 265.591016][ T4872] device wg2 entered promiscuous mode [ 266.112866][ T4889] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 266.331969][ T4888] device syzkaller0 entered promiscuous mode [ 266.953267][ T4897] device sit0 entered promiscuous mode [ 267.337460][ T4914] device wg2 entered promiscuous mode [ 267.679092][ T4929] syz-executor.3[4929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.679309][ T4929] syz-executor.3[4929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.796468][ T4926] device veth1_macvtap left promiscuous mode [ 268.850351][ T4964] device pim6reg1 entered promiscuous mode [ 269.681776][ T4974] device syzkaller0 entered promiscuous mode [ 270.564975][ T5003] device pim6reg1 entered promiscuous mode [ 271.455082][ T5029] device syzkaller0 entered promiscuous mode [ 271.879365][ T5058] syz-executor.1[5058] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.879529][ T5058] syz-executor.1[5058] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.948037][ T5062] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 272.268822][ T5069] device wg2 entered promiscuous mode [ 272.358810][ T5067] device syzkaller0 entered promiscuous mode [ 272.669589][ T5095] syz-executor.3[5095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.669809][ T5095] syz-executor.3[5095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.175640][ T5092] device syzkaller0 entered promiscuous mode [ 273.487817][ T5119] device syzkaller0 entered promiscuous mode [ 273.819075][ T5134] device sit0 entered promiscuous mode [ 280.619076][ T5187] device veth1_macvtap left promiscuous mode [ 280.795177][ T5193] device veth1_macvtap entered promiscuous mode [ 280.810875][ T5193] device macsec0 entered promiscuous mode [ 283.744165][ T5328] device pim6reg1 entered promiscuous mode [ 284.200191][ T5358] Â: renamed from pim6reg1 [ 284.831343][ T5372] device veth1_macvtap entered promiscuous mode [ 284.893627][ T5372] device macsec0 entered promiscuous mode [ 284.916860][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 290.825228][ T5488] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.832159][ T5488] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.851289][ T5488] device bridge_slave_0 entered promiscuous mode [ 290.859164][ T5488] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.876666][ T5488] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.891141][ T5488] device bridge_slave_1 entered promiscuous mode [ 292.015237][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.022968][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.044481][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 292.053025][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.061541][ T381] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.068474][ T381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.075971][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 292.085284][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 292.093748][ T381] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.100646][ T381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.108516][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 292.120923][ T1986] device bridge_slave_1 left promiscuous mode [ 292.127331][ T1986] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.144538][ T1986] device bridge_slave_0 left promiscuous mode [ 292.150853][ T1986] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.164118][ T1986] device veth1_macvtap left promiscuous mode [ 292.170303][ T1986] device veth0_vlan left promiscuous mode [ 292.907125][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 292.922374][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 292.976333][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 292.988254][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.087317][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 293.101655][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 293.401716][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 293.433963][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 293.446405][ T5488] device veth0_vlan entered promiscuous mode [ 293.464966][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 293.472692][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 293.505000][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 293.514304][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 293.536059][ T5488] device veth1_macvtap entered promiscuous mode [ 293.600451][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 293.624055][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 293.822645][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 293.925663][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 294.006067][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 294.621005][ T28] audit: type=1400 audit(1718463252.897:132): avc: denied { create } for pid=5603 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 295.118936][ T5616] Â: renamed from pim6reg1 [ 296.358677][ T5677] Â: renamed from pim6reg1 [ 297.155073][ T5720] Â: renamed from pim6reg1 [ 297.236932][ T5718] device sit0 entered promiscuous mode [ 298.411532][ T5758] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 301.701440][ T5882] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 303.764826][ T5964] device syzkaller0 entered promiscuous mode [ 304.525621][ T6009] tun0: tun_chr_ioctl cmd 1074025677 [ 304.578126][ T6009] tun0: linktype set to 805 [ 305.314465][ T6046] tun0: tun_chr_ioctl cmd 1074025677 [ 305.319770][ T6046] tun0: linktype set to 805 [ 306.654274][ T6072] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 308.233204][ T6124] device veth0_vlan left promiscuous mode [ 308.315604][ T6124] device veth0_vlan entered promiscuous mode [ 308.459605][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 308.491401][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 308.526308][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 308.751517][ T6136] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 308.828934][ T6115] syz-executor.1 (6115) used greatest stack depth: 20376 bytes left [ 309.114619][ T6152] device pim6reg1 entered promiscuous mode [ 309.132342][ T6159] syz-executor.3[6159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.132496][ T6159] syz-executor.3[6159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.251596][ T6167] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 309.383432][ T6160] device syzkaller0 entered promiscuous mode [ 314.419163][ T6321] device veth0_vlan left promiscuous mode [ 314.425943][ T6321] device veth0_vlan entered promiscuous mode [ 314.434997][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.457391][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.474111][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 315.680775][ T6343] device pim6reg1 entered promiscuous mode [ 316.320678][ T6370] device syzkaller0 entered promiscuous mode [ 318.205600][ T6441] device pim6reg1 entered promiscuous mode [ 319.701304][ T6494] device veth0_vlan left promiscuous mode [ 319.730822][ T6494] device veth0_vlan entered promiscuous mode [ 319.785879][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 319.805183][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 319.839177][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 319.983189][ T6498] device syzkaller0 entered promiscuous mode [ 321.184723][ T6545] device veth0_vlan left promiscuous mode [ 321.233763][ T6545] device veth0_vlan entered promiscuous mode [ 321.323057][ T6571] syz-executor.1[6571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.323207][ T6571] syz-executor.1[6571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.458552][ T6572] device syzkaller0 entered promiscuous mode [ 321.746842][ T6598] syz-executor.0[6598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.746994][ T6598] syz-executor.0[6598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.902546][ T6632] syz-executor.0[6632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.124065][ T6632] syz-executor.0[6632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.156004][ T6639] tap0: tun_chr_ioctl cmd 1074025677 [ 324.250136][ T6639] tap0: linktype set to 270 [ 325.483084][ T6670] syz-executor.2[6670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.494567][ T6670] syz-executor.2[6670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.956510][ T6682] tun0: tun_chr_ioctl cmd 2147767507 [ 326.324637][ T6689] device veth0_vlan left promiscuous mode [ 326.360155][ T6689] device veth0_vlan entered promiscuous mode [ 326.452179][ T6704] syz-executor.2[6704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.452332][ T6704] syz-executor.2[6704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.583116][ T6752] device veth0_vlan left promiscuous mode [ 328.668503][ T6752] device veth0_vlan entered promiscuous mode [ 330.686586][ T6801] device veth0_vlan left promiscuous mode [ 330.705027][ T6801] device veth0_vlan entered promiscuous mode [ 330.723505][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 330.732923][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 330.764659][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 331.121624][ T6818] device syzkaller0 entered promiscuous mode [ 331.556688][ T6807] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.572166][ T6807] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.581543][ T6807] device bridge_slave_0 entered promiscuous mode [ 331.616350][ T6807] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.624299][ T6807] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.632397][ T6807] device bridge_slave_1 entered promiscuous mode [ 332.162483][ T6843] device veth0_vlan left promiscuous mode [ 332.168661][ T6843] device veth0_vlan entered promiscuous mode [ 332.187577][ T6808] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.194538][ T6808] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.202592][ T6808] device bridge_slave_0 entered promiscuous mode [ 332.210815][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 332.222171][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 332.242723][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 332.290986][ T6808] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.304663][ T6808] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.313217][ T6808] device bridge_slave_1 entered promiscuous mode [ 332.737088][ T37] device bridge_slave_1 left promiscuous mode [ 332.751547][ T37] ÿÿÿÿÿÿ: port 2(bridge_slave_1) entered disabled state [ 332.771839][ T37] device bridge_slave_0 left promiscuous mode [ 332.780274][ T37] ÿÿÿÿÿÿ: port 1(bridge_slave_0) entered disabled state [ 332.806675][ T37] device veth1_macvtap left promiscuous mode [ 332.812890][ T37] device veth0_vlan left promiscuous mode [ 334.622030][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 334.630345][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 334.824968][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 334.837305][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 334.854747][ T379] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.862016][ T379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.870803][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 334.879649][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 334.888474][ T379] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.895387][ T379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.913670][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 334.921950][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 334.930951][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 334.954448][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 334.962963][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 335.012818][ T5833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 