last executing test programs: 3.056813509s ago: executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000600000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000000340)={'syzkaller0\x00'}) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r2, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xe9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000400), &(0x7f0000000540), 0x8, 0xed, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xf, 0x2}, {0x4, 0x1}, {0x2, 0x5}, {0xa, 0x4}, {0x10, 0x1}]}]}, {0x0, [0x5f]}}, &(0x7f0000000780)=""/216, 0x4f, 0xd8, 0x1, 0x9}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0x20, &(0x7f0000000a40)={&(0x7f0000000940)=""/11, 0xb, 0x0, &(0x7f0000000980)=""/148, 0x94}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x15, 0xf, &(0x7f00000001c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @generic={0x8, 0x0, 0xc, 0x6}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @ldst={0x2, 0x0, 0x1, 0x2, 0x5, 0x1, 0x10}, @ldst={0x1, 0x1, 0x4, 0x2, 0x1, 0x8, 0xfffffffffffffffc}], &(0x7f0000000040)='GPL\x00', 0x5, 0x5b, &(0x7f0000000280)=""/91, 0x41100, 0x12, '\x00', r5, 0x1e, r7, 0x8, &(0x7f00000008c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x3, 0x7, 0x6, 0x4}, 0x10, r6, r4, 0x4, 0x0, &(0x7f0000000ac0)=[{0x3, 0x3, 0x10}, {0x4, 0x5, 0xd, 0x6}, {0x3, 0x5, 0x1, 0x8}, {0x3, 0x5, 0xc, 0x6}], 0x10, 0xfff}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000600000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) (async) close(r1) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000000340)={'syzkaller0\x00'}) (async) close(r0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r2, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xe9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000400), &(0x7f0000000540), 0x8, 0xed, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xf, 0x2}, {0x4, 0x1}, {0x2, 0x5}, {0xa, 0x4}, {0x10, 0x1}]}]}, {0x0, [0x5f]}}, &(0x7f0000000780)=""/216, 0x4f, 0xd8, 0x1, 0x9}, 0x20) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0x20, &(0x7f0000000a40)={&(0x7f0000000940)=""/11, 0xb, 0x0, &(0x7f0000000980)=""/148, 0x94}}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x15, 0xf, &(0x7f00000001c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @generic={0x8, 0x0, 0xc, 0x6}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @ldst={0x2, 0x0, 0x1, 0x2, 0x5, 0x1, 0x10}, @ldst={0x1, 0x1, 0x4, 0x2, 0x1, 0x8, 0xfffffffffffffffc}], &(0x7f0000000040)='GPL\x00', 0x5, 0x5b, &(0x7f0000000280)=""/91, 0x41100, 0x12, '\x00', r5, 0x1e, r7, 0x8, &(0x7f00000008c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x3, 0x7, 0x6, 0x4}, 0x10, r6, r4, 0x4, 0x0, &(0x7f0000000ac0)=[{0x3, 0x3, 0x10}, {0x4, 0x5, 0xd, 0x6}, {0x3, 0x5, 0x1, 0x8}, {0x3, 0x5, 0xc, 0x6}], 0x10, 0xfff}, 0x90) (async) 2.833940293s ago: executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x3, 0x0, 0x0, &(0x7f0000000240)='GPL\x00'}, 0x90) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x11) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x5452, &(0x7f0000000040)=0x20000) 2.674073148s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x144000, 0x7fe2}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r2, &(0x7f0000000180), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000000)={r2, &(0x7f0000000180), 0x0}, 0x20) 2.540321908s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x40021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xcfa4) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1ff}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffeffffffffffffc, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) recvmsg$unix(r3, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)=""/14, 0xe}, {&(0x7f00000002c0)=""/78, 0x4e}, {&(0x7f0000000500)=""/149, 0x95}, {&(0x7f0000000080)=""/11, 0xb}], 0x4, &(0x7f0000000680)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x78}, 0x20) 2.477762198s ago: executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000000)=0x7bff, 0x400000) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='sched_switch\x00', r1}, 0x10) 1.940935351s ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) socketpair(0x11, 0xa, 0x4, &(0x7f0000001080)) 1.915687864s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x144000, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000000)={r2, &(0x7f0000000180), 0x0}, 0x20) 1.833743818s ago: executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x3, 0x0, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0xffffffff, 0xffffffffffffff8e}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x60, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000340)="9332a8cb92148d0f0d02292baf165988e3380775e58efaeca6a15ba2b09228f03c4ee1eb6e63a1c6877cb81f6e182dd2f3a8e841142b2615feef3eee7d4d79d3d576f623271653847f263e11c83a306b6cdbd56d7aa7ff924518a9ff1d6a8f31fb20d1dac0b3598d77778c89891811976124b8aee936030e6e060e2d1d68b73b4ce3e6131b8c4211", 0x75, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000680)="96c5d16f795125d7a525fe49fd0016cbd774db302e7765e5f18866253401ed9d924c1c0be6205e49647b0cef0368979909b6d55fc30b130d7c1d00981f94eff0b350b71fee93ed48cd959ba067cecb68012e22772faf8f9bef742b849a3746005f849b160c669d9fc207d38c246152131a8146c096ce429be9bc48aae4778727b5e267dc25bb7a43718dde919fbf843570611bc39404b3b69950"}, 0x38) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.680050801s ago: executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.cpus\x00', 0x2, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r4}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1a, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000004dab06009aceda715a97ee34846b"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r5}, 0x80) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r1, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r6, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000580)={'veth1_to_bridge\x00', @local}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='jbd2_update_log_tail\x00', r8}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r12}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x8, 0x4, 0x4, 0x10000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='jbd2_update_log_tail\x00', r10}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0x4004662b, 0x20001412) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="350a00000000000000000000180000000000000000000000000000009500"/40], &(0x7f0000000000)='GPL\x00'}, 0x80) 1.615508111s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40047451, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0x12, 0x7, 0x8, 0x8000, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000000)=@raw=[@func, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx={0x18, 0x3}, @tail_call, @exit, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xde4}}], &(0x7f00000001c0)='GPL\x00', 0x2, 0xfb, &(0x7f0000000280)=""/251, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f00000004c0)={0x2, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x893b, 0xffffffffffffffff, 0x5, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x5, 0x4, 0x10, 0x5}, {0x5, 0x4, 0x4, 0x3}, {0x2, 0x3, 0x8}, {0x3, 0x4, 0xb, 0x7}, {0x1, 0x2, 0x1, 0x4}], 0x10, 0x7f}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.506514418s ago: executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000000)=0x7bff, 0x400000) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='sched_switch\x00', r1}, 0x10) 1.444036568s ago: executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000a40)={0x7, &(0x7f0000000a00)=[{0x6, 0x8, 0x1, 0x8000}, {0x5, 0x4, 0xf7, 0x8}, {0xa50, 0x81, 0x4, 0x10000}, {0x1a, 0x1f, 0x6, 0x88f3}, {0x2, 0x8, 0x4, 0x1}, {0x1, 0x81, 0x26, 0x400}, {0x6, 0x2, 0x71, 0xffff8001}]}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f00000009c0)={&(0x7f0000000300), 0x6e, &(0x7f0000000900)=[{&(0x7f0000000540)=""/175, 0xaf}, {&(0x7f0000000600)=""/194, 0xc2}, {&(0x7f0000000700)=""/198, 0xc6}, {&(0x7f0000000800)=""/198, 0xc6}, {&(0x7f0000000380)=""/81, 0x51}], 0x5, &(0x7f0000000980)=[@cred={{0x1c}}], 0x20}, 0x10143) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) setsockopt$sock_attach_bpf(r3, 0x1, 0x3c, &(0x7f00000000c0), 