335.024451][ T5833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 335.064366][ T28] audit: type=1400 audit(1718463293.357:133): avc: denied { create } for pid=6913 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 335.113634][ T28] audit: type=1400 audit(1718463293.357:134): avc: denied { create } for pid=6913 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 335.138372][ T28] audit: type=1400 audit(1718463293.377:135): avc: denied { write } for pid=6913 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 335.178383][ T6807] device veth0_vlan entered promiscuous mode [ 335.193676][ T4404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 335.212191][ T4404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 335.341697][ T4404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 335.350318][ T4404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 335.364683][ T4404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 335.381090][ T4404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 335.410595][ T4404] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.417580][ T4404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.429673][ T6921] device pim6reg1 entered promiscuous mode [ 335.494291][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 335.502077][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 335.529238][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 335.735121][ T6808] device veth0_vlan entered promiscuous mode [ 335.804911][ T6939] tun0: tun_chr_ioctl cmd 2147767507 [ 335.859126][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 335.894612][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 335.998821][ T514] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.005820][ T514] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.083598][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 336.354009][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 336.362422][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 336.393979][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 336.402309][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 336.423964][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 336.432624][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 336.454006][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 336.488532][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 336.504265][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 336.511967][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 336.552239][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 336.572364][ T6807] device veth1_macvtap entered promiscuous mode [ 336.624222][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 336.632208][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 336.664010][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 336.694440][ T6808] device veth1_macvtap entered promiscuous mode [ 336.745845][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 336.754065][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 336.770087][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 336.779225][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 336.795511][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 336.857520][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 336.871832][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 336.894359][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 336.902952][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 337.045323][ T37] device bridge_slave_1 left promiscuous mode [ 337.061591][ T37] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.082424][ T37] device bridge_slave_0 left promiscuous mode [ 337.089983][ T37] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.128571][ T37] device veth1_macvtap left promiscuous mode [ 337.135229][ T37] device veth0_vlan left promiscuous mode [ 337.914823][ T7006] device pim6reg1 entered promiscuous mode [ 339.406281][ T7050] device pim6reg1 entered promiscuous mode [ 339.853905][ T7067] device veth0_vlan left promiscuous mode [ 339.884162][ T7067] device veth0_vlan entered promiscuous mode [ 339.892666][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 339.912419][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 340.026137][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 340.239937][ T7061] bridge0: port 3(team_slave_1) entered blocking state [ 340.294752][ T7061] bridge0: port 3(team_slave_1) entered disabled state [ 340.355425][ T7061] device team_slave_1 entered promiscuous mode [ 340.442784][ T7066] device team_slave_1 left promiscuous mode [ 340.471364][ T7066] bridge0: port 3(team_slave_1) entered disabled state [ 341.900903][ T7123] tun0: tun_chr_ioctl cmd 2147767507 [ 343.252418][ T7149] device syzkaller0 entered promiscuous mode [ 345.539131][ T7254] bridge0: port 3(team_slave_1) entered blocking state [ 345.561856][ T7254] bridge0: port 3(team_slave_1) entered disabled state [ 345.570857][ T7254] device team_slave_1 entered promiscuous mode [ 345.590165][ T7254] device team_slave_1 left promiscuous mode [ 345.682073][ T7254] bridge0: port 3(team_slave_1) entered disabled state [ 346.531388][ T7244] device wg2 left promiscuous mode [ 346.643855][ T7289] device wg2 entered promiscuous mode [ 346.701954][ T7297] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 346.931907][ T7310] device pim6reg1 entered promiscuous mode [ 347.265148][ T7332] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 347.657324][ T7365] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 347.912708][ T7382] device wg2 left promiscuous mode [ 349.141375][ T28] audit: type=1400 audit(1718463307.437:136): avc: denied { read } for pid=7438 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 349.792196][ T7465] device syzkaller0 entered promiscuous mode [ 350.221803][ T7499] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 350.352906][ T7501] device syzkaller0 entered promiscuous mode [ 350.417228][ T28] audit: type=1400 audit(1718463308.717:137): avc: denied { create } for pid=7504 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 353.943325][ T28] audit: type=1400 audit(1718463312.217:138): avc: denied { setopt } for pid=7655 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 354.988894][ T7698] device syzkaller0 entered promiscuous mode [ 356.419346][ T7741] device syzkaller0 entered promiscuous mode [ 358.138433][ T7797] Â: renamed from pim6reg1 [ 358.353220][ T7814] device syzkaller0 entered promiscuous mode [ 359.456574][ T7839] Â: renamed from pim6reg1 [ 359.996039][ T7846] €Â: renamed from pim6reg1 [ 360.251608][ T7859] device syzkaller0 entered promiscuous mode [ 361.033189][ T7872] device wg2 left promiscuous mode [ 361.079008][ T7886] device wg2 entered promiscuous mode [ 361.780347][ T7904] €Â: renamed from pim6reg1 [ 362.358519][ T7923] device syzkaller0 entered promiscuous mode [ 366.836888][ T7976] device syzkaller0 entered promiscuous mode [ 369.262241][ T8056] device sit0 left promiscuous mode [ 369.648709][ T8065] device sit0 entered promiscuous mode [ 370.084166][ T28] audit: type=1400 audit(1718463328.387:139): avc: denied { create } for pid=8073 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 372.842083][ T8116] device sit0 left promiscuous mode [ 372.934656][ T8121] device sit0 entered promiscuous mode [ 376.642516][ T8202] device pim6reg1 entered promiscuous mode [ 387.042572][ T8257] €Â: renamed from pim6reg1 [ 387.684598][ T8282] device sit0 entered promiscuous mode [ 389.180350][ T8324] syz-executor.0[8324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.180495][ T8324] syz-executor.0[8324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.866102][ T8372] device pim6reg1 entered promiscuous mode [ 390.458265][ T8409] device syzkaller0 entered promiscuous mode [ 390.508075][ T8419] device pim6reg1 entered promiscuous mode [ 390.575482][ T8426] device pim6reg1 entered promiscuous mode [ 391.572838][ T8458] device pim6reg1 entered promiscuous mode [ 391.901863][ T8468] device syzkaller0 entered promiscuous mode [ 392.805226][ T8499] €Â: renamed from pim6reg1 [ 393.413389][ T8522] device pim6reg1 entered promiscuous mode [ 394.230403][ T8569] device pim6reg1 entered promiscuous mode [ 394.651956][ T8589] device bridge0 entered promiscuous mode [ 396.827706][ T8623] EXT4-fs (sda1): pa ffff8881206bca80: logic 0, phys. 98944, len 128 [ 396.835866][ T8623] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4871: group 3, free 69, pa_free 60 [ 396.972776][ T8650] device bridge0 entered promiscuous mode [ 396.999363][ T8649] device pim6reg1 entered promiscuous mode [ 397.256495][ T65] EXT4-fs error (device sda1): mb_free_blocks:1813: group 3, block 98944:freeing already freed block (bit 640); block bitmap corrupt. [ 397.595646][ T8678] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 398.371305][ T8690] €Â: renamed from pim6reg1 [ 399.666260][ T8737] device pim6reg1 entered promiscuous mode [ 400.546261][ T8752] device sit0 entered promiscuous mode [ 400.582079][ T8759] geneve1: tun_chr_ioctl cmd 1074025692 [ 400.610106][ T8750] €Â: renamed from pim6reg1 [ 400.667842][ T8761] device vxcan1 entered promiscuous mode [ 400.932220][ T8764] device syzkaller0 entered promiscuous mode [ 402.230548][ T8806] device syzkaller0 entered promiscuous mode [ 403.046825][ T8826] device sit0 left promiscuous mode [ 403.237229][ T8833] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 403.612830][ T8850] syz-executor.0[8850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.612998][ T8850] syz-executor.0[8850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.870160][ T8864] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 403.900803][ T8862] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 404.040034][ T28] audit: type=1400 audit(1718463362.337:140): avc: denied { create } for pid=8869 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 404.086937][ T8878] syz-executor.4[8878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.087092][ T8878] syz-executor.4[8878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.313744][ T8886] device pim6reg1 entered promiscuous mode [ 404.535742][ T8896] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 404.643520][ T8900] device pim6reg1 entered promiscuous mode [ 404.800357][ T8912] syz-executor.3[8912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.800517][ T8912] syz-executor.3[8912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.394520][ T8928] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 405.671597][ T8947] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 406.671804][ T8971] device pim6reg1 entered promiscuous mode [ 406.697770][ T8981] syz-executor.4[8981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.697931][ T8981] syz-executor.4[8981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.185492][ T8992] device vxcan1 entered promiscuous mode [ 407.618227][ T9014] syz-executor.0[9014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.618382][ T9014] syz-executor.0[9014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.707074][ T9012] device syzkaller0 entered promiscuous mode [ 408.854141][ T9059] syz-executor.0[9059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 408.854299][ T9059] syz-executor.0[9059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.229833][ T9103] device sit0 left promiscuous mode [ 410.570254][ T9117] device syzkaller0 entered promiscuous mode [ 410.611194][ T9129] syz-executor.4[9129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.611347][ T9129] syz-executor.4[9129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.427040][ T9166] device syzkaller0 entered promiscuous mode [ 412.908677][ T9208] device syzkaller0 entered promiscuous mode [ 423.500154][ T9340] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.507391][ T9340] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.559408][ T9340] device bridge0 left promiscuous mode [ 423.612670][ T9343] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.619666][ T9343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 423.627078][ T9343] bridge0: port 1(bridge_slave_0) entered blocking state [ 423.634106][ T9343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 423.644787][ T9343] device bridge0 entered promiscuous mode [ 423.691670][ T9349] EXT4-fs (sda1): pa ffff88812f8cc150: logic 0, phys. 258304, len 128 [ 423.699906][ T9349] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4871: group 7, free 105, pa_free 60 [ 423.880411][ T65] EXT4-fs error (device sda1): mb_free_blocks:1813: group 7, block 258304:freeing already freed block (bit 28928); block bitmap corrupt. [ 424.016876][ T9306] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.024034][ T9306] bridge0: port 1(bridge_slave_0) entered disabled state [ 424.032050][ T9306] device bridge_slave_0 entered promiscuous mode [ 424.047211][ T9306] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.166665][ T9306] bridge0: port 2(bridge_slave_1) entered disabled state [ 424.175244][ T9306] device bridge_slave_1 entered promiscuous mode [ 424.699801][ T9379] EXT4-fs (sda1): pa ffff88812f8669d8: logic 0, phys. 40192, len 128 [ 424.707894][ T9379] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4871: group 1, free 105, pa_free 60 [ 425.322517][ T28] audit: type=1400 audit(1718463383.617:141): avc: denied { create } for pid=9399 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 425.677888][ T65] EXT4-fs error (device sda1): mb_free_blocks:1813: group 1, block 40192:freeing already freed block (bit 7424); block bitmap corrupt. [ 425.959797][ T9385] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.967204][ T9385] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.980303][ T9385] device bridge0 left promiscuous mode [ 426.006965][ T9386] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.013951][ T9386] bridge0: port 2(bridge_slave_1) entered forwarding state [ 426.021143][ T9386] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.028209][ T9386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 426.085929][ T9386] device bridge0 entered promiscuous mode [ 426.277785][ T9427] EXT4-fs (sda1): pa ffff88812f8cce70: logic 0, phys. 75648, len 128 [ 426.285841][ T9427] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4871: group 2, free 105, pa_free 60 [ 426.352140][ T9422] device wg2 entered promiscuous mode [ 426.452749][ T65] EXT4-fs error (device sda1): mb_free_blocks:1813: group 2, block 75648:freeing already freed block (bit 10112); block bitmap corrupt. [ 427.453079][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 427.461586][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 427.503118][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 427.522467][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 427.533029][ T514] bridge0: port 1(bridge_slave_0) entered blocking state [ 427.540076][ T514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 427.551674][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 427.560911][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 427.583374][ T514] bridge0: port 2(bridge_slave_1) entered blocking state [ 427.590322][ T514] bridge0: port 2(bridge_slave_1) entered forwarding state [ 427.620570][ T4404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 427.707195][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 427.808238][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 428.001905][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 428.017889][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 428.059204][ T9306] device veth0_vlan entered promiscuous mode [ 428.084356][ T9306] device veth1_macvtap entered promiscuous mode [ 428.154568][ T9487] device syzkaller0 entered promiscuous mode [ 428.165936][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 428.174935][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 428.192510][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 428.201889][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 428.211409][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 428.229486][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 428.246214][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 428.265660][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 428.274265][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 428.323394][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 428.332023][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 428.365672][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 428.375646][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 429.020867][ T9509] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 429.458253][ T9521] geneve1: tun_chr_ioctl cmd 1074025681 [ 429.590552][ T9523] device syzkaller0 entered promiscuous mode [ 429.739024][ T9534] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 430.153563][ T9564] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 430.155287][ T9566] device pim6reg1 entered promiscuous mode [ 430.473486][ T9583] syz-executor.0[9583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.473678][ T9583] syz-executor.0[9583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.951357][ T9597] device pim6reg1 entered promiscuous mode [ 431.632250][ T9617] syz-executor.4[9617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.632403][ T9617] syz-executor.4[9617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.265422][ T9728] device pim6reg1 entered promiscuous mode [ 435.934277][ T9785] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 436.033872][ T9791] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 436.914729][ T9840] device pim6reg1 entered promiscuous mode [ 438.333751][ T9888] device sit0 entered promiscuous mode [ 442.949963][T10037] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 445.244142][T10159] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 447.182462][T10176] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 451.755104][T10307] device pim6reg1 entered promiscuous mode [ 452.341505][T10344] device pim6reg1 entered promiscuous mode [ 455.524723][T10443] device syzkaller0 entered promiscuous mode [ 458.787182][T10555] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 463.278678][ T406] device veth0_vlan left promiscuous mode [ 463.919036][T10678] bridge0: port 1(bridge_slave_0) entered blocking state [ 463.926834][T10678] bridge0: port 1(bridge_slave_0) entered disabled state [ 463.935694][T10678] device bridge_slave_0 entered promiscuous mode [ 463.944259][T10678] bridge0: port 2(bridge_slave_1) entered blocking state [ 463.951218][T10678] bridge0: port 2(bridge_slave_1) entered disabled state [ 463.959958][T10678] device bridge_slave_1 entered promiscuous mode [ 464.333207][T10759] syz-executor.1[10759] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.333434][T10759] syz-executor.1[10759] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.170474][T10792] syz-executor.0[10792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.183908][T10792] syz-executor.0[10792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.457118][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 465.524013][ T514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 465.588514][ T5833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 465.603032][ T5833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 465.627334][ T5833] bridge0: port 1(bridge_slave_0) entered blocking state [ 465.634335][ T5833] bridge0: port 1(bridge_slave_0) entered forwarding state [ 465.642482][ T5833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 465.654339][ T5833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 465.662864][ T5833] bridge0: port 2(bridge_slave_1) entered blocking state [ 465.669833][ T5833] bridge0: port 2(bridge_slave_1) entered forwarding state [ 466.046031][ T4404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 466.124331][ T4404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 466.133018][ T4404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 466.141847][ T4404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 466.150529][ T4404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 466.202109][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 466.214414][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 466.330458][T10816] device syzkaller0 entered promiscuous mode [ 466.398479][T10678] device veth0_vlan entered promiscuous mode [ 466.462214][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 466.473217][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 466.490797][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 466.521163][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 467.126920][T10678] device veth1_macvtap entered promiscuous mode [ 467.134376][ T4404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 467.142866][ T4404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 467.152330][ T4404] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 467.193391][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 467.201972][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 467.270161][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 467.298590][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 468.630864][T10896] device syzkaller0 entered promiscuous mode [ 470.871131][T10948] device syzkaller0 entered promiscuous mode [ 471.455812][T10987] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 471.936764][T10997] device syzkaller0 entered promiscuous mode [ 472.057302][T11001] device syzkaller0 entered promiscuous mode [ 472.830942][T11047] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 473.924003][T11110] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 474.041413][T11111] device pim6reg1 entered promiscuous mode [ 474.393814][T11141] device wg2 entered promiscuous mode [ 475.153339][T11155] device pim6reg1 entered promiscuous mode [ 475.518468][T11172] device syzkaller0 entered promiscuous mode [ 475.692362][T11187] sock: sock_timestamping_bind_phc: sock not bind to device [ 475.793384][T11198] device wg2 left promiscuous mode [ 475.863738][T11201] device wg2 entered promiscuous mode [ 477.008711][T11241] syz-executor.1[11241] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.008904][T11241] syz-executor.1[11241] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.133703][T11247] device syzkaller0 entered promiscuous mode [ 478.166206][T11282] syz-executor.2[11282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.166366][T11282] syz-executor.2[11282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.522996][T11298] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 478.843508][T11323] device wg2 entered promiscuous mode [ 479.443429][T11339] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 479.616934][T11312] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 479.633607][T11312] device syzkaller0 entered promiscuous mode [ 480.249444][T11374] device veth0_vlan left promiscuous mode [ 480.281830][T11374] device veth0_vlan entered promiscuous mode [ 480.315739][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 480.335877][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 480.355229][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 483.327262][T11450] device syzkaller0 entered promiscuous mode [ 486.058528][T11493] device syzkaller0 entered promiscuous mode [ 486.159017][T11499] device pim6reg1 entered promiscuous mode [ 487.159671][T11522] device syzkaller0 entered promiscuous mode [ 487.629677][T11537] device syzkaller0 entered promiscuous mode [ 