0x4) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f00000006c0)={'syzkaller0\x00', @multicast}) write$cgroup_subtree(r0, &(0x7f0000000580)=ANY=[@ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYRES8, @ANYRES16, @ANYBLOB], 0x36) 1.318824857s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x144000, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000000)={r2, &(0x7f0000000180), 0x0}, 0x20) 1.107088989s ago: executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c250000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'veth1_to_batadv\x00', 0x800}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xa, 0x4, 0x3, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_da_write_pages_extent\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000040)='ext4_da_write_pages_extent\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f00000000c0), 0x12) ioctl$SIOCSIFHWADDR(r5, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 950.776543ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x40021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xcfa4) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1ff}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffeffffffffffffc, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a03f0fff0ffffff79a4f0ff00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000030a00006a0a00fe0000000c8500000032000000b70000000000002995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a85149451ffd564c56a7cbf11a1127c77242915e43b2bc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) recvmsg$unix(r3, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)=""/14, 0xe}, {&(0x7f00000002c0)=""/78, 0x4e}, {&(0x7f0000000500)=""/149, 0x95}, {&(0x7f0000000080)=""/11, 0xb}], 0x4, &(0x7f0000000680)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x78}, 0x20) 907.14885ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{r0}, 0x0, &(0x7f00000005c0)='%-5lx \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000900)='jbd2_checkpoint_stats\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40086607, 0x20001412) 827.382142ms ago: executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x11, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000004000000bb7f1a00c600feff0000000a950000000001"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 803.799076ms ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="b4050000200080066110000000000000c6000000000000009500d800000000009f33ef60916e55893f1eeb0b2ae13d922e6235592ce847e2566c43d72918a897323fd0723043c47c896ce0bce66a245ad9d6817fd98cd824498949714ffaac8a6f77ef0000ca5d82054d54d53cd2b6db714e75d9bdae214fa68a0557eb2c5ca683a4b6fcfcff0bffffffffffd47042eaebfa6fa26fa7a347c7faa8e700458c60897d4a6148a1c11428427c40de60beacf871ab5c2ff88a02084e5b5271e45f00003826fb8579c1fb01d2c5553d2ccb5fc5b51fe6b174ebd9907dcff414ed55b0c20cdbe7009a6fe7cc78762f1d4dcdbca64920db9a50f86c21632f7a4bd344e0bd74ff05d37ef68e3b9db863c758ffffffffabe90ac5d08dd9d4e0359c41cf3626e1230bc1cd4c02c460ceb44276e9bd94d1c2e6d17dc5c2edf332a62f5fe68fbbbbfcfd00000000000fbf940e6652d357474ed5f816f66ac3027460ae66317f83cdd7a7eb2a7003d1a6cf5478533584961c329fcf5a43e05c92bfef0dcd28000000003f2915a3039c9a78f63b8ec7e60a0000fed7d67c440e23d130e51eea1e085bebabe7059de9cbfc5117c024185a062acb6b8eec31c21b3af8b9eedb4660ed2deb7acf2a33a376a5cb7d4266d5b0be14488d14b473502486ad8dd600000000000000000000c7766ea7c581782c0d90f42a85303835fc291c25d29e6bead5d7360f2e1929d7736ebc8558c4506407d3046022bdf25485bd5442169e9b4c1278343581b7a06f65e8ea6b042c4fd08381e5000000000000006398d6480000001a723b91030000006480304c66b217aea0156ce9eef911fe5b7370f79987303ecb3aabc53c60014a0101ab766754f596b41da9534d12b8306a1b36cf3b03f0d790879f523eabfbee83d8bd472ef69660cf6ec897106c51e54a17497f384c4956b41f3843e7c878b1e11316d8ddae1c6c3b85aaf7a9fcaf8f5d6186c42542d68ba72682c938d3c0a2e6e10eed71b1d31c9f300b41745329bf34495c63e43fb896e4903fb0fae54a8f0fe3b48a5b29d279070647e65097c8ecf32a15080000000000000001007ba4a70a084bd994ac5e00000000000000000000000000351a30cd97f83d72631d0fe92efa974a53f4dc1eb9a86df632a6d463688123f64d42a919bcfc44a90ffd680200000091f842a91c977f6075d07e39e669b0713af0498a99bf5261cb3269d499a5202d7a08b33ade7b38829b9bd39619688d5e9af22170ef83e5b92cbb32b655c45de1c154aad81bf64351668a3f76d5afa958aff76249e0ffdf8e45155536a1a44bfcbfbfd232af000052f9002a"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xf, 