487.654362][T11550] syz-executor.1[11550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.654518][T11550] syz-executor.1[11550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.688150][T11550] syz-executor.1[11550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.701491][T11546] device pim6reg1 entered promiscuous mode [ 487.754612][T11550] syz-executor.1[11550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.214081][T11570] device syzkaller0 entered promiscuous mode [ 488.323917][T11581] syz-executor.3[11581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.324072][T11581] syz-executor.3[11581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.366076][T11581] syz-executor.3[11581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.381215][T11581] syz-executor.3[11581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.567277][T11593] device pim6reg1 entered promiscuous mode [ 488.794632][T11596] device syzkaller0 entered promiscuous mode [ 488.933049][T11615] syz-executor.0[11615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.933207][T11615] syz-executor.0[11615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 489.145243][T11617] device syzkaller0 entered promiscuous mode [ 489.462351][T11626] device syzkaller0 entered promiscuous mode [ 489.864078][T11638] device pim6reg1 entered promiscuous mode [ 491.088556][T11665] device syzkaller0 entered promiscuous mode [ 492.996384][T11722] bpf_get_probe_write_proto: 4 callbacks suppressed [ 492.996418][T11722] syz-executor.0[11722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 493.015591][T11722] syz-executor.0[11722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 493.047401][T11728] syz-executor.0[11728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 493.069108][T11728] syz-executor.0[11728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 494.864316][T11769] syz-executor.4[11769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 494.945890][T11769] syz-executor.4[11769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 494.995278][T11764] device syzkaller0 entered promiscuous mode [ 495.222165][T11777] syz-executor.0[11777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 495.222423][T11777] syz-executor.0[11777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.065789][T11807] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 503.409301][T11825] syz-executor.1[11825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.409466][T11825] syz-executor.1[11825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.779842][T11843] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 504.804494][T11868] device wg2 entered promiscuous mode [ 504.862264][T11868] tap0: tun_chr_ioctl cmd 1074025677 [ 504.875578][T11868] tap0: linktype set to 704 [ 506.208887][T11887] device syzkaller0 entered promiscuous mode [ 508.646901][T11912] device wg2 left promiscuous mode [ 508.791390][T11921] syz-executor.1[11921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 508.791551][T11921] syz-executor.1[11921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 508.805449][T11916] device wg2 entered promiscuous mode [ 508.871100][T11912] tap0: tun_chr_ioctl cmd 1074025677 [ 508.884120][T11912] tap0: linktype set to 704 [ 513.792779][T11964] syz-executor.1[11964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 513.792940][T11964] syz-executor.1[11964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 516.280576][T11984] device wg2 left promiscuous mode [ 516.376074][T11991] device wg2 entered promiscuous mode [ 516.401842][T11984] tap0: tun_chr_ioctl cmd 1074025677 [ 516.407201][T11984] tap0: linktype set to 704 [ 517.540691][T12004] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 518.715984][T12023] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 519.935510][T12046] device wg2 left promiscuous mode [ 520.013517][T12047] device wg2 entered promiscuous mode [ 520.069327][T12046] tap0: tun_chr_ioctl cmd 1074025677 [ 520.096062][T12046] tap0: linktype set to 704 [ 520.226321][T12057] device pim6reg1 entered promiscuous mode [ 521.808620][T12072] device pim6reg1 entered promiscuous mode [ 523.485844][T12153] device wg2 left promiscuous mode [ 523.673640][T12153] device wg2 entered promiscuous mode [ 523.770279][T12153] tap0: tun_chr_ioctl cmd 1074025677 [ 523.789853][T12153] tap0: linktype set to 704 [ 524.533177][T12191] device pim6reg1 entered promiscuous mode [ 525.437013][ T28] audit: type=1400 audit(1718463483.737:142): avc: denied { create } for pid=12221 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 525.529289][T12224] ------------[ cut here ]------------ [ 525.534781][T12224] WARNING: CPU: 1 PID: 12224 at kernel/bpf/btf.c:1957 btf_type_id_size+0x8c4/0x950 [ 525.544046][T12224] Modules linked in: [ 525.547735][T12224] CPU: 1 PID: 12224 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00009-g25216be1ac5e #0 [ 525.557737][T12224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 525.567825][T12224] RIP: 0010:btf_type_id_size+0x8c4/0x950 [ 525.573388][T12224] Code: 89 f2 e9 21 fa ff ff 44 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 4a fa ff ff 4c 89 ff e8 86 58 29 00 e9 3d fa ff ff e8 9c 5a e2 ff <0f> 0b 31 db e9 39 fa ff ff 44 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c [ 525.592856][T12224] RSP: 0018:ffffc9000585fbb0 EFLAGS: 00010283 [ 525.598855][T12224] RAX: ffffffff81931964 RBX: 0000000011000000 RCX: 0000000000040000 [ 525.606641][T12224] RDX: ffffc90001289000 RSI: 0000000000000084 RDI: 0000000000000085 [ 525.614456][T12224] RBP: ffffc9000585fc10 R08: ffffffff819314af R09: ffffffff81931430 [ 525.622242][T12224] R10: 0000000000000005 R11: ffff88812421d100 R12: 0000000000000009 [ 525.630085][T12224] R13: dffffc0000000000 R14: ffff888116469400 R15: 0000000000000001 [ 525.637900][T12224] FS: 00007fa7a59816c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 525.646668][T12224] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 525.653064][T12224] CR2: fffffffffffffffa CR3: 000000011e709000 CR4: 00000000003506a0 [ 525.660956][T12224] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 525.668844][T12224] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 525.676746][T12224] Call Trace: [ 525.679821][T12224] [ 525.682600][T12224] ? show_regs+0x58/0x60 [ 525.686752][T12224] ? __warn+0x160/0x3d0 [ 525.690830][T12224] ? btf_type_id_size+0x8c4/0x950 [ 525.695860][T12224] ? report_bug+0x4d5/0x7d0 [ 525.700268][T12224] ? btf_type_id_size+0x8c4/0x950 [ 525.705171][T12224] ? handle_bug+0x41/0x70 [ 525.709292][T12224] ? exc_invalid_op+0x1b/0x50 [ 525.713880][T12224] ? asm_exc_invalid_op+0x1b/0x20 [ 525.718792][T12224] ? btf_type_id_size+0x390/0x950 [ 525.723676][T12224] ? btf_type_id_size+0x40f/0x950 [ 525.729046][T12224] ? btf_type_id_size+0x8c4/0x950 [ 525.734049][T12224] ? btf_type_id_size+0x8c4/0x950 [ 525.738975][T12224] map_check_btf+0x134/0xb90 [ 525.743450][T12224] ? __fget_files+0x2cb/0x330 [ 525.748040][T12224] ? bpf_prog_bind_map+0x970/0x970 [ 525.752988][T12224] ? btf_get_by_fd+0x13e/0x180 [ 525.757628][T12224] map_create+0x78c/0xcf0 [ 525.761864][T12224] __sys_bpf+0x2e6/0x7f0 [ 525.765977][T12224] ? __this_cpu_preempt_check+0x13/0x20 [ 525.771406][T12224] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 525.776940][T12224] ? __kasan_check_write+0x14/0x20 [ 525.781974][T12224] ? fpregs_restore_userregs+0x130/0x290 [ 525.787667][T12224] __x64_sys_bpf+0x7c/0x90 [ 525.792029][T12224] do_syscall_64+0x3d/0xb0 [ 525.796311][T12224] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 525.802006][T12224] RIP: 0033:0x7fa7a4c7cea9 [ 525.806339][T12224] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 525.825861][T12224] RSP: 002b:00007fa7a59810c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 525.834325][T12224] RAX: ffffffffffffffda RBX: 00007fa7a4db3f80 RCX: 00007fa7a4c7cea9 [ 525.842270][T12224] RDX: 0000000000000048 RSI: 0000000020000500 RDI: 0000000000000000 [ 525.850119][T12224] RBP: 00007fa7a4cebff4 R08: 0000000000000000 R09: 0000000000000000 [ 525.857998][T12224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 525.865833][T12224] R13: 000000000000000b R14: 00007fa7a4db3f80 R15: 00007ffd06c60ea8 [ 525.873645][T12224] [ 525.876463][T12224] ---[ end trace 0000000000000000 ]--- [ 526.347124][T12217] device syzkaller0 entered promiscuous mode [ 528.213344][ T28] audit: type=1400 audit(1718463486.507:143): avc: denied { create } for pid=12301 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 529.802845][T12332] device pim6reg1 entered promiscuous mode [ 530.563891][T12364] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 530.754805][T12384] device wg2 left promiscuous mode [ 530.782645][T12390] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 530.825983][T12392] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 530.896753][T12384] device wg2 entered promiscuous mode [ 530.921793][T12384] tap0: tun_chr_ioctl cmd 1074025677 [ 530.933816][T12384] tap0: linktype set to 704 [ 531.393987][T12424] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 531.708420][T12459] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 531.965096][T12471] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 533.566538][T12501] device syzkaller0 entered promiscuous mode [ 534.237596][T12535] device wg2 left promiscuous mode [ 534.252299][T12538] device wg2 entered promiscuous mode [ 534.273733][T12535] tap0: tun_chr_ioctl cmd 1074025677 [ 534.280858][T12535] tap0: linktype set to 704 [ 535.595442][T12589] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 539.514737][T12647] device sit0 entered promiscuous mode [ 544.855715][T12648] syz-executor.3 (12648) used greatest stack depth: 19736 bytes left [ 544.895386][T12683] device vxcan1 entered promiscuous mode [ 546.159143][T12707] device syzkaller0 entered promiscuous mode [ 546.352240][T12724] device syzkaller0 entered promiscuous mode [ 548.317085][T12786] device pim6reg1 entered promiscuous mode [ 556.111228][ T28] audit: type=1400 audit(1718463514.407:144): avc: denied { create } for pid=12851 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 571.714363][T12952] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 572.857690][T12960] device syzkaller0 entered promiscuous mode [ 575.267577][T12995] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 579.280832][T13016] device syzkaller0 entered promiscuous mode [ 581.702690][T13039] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 583.034090][T13064] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 583.284603][T13065] tun0: tun_chr_ioctl cmd 1074025677 [ 583.289870][T13065] tun0: linktype set to 774 [ 583.558967][T13065] tun0: tun_chr_ioctl cmd 1074812118 [ 583.854259][T13070] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 584.822666][T13082] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 587.727718][T13083] bridge0: port 1(bridge_slave_0) entered blocking state [ 587.735373][T13083] bridge0: port 1(bridge_slave_0) entered disabled state [ 587.743688][T13083] device bridge_slave_0 entered promiscuous mode [ 587.752261][T13083] bridge0: port 2(bridge_slave_1) entered blocking state [ 587.759299][T13083] bridge0: port 2(bridge_slave_1) entered disabled state [ 587.767597][T13083] device bridge_slave_1 entered promiscuous mode [ 588.009667][T13104] device vxcan1 entered promiscuous mode [ 588.144033][T13091] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.153414][T13091] bridge0: port 1(bridge_slave_0) entered disabled state [ 588.170608][T13091] device bridge_slave_0 entered promiscuous mode [ 589.049012][T13091] bridge0: port 2(bridge_slave_1) entered blocking state [ 589.056203][T13091] bridge0: port 2(bridge_slave_1) entered disabled state [ 589.064919][T13091] device bridge_slave_1 entered promiscuous mode [ 590.326413][T13136] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 593.673689][T13166] device pim6reg1 entered promiscuous mode [ 593.735104][T13176] device syzkaller0 entered promiscuous mode [ 596.730635][T13210] device pim6reg1 entered promiscuous mode [ 598.210068][T13221] device syzkaller0 entered promiscuous mode [ 601.612590][T13271] syz-executor.2[13271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 601.612740][T13271] syz-executor.2[13271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 603.003705][T13091] device veth0_vlan entered promiscuous mode [ 603.040596][T13091] device veth1_macvtap entered promiscuous mode [ 603.068454][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 603.215102][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 603.222985][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 603.230771][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 603.239447][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 603.250078][ T4128] bridge0: port 1(bridge_slave_0) entered blocking state [ 603.257055][ T4128] bridge0: port 1(bridge_slave_0) entered forwarding state [ 603.265129][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 603.274327][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 603.282978][ T4128] bridge0: port 2(bridge_slave_1) entered blocking state [ 603.289957][ T4128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 603.298126][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 603.306788][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 603.315862][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 603.324863][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 603.342345][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 603.357967][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 603.367689][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 603.376774][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 603.385554][ T4128] bridge0: port 1(bridge_slave_0) entered blocking state [ 603.392507][ T4128] bridge0: port 1(bridge_slave_0) entered forwarding state [ 603.400435][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 603.409229][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 603.418261][ T4128] bridge0: port 2(bridge_slave_1) entered blocking state [ 603.425238][ T4128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 603.439588][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 603.448096][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 603.460515][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 603.469411][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 603.478145][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 603.490765][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 603.500196][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 603.508883][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 603.518373][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 603.527606][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 603.536594][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 603.545702][ T4128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 603.564582][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 603.574200][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 603.582378][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 603.590682][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 603.599052][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 603.608321][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 603.982405][T13291] device pim6reg1 entered promiscuous mode [ 604.029449][T13083] device veth0_vlan entered promiscuous mode [ 604.304724][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 604.320762][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 604.354940][T13083] device veth1_macvtap entered promiscuous mode [ 604.690064][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 604.916990][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 604.925947][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 604.934726][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 604.943210][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 604.951653][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 604.960712][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 604.969738][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 604.978821][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 607.394597][ T10] device bridge_slave_1 left promiscuous mode [ 607.400820][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 607.950920][ T10] device bridge_slave_0 left promiscuous mode [ 607.957455][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.843572][ T10] device veth1_macvtap left promiscuous mode [ 608.854614][ T10] device veth0_vlan left promiscuous mode [ 612.425484][T13375] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 612.431074][T13375] pim6reg0: linktype set to 821 [ 612.554260][T13445] syz-executor.2[13445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 612.554891][T13445] syz-executor.2[13445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 614.125414][T13457] bridge0: port 1(bridge_slave_0) entered blocking state [ 614.199884][T13457] bridge0: port 1(bridge_slave_0) entered disabled state [ 614.245501][T13457] device bridge_slave_0 entered promiscuous mode [ 614.286469][T13457] bridge0: port 2(bridge_slave_1) entered blocking state [ 614.325879][T13457] bridge0: port 2(bridge_slave_1) entered disabled state [ 614.391874][T13457] device bridge_slave_1 entered promiscuous mode [ 615.537934][T13503] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 615.553404][T13503] pim6reg0: linktype set to 821 [ 617.197585][T13492] bridge0: port 1(bridge_slave_0) entered blocking state [ 617.204814][T13492] bridge0: port 1(bridge_slave_0) entered disabled state [ 617.213069][T13492] device bridge_slave_0 entered promiscuous mode [ 617.221030][T13492] bridge0: port 2(bridge_slave_1) entered blocking state [ 617.228149][T13492] bridge0: port 2(bridge_slave_1) entered disabled state [ 617.236472][T13492] device bridge_slave_1 entered promiscuous mode [ 617.873122][T13457] device veth0_vlan entered promiscuous mode [ 618.438316][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 618.584671][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 618.592402][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 618.611717][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 618.619956][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 618.644008][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 618.652874][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 618.662564][ T381] bridge0: port 1(bridge_slave_0) entered blocking state [ 618.669504][ T381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 618.689243][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 618.698003][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 618.712440][ T381] bridge0: port 2(bridge_slave_1) entered blocking state [ 618.719418][ T381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 618.729933][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 618.738544][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 618.747287][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 618.756363][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 618.765078][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 618.774153][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 618.787284][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 618.837931][T13457] device veth1_macvtap entered promiscuous mode [ 618.912764][T13586] syz-executor.1[13586] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 618.912926][T13586] syz-executor.1[13586] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 619.559627][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 619.581827][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 619.593509][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 620.071220][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 620.084407][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 620.097628][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 620.109098][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 620.190798][T13612] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 623.752743][T13650] device pim6reg1 entered promiscuous mode [ 624.946573][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 624.955339][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 625.095765][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 625.117586][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 625.137782][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 625.162809][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 625.171837][ T4685] bridge0: port 1(bridge_slave_0) entered blocking state [ 625.178873][ T4685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 625.190246][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 625.198985][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 625.207916][ T4685] bridge0: port 2(bridge_slave_1) entered blocking state [ 625.214854][ T4685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 625.241922][T13492] device veth0_vlan entered promiscuous mode [ 625.358778][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 625.369942][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 625.380458][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 625.390533][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 625.399388][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 625.415927][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 625.425175][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 625.674935][T13702] device pim6reg1 entered promiscuous mode [ 625.700623][T13492] device veth1_macvtap entered promiscuous mode [ 625.791434][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 625.801170][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 625.810420][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 627.285807][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 627.295887][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 627.304652][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 627.313466][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 627.322140][T13710] device sit0 entered promiscuous mode [ 629.937361][ T10] device bridge_slave_1 left promiscuous mode [ 629.943781][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 629.995135][ T10] device bridge_slave_0 left promiscuous mode [ 630.020192][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 630.181342][ T10] device bridge_slave_1 left promiscuous mode [ 630.187624][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 630.370455][ T10] device bridge_slave_0 left promiscuous mode [ 630.377100][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 630.399943][ T10] device veth1_macvtap left promiscuous mode [ 630.406239][ T10] device veth0_vlan left promiscuous mode [ 630.445646][ T10] device veth0_vlan left promiscuous mode [ 630.924391][T13787] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 649.234677][T14045] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 659.887308][T14160] device syzkaller0 entered promiscuous mode [ 661.551164][T14198] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 662.617863][T14218] device syzkaller0 entered promiscuous mode [ 666.776271][T14296] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 667.182236][T14300] device syzkaller0 entered promiscuous mode [ 668.284310][T14332] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 671.276967][T14362] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 677.244428][T14452] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 680.465748][T14487] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 680.643768][T14492] device pim6reg1 entered promiscuous mode [ 691.582743][T14484] syz-executor.3 (14484) used greatest stack depth: 19480 bytes left [ 692.810815][T14540] device pim6reg1 entered promiscuous