0x4, 0x4, 0x12, 0xb61, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@ifindex, r0, 0x22, 0x20}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000110880febb0007aafe80"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1100}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xd, 0x8, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x2}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000080)="95", 0xfffffdef}], 0x1000000000000082, 0x0, 0xfffffffffffffe20}, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@o_path={&(0x7f00000000c0)='./file0\x00', r1, 0x4000, r6}, 0x18) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r7, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r8, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_ext_remove_space_done\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_ext_remove_space_done\x00', r10}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 771.633351ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='ext4_alloc_da_blocks\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x7, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x9, 0x4, 0x8, 0x677c}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00', r3}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.current\x00', 0x275a, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) 680.706165ms ago: executing program 2: socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8923, &(0x7f0000000040)={'wg2\x00', @multicast}) 662.663268ms ago: executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800004e9d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r2}, &(0x7f0000000080), &(0x7f0000000280)}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8f01100000009875f37538e486dd63"], 0xfdef) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r8}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0x40086607, 0x20001412) 623.881194ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x40021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200093200fe80000000000000875a650b9ff57b00000000000000000000000000ac1414aa"], 0xcfa4) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1ff}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffeffffffffffffc, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) 347.939166ms ago: executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.cpus\x00', 0x2, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r4}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1a, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000004dab06009aceda715a97ee34846b"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r5}, 0x80) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r1, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r6, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000580)={'veth1_to_bridge\x00', @local}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='jbd2_update_log_tail\x00', r8}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r12}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x8, 0x4, 0x4, 0x10000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='jbd2_update_log_tail\x00', r10}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0x4004662b, 0x20001412) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="350a00000000000000000000180000000000000000000000000000009500"/40], &(0x7f0000000000)='GPL\x00'}, 0x80) 335.274478ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_ext_remove_space\x00', r1}, 0x10) write$cgroup_int(r0, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, &(0x7f0000000000)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 314.981561ms ago: executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.threads\x00', 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x80086601, &(0x7f00000005c0)) openat$cgroup_ro(r2, &(0x7f00000023c0)='memory.stat\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000002400)=""/4101, 