mode [ 693.769988][T14567] device syzkaller0 entered promiscuous mode [ 694.866192][T14590] device pim6reg1 entered promiscuous mode [ 698.123064][T14632] Â: renamed from pim6reg1 [ 698.145697][T14637] device pim6reg1 entered promiscuous mode [ 698.165543][T14609] bridge0: port 1(bridge_slave_0) entered blocking state [ 698.172524][T14609] bridge0: port 1(bridge_slave_0) entered disabled state [ 698.181209][T14609] device bridge_slave_0 entered promiscuous mode [ 698.381297][T14609] bridge0: port 2(bridge_slave_1) entered blocking state [ 698.388367][T14609] bridge0: port 2(bridge_slave_1) entered disabled state [ 698.397112][T14609] device bridge_slave_1 entered promiscuous mode [ 700.829738][T14646] bridge0: port 1(bridge_slave_0) entered blocking state [ 700.880674][T14646] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.054496][T14646] device bridge_slave_0 entered promiscuous mode [ 701.514442][T14646] bridge0: port 2(bridge_slave_1) entered blocking state [ 701.600520][T14646] bridge0: port 2(bridge_slave_1) entered disabled state [ 701.608758][T14646] device bridge_slave_1 entered promiscuous mode [ 704.563831][T14752] syz-executor.2[14752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.563992][T14752] syz-executor.2[14752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.644848][T14736] Â: renamed from pim6reg1 [ 704.775367][T14762] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 707.413831][T14783] syz-executor.0[14783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 707.414000][T14783] syz-executor.0[14783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 707.584060][T14786] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 707.916286][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 707.928351][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 708.066599][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 708.103948][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 708.164990][ T4685] bridge0: port 1(bridge_slave_0) entered blocking state [ 708.172088][ T4685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 708.294129][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 708.358766][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 708.421394][ T4685] bridge0: port 2(bridge_slave_1) entered blocking state [ 708.428831][ T4685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 708.636164][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 708.654547][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 708.662349][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 708.744235][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 708.752993][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 708.778831][T13694] bridge0: port 1(bridge_slave_0) entered blocking state [ 708.785818][T13694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 708.809350][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 708.821010][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 708.829956][T13694] bridge0: port 2(bridge_slave_1) entered blocking state [ 708.836922][T13694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 708.864902][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 708.873864][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 708.882262][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 708.891214][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 708.899967][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 708.929074][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 708.938389][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 708.947313][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 708.956189][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 708.983860][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 708.992535][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 709.025779][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 709.035134][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 709.044651][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 709.053070][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 709.079602][T14609] device veth0_vlan entered promiscuous mode [ 709.087228][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 709.095916][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 709.104103][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 709.112598][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 709.124830][T14646] device veth0_vlan entered promiscuous mode [ 709.141483][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 709.149906][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 709.172238][T14609] device veth1_macvtap entered promiscuous mode [ 709.186056][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 709.195935][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 709.205378][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 709.223144][T14646] device veth1_macvtap entered promiscuous mode [ 709.243722][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 709.252846][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 709.261986][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 709.270446][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 709.279712][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 709.307404][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 709.316895][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 709.326328][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 709.335348][T13694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 709.384609][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 709.393135][ T4685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 710.444509][ T37] device bridge_slave_1 left promiscuous mode [ 710.451005][ T37] bridge0: port 2(bridge_slave_1) entered disabled state [ 710.477699][T14807] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 710.616947][ T37] device bridge_slave_0 left promiscuous mode [ 710.623032][ T37] bridge0: port 1(bridge_slave_0) entered disabled state [ 710.642246][ T37] device veth1_macvtap left promiscuous mode [ 710.650700][ T37] device veth0_vlan left promiscuous mode [ 712.115525][T14863] Â: renamed from pim6reg1 [ 737.519166][ T16] rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { P12847 } 2447 jiffies s: 43289 root: 0x0/T [ 737.531097][ T16] rcu: blocking rcu_node structures (internal RCU debug): [ 844.233251][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 844.240078][ C1] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P12847 [ 844.247282][ C1] (detected by 1, t=10003 jiffies, g=52249, q=623 ncpus=2) [ 844.254410][ C1] task:syz-executor.0 state:R running task stack:24536 pid:12847 ppid:478 flags:0x0000400e [ 844.265332][ C1] Call Trace: [ 844.268458][ C1] [ 844.271242][ C1] __schedule+0xcaf/0x1550 [ 844.275510][ C1] ? __sched_text_start+0x8/0x8 [ 844.280216][ C1] ? task_woken_rt+0x6d/0x240 [ 844.284692][ C1] preempt_schedule_irq+0xc7/0x140 [ 844.289638][ C1] ? preempt_schedule_notrace+0x140/0x140 [ 844.295195][ C1] ? ttwu_do_activate+0x17c/0x290 [ 844.300061][ C1] raw_irqentry_exit_cond_resched+0x2a/0x30 [ 844.305889][ C1] irqentry_exit+0x30/0x40 [ 844.310139][ C1] sysvec_apic_timer_interrupt+0x55/0xc0 [ 844.315731][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 844.321515][ C1] RIP: 0010:update_stack_state+0x246/0x460 [ 844.327158][ C1] Code: bd 84 00 e9 23 ff ff ff 44 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 75 ff ff ff 4c 89 ff e8 a3 bd 84 00 e9 68 ff ff ff 48 8b 45 d0 <4c> 8d 70 40 4d 89 f4 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df 41 [ 844.346596][ C1] RSP: 0018:ffffc90007f870d0 EFLAGS: 00000283 [ 844.352526][ C1] RAX: ffffc90007f87220 RBX: ffffc90007f87248 RCX: ffffc90007f87ed0 [ 844.360315][ C1] RDX: 1ffff92000ff0e46 RSI: ffffc90007f87ec0 RDI: ffffc90007f87278 [ 844.368120][ C1] RBP: ffffc90007f87188 R08: ffffc90007f87308 R09: 000000000000000c [ 844.375939][ C1] R10: ffffc90007f87310 R11: dffffc0000000001 R12: ffffc90007f80000 [ 844.383746][ C1] R13: ffffc90007f88000 R14: dffffc0000000000 R15: 0000000000000001 [ 844.391600][ C1] unwind_next_frame+0x3cb/0x700 [ 844.396341][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 844.401281][ C1] arch_stack_walk+0x10d/0x140 [ 844.405972][ C1] ? arch_do_signal_or_restart+0xb0/0x16f0 [ 844.411896][ C1] stack_trace_save+0x113/0x1c0 [ 844.416579][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 844.421960][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 844.426906][ C1] ? __stack_depot_save+0x36/0x480 [ 844.431862][ C1] save_stack+0xf6/0x1e0 [ 844.435936][ C1] ? __reset_page_owner+0x190/0x190 [ 844.440997][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 844.445993][ C1] ? free_unref_page_prepare+0x83d/0x850 [ 844.451467][ C1] ? free_unref_page+0xb2/0x5c0 [ 844.456269][ C1] ? __free_pages+0x61/0xf0 [ 844.460577][ C1] ? __vunmap+0x9f3/0xb60 [ 844.464746][ C1] ? vfree+0x5c/0x80 [ 844.468483][ C1] ? kcov_close+0x2b/0x50 [ 844.472646][ C1] ? __fput+0x3ab/0x870 [ 844.476639][ C1] ? ____fput+0x15/0x20 [ 844.480630][ C1] ? task_work_run+0x24d/0x2e0 [ 844.485235][ C1] ? do_exit+0xbd5/0x2b80 [ 844.489406][ C1] ? do_group_exit+0x21a/0x2d0 [ 844.494004][ C1] ? get_signal+0x169d/0x1820 [ 844.498513][ C1] ? arch_do_signal_or_restart+0xb0/0x16f0 [ 844.504163][ C1] ? kasan_check_range+0x82/0x2a0 [ 844.509026][ C1] __reset_page_owner+0x54/0x190 [ 844.513806][ C1] free_unref_page_prepare+0x83d/0x850 [ 844.519088][ C1] ? __kasan_check_read+0x11/0x20 [ 844.523949][ C1] ? free_unref_page_commit+0x1f5/0x510 [ 844.529334][ C1] free_unref_page+0xb2/0x5c0 [ 844.533853][ C1] ? mark_free_pages+0x3b0/0x3b0 [ 844.538625][ C1] __free_pages+0x61/0xf0 [ 844.542785][ C1] __vunmap+0x9f3/0xb60 [ 844.546777][ C1] ? asm_sysvec_irq_work+0x1b/0x20 [ 844.551724][ C1] ? vunmap+0x60/0x60 [ 844.555547][ C1] ? _raw_spin_unlock_irqrestore+0x56/0x80 [ 844.561199][ C1] ? kcov_open+0x60/0x60 [ 844.565264][ C1] vfree+0x5c/0x80 [ 844.568821][ C1] kcov_close+0x2b/0x50 [ 844.572815][ C1] __fput+0x3ab/0x870 [ 844.576644][ C1] ____fput+0x15/0x20 [ 844.580449][ C1] task_work_run+0x24d/0x2e0 [ 844.584878][ C1] ? kmem_cache_free+0x291/0x510 [ 844.589661][ C1] ? task_work_cancel+0x2b0/0x2b0 [ 844.594515][ C1] ? free_nsproxy+0x20d/0x260 [ 844.599030][ C1] ? exit_task_namespaces+0xb4/0xd0 [ 844.604069][ C1] do_exit+0xbd5/0x2b80 [ 844.608061][ C1] ? put_task_struct+0x80/0x80 [ 844.612655][ C1] ? __kasan_check_read+0x11/0x20 [ 844.617515][ C1] ? preempt_schedule_common+0xbe/0xf0 [ 844.622811][ C1] ? preempt_schedule+0xd9/0xe0 [ 844.627504][ C1] ? schedule_preempt_disabled+0x20/0x20 [ 844.632964][ C1] ? asm_sysvec_irq_work+0x1b/0x20 [ 844.637925][ C1] do_group_exit+0x21a/0x2d0 [ 844.642350][ C1] get_signal+0x169d/0x1820 [ 844.646870][ C1] ? ptrace_notify+0x350/0x350 [ 844.651468][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 844.656836][ C1] ? __perf_event_task_sched_in+0x1a0/0x1f0 [ 844.662590][ C1] arch_do_signal_or_restart+0xb0/0x16f0 [ 844.668121][ C1] ? perf_sched_cb_inc+0x260/0x260 [ 844.673068][ C1] ? _raw_spin_unlock+0x4c/0x70 [ 844.677753][ C1] ? finish_task_switch+0x167/0x7b0 [ 844.682797][ C1] ? get_sigframe_size+0x10/0x10 [ 844.687681][ C1] exit_to_user_mode_loop+0x74/0xa0 [ 844.692687][ C1] exit_to_user_mode_prepare+0x5a/0xa0 [ 844.697986][ C1] irqentry_exit_to_user_mode+0x9/0x20 [ 844.703363][ C1] irqentry_exit+0x12/0x40 [ 844.707704][ C1] sysvec_apic_timer_interrupt+0x55/0xc0 [ 844.713181][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 844.718983][ C1] RIP: 0033:0x7f337d27cea9 [ 844.723235][ C1] RSP: 002b:00007f337e0950c8 EFLAGS: 00000246 [ 844.729137][ C1] RAX: 0000000000000000 RBX: 00007f337d3b3f80 RCX: 00007f337d27cea9 [ 844.737037][ C1] RDX: 00000000200006c0 RSI: 0000000000005452 RDI: 0000000000000008 [ 844.744854][ C1] RBP: 00007f337d2ebff4 R08: 0000000000000000 R09: 0000000000000000 [ 844.752661][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 844.760563][ C1] R13: 000000000000000b R14: 00007f337d3b3f80 R15: 00007fffe16cd758 [ 844.768389][ C1] [ 878.868841][ T29] INFO: task rcu_exp_gp_kthr:16 blocked for more than 123 seconds. [ 879.203312][ T29] Tainted: G W 6.1.78-syzkaller-00009-g25216be1ac5e #0 [ 879.211972][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 880.203325][ T29] task:rcu_exp_gp_kthr state:D stack:27688 pid:16 ppid:2 flags:0x00004000 [ 880.212678][ T29] Call Trace: [ 881.203293][ T29] [ 881.206115][ T29] __schedule+0xca7/0x1550 [ 881.210383][ T29] ? __sched_text_start+0x8/0x8 [ 881.221506][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 130s! [syz-executor.0:12847] [ 881.230156][ C0] Modules linked in: [ 881.233901][ C0] CPU: 0 PID: 12847 Comm: syz-executor.0 Tainted: G W 6.1.78-syzkaller-00009-g25216be1ac5e #0 [ 881.245345][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 881.256020][ C0] RIP: 0010:memset+0x3e/0x40 [ 881.260618][ C0] Code: 4d 08 48 89 d6 ba 01 00 00 00 e8 2d eb ff ff 84 c0 74 10 48 89 df 44 89 f6 4c 89 fa e8 db 21 3c 03 eb 02 31 c0 5b 41 5e 41 5f <5d> c3 55 48 89 e5 41 57 41 56 41 55 41 54 53 49 89 d4 49 89 f6 49 [ 881.280147][ C0] RSP: 0018:ffffc90000007690 EFLAGS: 00000202 [ 881.286053][ C0] RAX: ffffc90000007720 RBX: dffffc0000000000 RCX: 0000000000000000 [ 881.293945][ C0] RDX: 0000000000000060 RSI: 0000000000000000 RDI: ffffc90000007780 [ 881.301847][ C0] RBP: ffffc90000007690 R08: dffffc0000000000 R09: ffffc90000007720 [ 881.309662][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 881.317473][ C0] R13: ffff888132aa8000 R14: ffffc90000007800 R15: ffffc90000007720 [ 881.325291][ C0] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 881.334051][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 881.340479][ C0] CR2: 00007f7e3c583978 CR3: 000000012151d000 CR4: 00000000003506b0 [ 881.348288][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 881.356095][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 881.363907][ C0] Call Trace: [ 881.367036][ C0] [ 881.369727][ C0] ? show_regs+0x58/0x60 [ 881.374005][ C0] ? watchdog_timer_fn+0x4b1/0x5f0 [ 881.378945][ C0] ? proc_watchdog_cpumask+0xf0/0xf0 [ 881.384235][ C0] ? __hrtimer_run_queues+0x41a/0xad0 [ 881.389458][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 881.394390][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 881.400305][ C0] ? hrtimer_interrupt+0x40c/0xaa0 [ 881.405267][ C0] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 881.411155][ C0] ? sysvec_apic_timer_interrupt+0x44/0xc0 [ 881.416789][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 881.422873][ C0] ? memset+0x3e/0x40 [ 881.426690][ C0] __unwind_start+0x34/0x3a0 [ 881.431127][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 881.435979][ C0] arch_stack_walk+0xdb/0x140 [ 881.440497][ C0] stack_trace_save+0x113/0x1c0 [ 881.445168][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 881.450125][ C0] ? kasan_set_track+0x60/0x70 [ 881.454807][ C0] ? kasan_set_track+0x4b/0x70 [ 881.459405][ C0] ? kasan_save_alloc_info+0x1f/0x30 [ 881.464564][ C0] ? slab_post_alloc_hook+0x53/0x2c0 [ 881.469663][ C0] kasan_set_track+0x4b/0x70 [ 881.474216][ C0] kasan_save_alloc_info+0x1f/0x30 [ 881.479234][ C0] __kasan_kmalloc+0x9c/0xb0 [ 881.483659][ C0] ? ndisc_alloc_skb+0xf3/0x2d0 [ 881.488348][ C0] __kmalloc_node_track_caller+0xb3/0x1e0 [ 881.493904][ C0] ? ndisc_alloc_skb+0xf3/0x2d0 [ 881.498590][ C0] __alloc_skb+0x125/0x2d0 [ 881.502851][ C0] ndisc_alloc_skb+0xf3/0x2d0 [ 881.507361][ C0] ndisc_send_rs+0x264/0x5f0 [ 881.511792][ C0] addrconf_rs_timer+0x2d1/0x600 [ 881.516559][ C0] ? addrconf_disable_policy_idev+0x360/0x360 [ 881.522460][ C0] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 881.527411][ C0] ? _raw_spin_lock_irqsave+0x210/0x210 [ 881.532790][ C0] ? addrconf_disable_policy_idev+0x360/0x360 [ 881.538693][ C0] call_timer_fn+0x3b/0x2d0 [ 881.543033][ C0] ? addrconf_disable_policy_idev+0x360/0x360 [ 881.548944][ C0] __run_timers+0x72a/0xa10 [ 881.553297][ C0] ? calc_index+0x270/0x270 [ 881.557608][ C0] ? __irq_exit_rcu+0x5c/0xf0 [ 881.562128][ C0] ? asm_sysvec_irq_work+0x1b/0x20 [ 881.567089][ C0] run_timer_softirq+0x69/0xf0 [ 881.571683][ C0] __do_softirq+0x1d8/0x661 [ 881.576017][ C0] ? irqtime_account_irq+0xdc/0x260 [ 881.581061][ C0] __irq_exit_rcu+0x50/0xf0 [ 881.585389][ C0] irq_exit_rcu+0x9/0x10 [ 881.589468][ C0] sysvec_apic_timer_interrupt+0x9a/0xc0 [ 881.594942][ C0] [ 881.597716][ C0] [ 881.600489][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 881.606314][ C0] RIP: 0010:finish_task_switch+0x16f/0x7b0 [ 881.612073][ C0] Code: 74 08 4c 89 ff e8 81 37 6c 00 49 8b 1f 48 85 db 4c 8b 6d c0 0f 85 ce 00 00 00 4c 89 e7 e8 d9 08 b0 03 fb 49 8d 9d 48 0b 00 00 <48> 89 d8 48 c1 e8 03 49 be 00 00 00 00 00 fc ff df 42 0f b6 04 30 [ 881.631512][ C0] RSP: 0018:ffffc90007f86dc0 EFLAGS: 00000282 [ 881.637415][ C0] RAX: 0000000080000001 RBX: ffff888132aa8b48 RCX: 0000000000000002 [ 881.645221][ C0] RDX: 0000000040000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 881.653122][ C0] RBP: ffffc90007f86e10 R08: ffffffff819b1f60 R09: fffffbfff0ede2ff [ 881.661210][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881f7037080 [ 881.669020][ C0] R13: ffff888132aa8000 R14: 1ffff1103ee06f7c R15: ffff8881f7037be0 [ 881.676840][ C0] ? __perf_event_task_sched_in+0x180/0x1f0 [ 881.682576][ C0] __schedule+0xcaf/0x1550 [ 881.686828][ C0] ? __sched_text_start+0x8/0x8 [ 881.691503][ C0] ? task_woken_rt+0x6d/0x240 [ 881.696107][ C0] preempt_schedule_irq+0xc7/0x140 [ 881.701049][ C0] ? preempt_schedule_notrace+0x140/0x140 [ 881.706613][ C0] ? ttwu_do_activate+0x17c/0x290 [ 881.711469][ C0] raw_irqentry_exit_cond_resched+0x2a/0x30 [ 881.717196][ C0] irqentry_exit+0x30/0x40 [ 881.721448][ C0] sysvec_apic_timer_interrupt+0x55/0xc0 [ 881.726918][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 881.732732][ C0] RIP: 0010:update_stack_state+0x246/0x460 [ 881.738372][ C0] Code: bd 84 00 e9 23 ff ff ff 44 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 75 ff ff ff 4c 89 ff e8 a3 bd 84 00 e9 68 ff ff ff 48 8b 45 d0 <4c> 8d 70 40 4d 89 f4 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df 41 [ 881.757816][ C0] RSP: 0018:ffffc90007f870d0 EFLAGS: 00000283 [ 881.763720][ C0] RAX: ffffc90007f87220 RBX: ffffc90007f87248 RCX: ffffc90007f87ed0 [ 881.771541][ C0] RDX: 1ffff92000ff0e46 RSI: ffffc90007f87ec0 RDI: ffffc90007f87278 [ 881.779346][ C0] RBP: ffffc90007f87188 R08: ffffc90007f87308 R09: 000000000000000c [ 881.787423][ C0] R10: ffffc90007f87310 R11: dffffc0000000001 R12: ffffc90007f80000 [ 881.795320][ C0] R13: ffffc90007f88000 R14: dffffc0000000000 R15: 0000000000000001 [ 881.803166][ C0] unwind_next_frame+0x3cb/0x700 [ 881.808025][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 881.812865][ C0] arch_stack_walk+0x10d/0x140 [ 881.817465][ C0] ? arch_do_signal_or_restart+0xb0/0x16f0 [ 881.823120][ C0] stack_trace_save+0x113/0x1c0 [ 881.827802][ C0] ? __this_cpu_preempt_check+0x13/0x20 [ 881.833172][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 881.838121][ C0] ? __stack_depot_save+0x36/0x480 [ 881.843082][ C0] save_stack+0xf6/0x1e0 [ 881.847155][ C0] ? __reset_page_owner+0x190/0x190 [ 881.852180][ C0] ? kvm_sched_clock_read+0x18/0x40 [ 881.857220][ C0] ? free_unref_page_prepare+0x83d/0x850 [ 881.862685][ C0] ? free_unref_page+0xb2/0x5c0 [ 881.867371][ C0] ? __free_pages+0x61/0xf0 [ 881.871719][ C0] ? __vunmap+0x9f3/0xb60 [ 881.875885][ C0] ? vfree+0x5c/0x80 [ 881.879609][ C0] ? kcov_close+0x2b/0x50 [ 881.883775][ C0] ? __fput+0x3ab/0x870 [ 881.887776][ C0] ? ____fput+0x15/0x20 [ 881.891759][ C0] ? task_work_run+0x24d/0x2e0 [ 881.896369][ C0] ? do_exit+0xbd5/0x2b80 [ 881.900525][ C0] ? do_group_exit+0x21a/0x2d0 [ 881.905123][ C0] ? get_signal+0x169d/0x1820 [ 881.909646][ C0] ? arch_do_signal_or_restart+0xb0/0x16f0 [ 881.915293][ C0] ? kasan_check_range+0x82/0x2a0 [ 881.920152][ C0] __reset_page_owner+0x54/0x190 [ 881.924924][ C0] free_unref_page_prepare+0x83d/0x850 [ 881.930213][ C0] ? __kasan_check_read+0x11/0x20 [ 881.935071][ C0] ? free_unref_page_commit+0x1f5/0x510 [ 881.940469][ C0] free_unref_page+0xb2/0x5c0 [ 881.944975][ C0] ? mark_free_pages+0x3b0/0x3b0 [ 881.949757][ C0] __free_pages+0x61/0xf0 [ 881.953910][ C0] __vunmap+0x9f3/0xb60 [ 881.957906][ C0] ? asm_sysvec_irq_work+0x1b/0x20 [ 881.962866][ C0] ? vunmap+0x60/0x60 [ 881.966670][ C0] ? _raw_spin_unlock_irqrestore+0x56/0x80 [ 881.972316][ C0] ? kcov_open+0x60/0x60 [ 881.976397][ C0] vfree+0x5c/0x80 [ 881.979949][ C0] kcov_close+0x2b/0x50 [ 881.983947][ C0] __fput+0x3ab/0x870 [ 881.987778][ C0] ____fput+0x15/0x20 [ 881.991632][ C0] task_work_run+0x24d/0x2e0 [ 881.996126][ C0] ? kmem_cache_free+0x291/0x510 [ 882.001057][ C0] ? task_work_cancel+0x2b0/0x2b0 [ 882.005905][ C0] ? free_nsproxy+0x20d/0x260 [ 882.010428][ C0] ? exit_task_namespaces+0xb4/0xd0 [ 882.015461][ C0] do_exit+0xbd5/0x2b80 [ 882.019464][ C0] ? put_task_struct+0x80/0x80 [ 882.024048][ C0] ? __kasan_check_read+0x11/0x20 [ 882.028907][ C0] ? preempt_schedule_common+0xbe/0xf0 [ 882.034205][ C0] ? preempt_schedule+0xd9/0xe0 [ 882.038895][ C0] ? schedule_preempt_disabled+0x20/0x20 [ 882.044364][ C0] ? asm_sysvec_irq_work+0x1b/0x20 [ 882.049316][ C0] do_group_exit+0x21a/0x2d0 [ 882.053742][ C0] get_signal+0x169d/0x1820 [ 882.058092][ C0] ? ptrace_notify+0x350/0x350 [ 882.062696][ C0] ? __this_cpu_preempt_check+0x13/0x20 [ 882.068055][ C0] ? __perf_event_task_sched_in+0x1a0/0x1f0 [ 882.073793][ C0] arch_do_signal_or_restart+0xb0/0x16f0 [ 882.079271][ C0] ? perf_sched_cb_inc+0x260/0x260 [ 882.084339][ C0] ? _raw_spin_unlock+0x4c/0x70 [ 882.089104][ C0] ? finish_task_switch+0x167/0x7b0 [ 882.094152][ C0] ? get_sigframe_size+0x10/0x10 [ 882.098973][ C0] exit_to_user_mode_loop+0x74/0xa0 [ 882.104060][ C0] exit_to_user_mode_prepare+0x5a/0xa0 [ 882.109455][ C0] irqentry_exit_to_user_mode+0x9/0x20 [ 882.114730][ C0] irqentry_exit+0x12/0x40 [ 882.118987][ C0] sysvec_apic_timer_interrupt+0x55/0xc0 [ 882.124467][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 882.130275][ C0] RIP: 0033:0x7f337d27cea9 [ 882.134643][ C0] Code: Unable to access opcode bytes at 0x7f337d27ce7f. [ 882.141500][ C0] RSP: 002b:00007f337e0950c8 EFLAGS: 00000246 [ 882.147405][ C0] RAX: 0000000000000000 RBX: 00007f337d3b3f80 RCX: 00007f337d27cea9 [ 882.155212][ C0] RDX: 00000000200006c0 RSI: 0000000000005452 RDI: 0000000000000008 [ 882.163216][ C0] RBP: 00007f337d2ebff4 R08: 0000000000000000 R09: 0000000000000000 [ 882.171036][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 882.178837][ C0] R13: 000000000000000b R14: 00007f337d3b3f80 R15: 00007fffe16cd758 [ 882.186672][ C0] [ 882.189519][ C0] Sending NMI from CPU 0 to CPUs 1: [ 882.194564][ C1] NMI backtrace for cpu 1 [ 882.194588][ C1] CPU: 1 PID: 83 Comm: syslogd Tainted: G W 6.1.78-syzkaller-00009-g25216be1ac5e #0 [ 882.194639][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 882.194665][ C1] RIP: 0010:update_rq_clock+0x563/0x5d0 [ 882.194728][ C1] Code: 8b be b0 0b 00 00 e8 1c d1 e7 ff 48 89 c3 49 81 c6 00 0d 00 00 4c 89 f1 48 c1 e9 03 48 b8 00 00 00 00 00 fc ff df 48 89 4d a8 <80> 3c 01 00 74 08 4c 89 f7 e8 8f 0d 6d 00 4d 8b 2e 4c 29 eb 4c 39 [ 882.194768][ C1] RSP: 0018:ffffc900009875c8 EFLAGS: 00000802 [ 882.194807][ C1] RAX: dffffc0000000000 RBX: 000000001a7f10b5 RCX: 1ffff1103ee26fb0 [ 882.194852][ C1] RDX: dffffc0000000000 RSI: ffffffff8792e05c RDI: 0000000000000001 [ 882.194886][ C1] RBP: ffffc90000987630 R08: ffffffff8792e040 R09: ffffffff8792e048 [ 882.194923][ C1] R10: ffffffff8792e058 R11: ffffffff8792e050 R12: 000000000001bd1e [ 882.194958][ C1] R13: ffff8881f7137b20 R14: ffff8881f7137d80 R15: 0000000000000000 [ 882.194993][ C1] FS: 00007f8dd7b0a380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 882.195036][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 882.195070][ C1] CR2: 00007ffd8fe65cf8 CR3: 000000010e8ed000 CR4: 00000000003506a0 [ 882.195108][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 882.195144][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 882.195188][ C1] Call Trace: [ 882.195200][ C1] [ 882.195215][ C1] ? show_regs+0x58/0x60 [ 882.195262][ C1] ? nmi_cpu_backtrace+0x285/0x2f0 [ 882.195329][ C1] ? nmi_trigger_cpumask_backtrace+0x3c0/0x3c0 [ 882.195401][ C1] ? update_rq_clock+0x563/0x5d0 [ 882.195455][ C1] ? update_rq_clock+0x563/0x5d0 [ 882.195512][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 882.195567][ C1] ? nmi_handle+0xa7/0x280 [ 882.195620][ C1] ? update_rq_clock+0x563/0x5d0 [ 882.195676][ C1] ? default_do_nmi+0x69/0x160 [ 882.195735][ C1] ? exc_nmi+0xaf/0x120 [ 882.195787][ C1] ? end_repeat_nmi+0x16/0x31 [ 882.195848][ C1] ? update_rq_clock+0x563/0x5d0 [ 882.195905][ C1] ? update_rq_clock+0x563/0x5d0 [ 882.195962][ C1] ? update_rq_clock+0x563/0x5d0 [ 882.196019][ C1] [ 882.196031][ C1] [ 882.196054][ C1] try_to_wake_up+0x60b/0x1220 [ 882.196123][ C1] ? cpu_curr_snapshot+0x90/0x90 [ 882.196191][ C1] ? __filemap_get_folio+0x95e/0xae0 [ 882.196265][ C1] default_wake_function+0x43/0x50 [ 882.196333][ C1] autoremove_wake_function+0x16/0x120 [ 882.196396][ C1] __wake_up_common+0x25e/0x460 [ 882.196454][ C1] ? __skb_try_recv_from_queue+0x2b6/0x750 [ 882.196540][ C1] __wake_up_sync_key+0x1a3/0x3d0 [ 882.196602][ C1] ? __wake_up_locked_key_bookmark+0x20/0x20 [ 882.196671][ C1] ? avc_has_perm+0x16f/0x260 [ 882.196744][ C1] __unix_dgram_recvmsg+0x5fd/0x12b0 [ 882.196805][ C1] ? unix_unhash+0x10/0x10 [ 882.196846][ C1] ? avc_has_perm+0x16f/0x260 [ 882.196931][ C1] unix_dgram_recvmsg+0xb7/0xd0 [ 882.196982][ C1] ? unix_dgram_sendmsg+0x2050/0x2050 [ 882.197046][ C1] sock_read_iter+0x3b2/0x4b0 [ 882.197111][ C1] ? kernel_sock_ip_overhead+0x280/0x280 [ 882.197189][ C1] ? __kasan_check_read+0x11/0x20 [ 882.197232][ C1] ? fsnotify_perm+0x470/0x5d0 [ 882.197283][ C1] vfs_read+0x771/0xad0 [ 882.197356][ C1] ? kernel_read+0x1f0/0x1f0 [ 882.197419][ C1] ? bpf_send_signal_common+0x2d8/0x420 [ 882.197472][ C1] ? trace_raw_output_bpf_trace_printk+0xd0/0xd0 [ 882.197542][ C1] ? __kasan_check_read+0x11/0x20 [ 882.197585][ C1] ? __fdget_pos+0x204/0x390 [ 882.197656][ C1] ksys_read+0x199/0x2c0 [ 882.197721][ C1] ? bpf_trace_run1+0x240/0x240 [ 882.197775][ C1] ? vfs_write+0xeb0/0xeb0 [ 882.197841][ C1] ? debug_smp_processor_id+0x17/0x20 [ 882.197905][ C1] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 882.197967][ C1] __x64_sys_read+0x7b/0x90 [ 882.198036][ C1] do_syscall_64+0x3d/0xb0 [ 882.198083][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 882.198145][ C1] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 882.198201][ C1] RIP: 0033:0x7f8dd7c5eb6a [ 882.198235][ C1] Code: 00 3d 00 00 41 00 75 0d 50 48 8d 3d 2d 08 0a 00 e8 ea 7d 01 00 31 c0 e9 07 ff ff ff 64 8b 04 25 18 00 00 00 85 c0 75 1b 0f 05 <48> 3d 00 f0 ff ff 76 6c 48 8b 15 8f a2 0d 00 f7 d8 64 89 02 48 83 [ 882.198275][ C1] RSP: 002b:00007ffd5802cf58 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 882.198320][ C1] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f8dd7c5eb6a [ 882.198354][ C1] RDX: 00000000000000ff RSI: 000055da7c491300 RDI: 0000000000000000 [ 882.198386][ C1] RBP: 000055da7c4912c0 R08: 0000000000000001 R09: 0000000000000000 [ 882.198417][ C1] R10: 00007f8dd7dfd3a3 R11: 0000000000000246 R12: 000055da7c491349 [ 882.198451][ C1] R13: 000055da7c491300 R14: 0000000000000000 R15: 00007f8dd7e3ba80 [ 882.198499][ C1] [ 882.213315][ T29] ? smp_call_function_single+0x403/0x510 [ 882.661183][ T28] audit: type=1400 audit(1718463840.417:145): avc: denied { unlink } for pid=83 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 883.023365][ T29] ? __kasan_check_write+0x14/0x20 [ 883.028441][ T29] schedule+0xc3/0x180 [ 883.032336][ T29] schedule_timeout+0x18c/0x380 [ 883.037066][ T29] ? __kasan_check_write+0x14/0x20 [ 883.041965][ T29] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 883.047301][ T29] ? console_conditional_schedule+0x10/0x10 [ 883.053123][ T29] ? update_process_times+0x1b0/0x1b0 [ 883.058364][ T29] ? prepare_to_swait_event+0x308/0x320 [ 883.063870][ T29] rcu_exp_sel_wait_wake+0x7fc/0x1fd0 [ 883.069159][ T29] ? __schedule+0xcaf/0x1550 [ 883.073620][ T29] ? rcu_fwd_progress_check+0x2b0/0x2b0 [ 883.079086][ T29] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 883.084054][ T29] ? _raw_spin_lock_irqsave+0x210/0x210 [ 883.089672][ T29] wait_rcu_exp_gp+0x33/0x40 [ 883.094114][ T29] kthread_worker_fn+0x3bb/0x790 [ 883.098952][ T29] ? rcu_exp_handler+0x360/0x360 [ 883.103756][ T29] kthread+0x26d/0x300 [ 883.107765][ T29] ? __kthread_init_worker+0xb0/0xb0 [ 883.112851][ T29] ? kthread_blkcg+0xd0/0xd0 [ 883.117301][ T29] ret_from_fork+0x1f/0x30 [ 883.121544][ T29] [ 885.693300][ T29] INFO: task kworker/u4:2:37 blocked for more than 130 seconds. [ 885.701015][ T29] Tainted: G W L 6.1.78-syzkaller-00009-g25216be1ac5e #0 [ 885.773321][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 885.781871][ T29] task:kworker/u4:2 state:D stack:20816 pid:37 ppid:2 flags:0x00004000 [ 885.863289][ T29] Workqueue: netns cleanup_net [ 885.867977][ T29] Call Trace: [ 885.871097][ T29] [ 885.923293][ T29] __schedule+0xca7/0x1550 [ 885.927660][ T29] ? __sched_text_start+0x8/0x8 [ 885.932322][ T29] ? __mutex_add_waiter+0x1b5/0x310 [ 885.983366][ T29] ? kthread_data+0x53/0xc0 [ 885.987801][ T29] ? wq_worker_sleeping+0x64/0x290 [ 885.992742][ T29] schedule+0xc3/0x180 [ 886.073299][ T29] schedule_preempt_disabled+0x13/0x20 [ 886.078693][ T29] __mutex_lock+0xa3c/0x1ca0 [ 886.083130][ T29] ? ttwu_do_activate+0x290/0x290 2024/06/15 15:04:04 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 886.147593][ T29] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 886.173326][ T29] ? __kasan_check_write+0x14/0x20 [ 886.178355][ T29] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 886.223296][ T29] ? _raw_spin_lock_irqsave+0x210/0x210 [ 886.228793][ T29] ? generic_exec_single+0x272/0x400 [ 886.263292][ T29] ? complete+0x16b/0x1c0 [ 886.267552][ T29] ? _raw_spin_unlock_irq+0x4d/0x70 [ 886.272585][ T29] ? wait_for_common+0x56f/0x640 [ 886.303375][ T29] ? __kasan_check_write+0x14/0x20 [ 886.308404][ T29] __mutex_lock_slowpath+0xe/0x10 [ 886.333310][ T29] mutex_lock+0x130/0x1e0 [ 886.337585][ T29] ? bit_wait_io_timeout+0x120/0x120 [ 886.342692][ T29] ? _find_next_bit+0x126/0x130 [ 886.403300][ T29] ? rcu_barrier+0x7e/0x5f0 [ 886.407744][ T29] rtnl_lock+0x15/0x20 [ 886.411652][ T29] ip6gre_exit_batch_net+0xc0/0x600 [ 886.453316][ T29] ? l2tp_exit_net+0x20d/0x250 [ 886.457992][ T29] ? ip6gre_init_net+0x390/0x390 [ 886.462770][ T29] ? __kasan_check_read+0x11/0x20 [ 886.503287][ T29] ? ip6gre_init_net+0x390/0x390 [ 886.508143][ T29] cleanup_net+0x6c9/0xbf0 [ 886.512396][ T29] ? ops_init+0x490/0x490 [ 886.543363][ T29] ? pwq_dec_nr_in_flight+0x191/0x3d0 [ 886.548684][ T29] process_one_work+0x73d/0xcb0 [ 886.593312][ T29] worker_thread+0xa60/0x1260 [ 886.597955][ T29] kthread+0x26d/0x300 [ 886.601915][ T29] ? worker_clr_flags+0x1a0/0x1a0 [ 886.643298][ T29] ? kthread_blkcg+0xd0/0xd0 [ 886.647822][ T29] ret_from_fork+0x1f/0x30 [ 886.652082][ T29] [ 886.693351][ T29] INFO: task kworker/1:8:6918 blocked for more than 131 seconds. [ 886.700979][ T29] Tainted: G W L 6.1.78-syzkaller-00009-g25216be1ac5e #0 [ 886.743289][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 886.751839][ T29] task:kworker/1:8 state:D stack:26768 pid:6918 ppid:2 flags:0x00004000 [ 886.793290][ T29] Workqueue: ipv6_addrconf addrconf_verify_work [ 886.799453][ T29] Call Trace: [ 886.802577][ T29] [ 886.823355][ T29] __schedule+0xca7/0x1550 [ 886.863289][ T29] ? cpu_curr_snapshot+0x90/0x90 [ 886.868187][ T29] ? __sched_text_start+0x8/0x8 [ 886.872944][ T29] ? wq_worker_sleeping+0x1e6/0x290 [ 886.913291][ T29] schedule+0xc3/0x180 [ 886.917278][ T29] schedule_preempt_disabled+0x13/0x20 [ 886.922586][ T29] __mutex_lock+0xa3c/0x1ca0 [ 886.983303][ T29] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 886.990008][ T29] ? __queue_delayed_work+0x182/0x1f0 [ 887.063320][ T29] ? queue_delayed_work_on+0x13f/0x180 [ 887.068740][ T29] ? delayed_work_timer_fn+0x80/0x80 [ 887.123306][ T29] ? gc_worker+0x1054/0x12f0 [ 887.127836][ T29] __mutex_lock_slowpath+0xe/0x10 [ 887.132680][ T29] mutex_lock+0x130/0x1e0 [ 887.213303][ T29] ? bit_wait_io_timeout+0x120/0x120 [ 887.218529][ T29] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 887.263330][ T29] ? __kasan_check_read+0x11/0x20 [ 887.268276][ T29] ? read_word_at_a_time+0x12/0x20 [ 887.273229][ T29] rtnl_lock+0x15/0x20 [ 887.317250][ T29] addrconf_verify_work+0x19/0x30 [ 887.322072][ T29] process_one_work+0x73d/0xcb0 [ 887.373307][ T29] worker_thread+0xa60/0x1260 [ 887.377946][ T29] ? __kasan_check_read+0x11/0x20 [ 887.382803][ T29] kthread+0x26d/0x300 [ 887.423288][ T29] ? worker_clr_flags+0x1a0/0x1a0 [ 887.428257][ T29] ? kthread_blkcg+0xd0/0xd0 [ 887.432678][ T29] ret_from_fork+0x1f/0x30 [ 887.483309][ T29] [ 887.486247][ T29] INFO: task syz-executor.3:14919 blocked for more than 132 seconds. [ 887.533314][ T29] Tainted: G W L 6.1.78-syzkaller-00009-g25216be1ac5e #0 [ 887.541973][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 887.593315][ T29] task:syz-executor.3 state:D stack:25456 pid:14919 ppid:13091 flags:0x00004004 [ 887.602459][ T29] Call Trace: [ 887.653320][ T29] [ 887.656150][ T29] __schedule+0xca7/0x1550 [ 887.660514][ T29] ? __sched_text_start+0x8/0x8 [ 887.693288][ T29] ? __mutex_add_waiter+0xe4/0x310 [ 887.698332][ T29] ? trace_contention_begin+0xa0/0xa0 [ 887.723301][ T29] schedule+0xc3/0x180 [ 887.727308][ T29] schedule_preempt_disabled+0x13/0x20 [ 887.732684][ T29] __mutex_lock+0xa3c/0x1ca0 [ 887.763308][ T29] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 887.770046][ T29] ? kasan_save_alloc_info+0x1f/0x30 [ 887.813305][ T29] ? __kasan_kmalloc+0x9c/0xb0 [ 887.818011][ T29] ? kvmalloc_node+0x221/0x640 [ 887.822611][ T29] ? __kmalloc_node+0xb4/0x1e0 [ 887.913342][ T29] ? kvmalloc_node+0x26c/0x640 [ 887.963305][ T29] __mutex_lock_slowpath+0xe/0x10 [ 887.968267][ T29] mutex_lock+0x130/0x1e0 [ 887.972433][ T29] ? bit_wait_io_timeout+0x120/0x120 [ 888.032049][ T29] rtnl_lock+0x15/0x20 [ 888.063288][ T29] ppp_ioctl+0x5f6/0x1990 [ 888.067546][ T29] ? ppp_poll+0x250/0x250 [ 888.071708][ T29] ? __fget_files+0x2cb/0x330 [ 888.103318][ T29] ? security_file_ioctl+0x84/0xb0 [ 888.108347][ T29] ? ppp_poll+0x250/0x250 [ 888.112511][ T29] __se_sys_ioctl+0x114/0x190 [ 888.143459][ T29] __x64_sys_ioctl+0x7b/0x90 [ 888.148018][ T29] do_syscall_64+0x3d/0xb0 [ 888.152389][ T29] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 888.173309][ T29] RIP: 0033:0x7f6087c7cea9 [ 888.177738][ T29] RSP: 002b:00007f60889940c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 888.203286][ T29] RAX: ffffffffffffffda RBX: 00007f6087db4050 RCX: 00007f6087c7cea9 [ 888.211168][ T29] RDX: 0000000020001400 RSI: 00000000c004743e RDI: 0000000000000003 [ 888.233291][ T29] RBP: 00007f6087cebff4 R08: 0000000000000000 R09: 0000000000000000 [ 888.241559][ T29] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 888.263360][ T29] R13: 000000000000006e R14: 00007f6087db4050 R15: 00007ffdb1794b78 [ 888.271519][ T29] [ 888.283317][ T29] INFO: task syz-executor.3:14921 blocked for more than 132 seconds. [ 888.291271][ T29] Tainted: G W L 6.1.78-syzkaller-00009-g25216be1ac5e #0 [ 888.323287][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 888.331844][ T29] task:syz-executor.3 state:D stack:29616 pid:14921 ppid:13091 flags:0x00004004 [ 888.353289][ T29] Call Trace: [ 888.356439][ T29] [ 888.359222][ T29] __schedule+0xca7/0x1550 [ 888.373331][ T29] ? __sched_text_start+0x8/0x8 [ 888.378102][ T29] ? __mutex_add_waiter+0x1b5/0x310 [ 888.383139][ T29] ? trace_contention_begin+0xa0/0xa0 [ 888.403334][ T29] schedule+0xc3/0x180 [ 888.407322][ T29] schedule_preempt_disabled+0x13/0x20 [ 888.412620][ T29] __mutex_lock+0xa3c/0x1ca0 [