0x0, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffe9e}, 0x90) write$cgroup_subtree(r2, &(0x7f0000001c00)={[{0x2b, 'pids'}, {0x2b, 'freezer'}, {0x2d, 'blkio'}, {0x494bb62ea5ea08fe, 'io'}, {0x0, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'cpuset'}, {0x2d, 'blkio'}]}, 0x34) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001780)={r3, 0x0, 0xc6, 0x1000, &(0x7f0000000240)="3b32b544784f188db8d81a9b652390168c4c167f371d7273d11490637ac45206d312448151378647d78fd6dbdf68df58a12638509ba93a2ea8e64d10ba6fac4bc85fca2c2e4e016ffbfee651d0d51fc65d4cb58cfb05ac649cd2d9c1a5394b62ae219219bdd191e4e1be052155fbe0534258ecae7d543be52fe30e42e7f7be8f417b084339ab43a443f6827a652e1853052834693f9a5e23513197db3c9b91d28eaa5631754df83f8e9b4c4e39e03dc2c35372ad930daee25a979ff174de5f786f455601dc3d", &(0x7f0000000740)=""/4096, 0x5, 0x0, 0x59, 0x0, &(0x7f0000000380)="eb3ba9548d632dcf9a0fc4df00ec2cafbbfe1bae793a52f23f4df3390e65d515935aed932a70dc0d21553bf94e0b3769d63816be328b2a66691f9aab971ed8363e24f9f639c504a8bdaca12be5f90a6d8b18ecc4ae09d97fbd", &(0x7f0000001740), 0x3, 0x0, 0x3}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x143ffd, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r4, &(0x7f0000000180), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r4, &(0x7f0000000180), 0x0}, 0x20) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES64=r6], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_alloc\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r9, &(0x7f0000003540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[], 0x2008}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0x13, &(0x7f00000009c0)=@framed={{}, [@printk={@p, {0x3, 0x0, 0x3, 0xa, 0x0}, {0x5}, {0x6, 0x0, 0x2}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, @printk={@p, {0x3, 0x3, 0x6}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x86002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1003, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 245.813592ms ago: executing program 4: socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8923, &(0x7f0000000040)={'wg2\x00', @multicast}) 227.906165ms ago: executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.threads\x00', 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x80086601, &(0x7f00000005c0)) openat$cgroup_ro(r2, &(0x7f00000023c0)='memory.stat\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000b600000000000000000085000000410000009500000000000000e6923b33b19a35d427f5e80a085f71b8e056b7f2c14e7f99b7ecf39c93069d27164b045baa56262b38e43704f9b69a7a628f93ee62718c1331b374a2452f29c75f7b83e4cb5734add259f2c4045905f8a45ac0bcf54572565c58b6bc51b84b04df5211835b93aa87c6b652adc617b8d2831beec0b5c4bb871cdda2b4010ec1f85e28bb70219fd90350b6121829a7e3a0613343c8de3bec27990cdeb3bc92c681f68983ad2c81ef5a875b67598e7066cfd5b9a146c7204013ceb14c8297cd19aac1624b15e7526f1cf70961f9f3b48ca6de7b2fbc7a7f3e8f0d0924cb2f957bf60d51406d3a258af3d58e0380ae328a63434a74d406020076040044240835f3668a6896dbc8fcea250f4b0c2979864000ea238698844e0675e442a7d3acfd1ac46d85c8b23ad8279643d5e3e00a2d319873945b3d2ca8e9a54cbd1aeb90c55b295b9d6021217c70fc7cedba84dd598b53c8521f149b33cb95cae5df2ebf8b7103803aaaa8e7d68dcdfaa835bdb5a23bdbff9362d41a112604999304c1dff6f4f4f8b219b418e09cf2c060cb2f9ad957fd859564df6f6f54c4ea794102494e1d56e88c1439ea086b1acc9fbc26c315246741cb722188846b1175198f6fa467be03e9f7cff922a5c78bbb28bdf7816bb27db4e86d988213dffd7f012721f2ec81ace497eeca313214ffbdb4d79ccb3c2e29275da223f5fa52525145684e10798d3de43fa17513be7440bfccf3a4d0a237bf80bfd9acf1be2a56eecbbce4bc4708df946b1a1b989dc6b146853fea8deab55df9eaf759ffd08ff483105220ebfbc53be6a85fc1b610ba8e3ecb8a7351cf216d8073aecf3b631837846b703e7772626376aa84290a8bc2b5588952c50caa8308d51cc2e0bc4a463817b1cd98e180d2aad1ccc230131b64e9229e63004641731dd08917f37827d975194bf505b297c1ddf68e300913e8c6fbf9d4ed50b58277ec6294a0c91a63bb70e44eb4b4ed314978173b3e83d7372c8b322f91846e37ac"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000002400)=""/4101, 0x0, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffe9e}, 0x90) write$cgroup_subtree(r2, &(0x7f0000001c00)={[{0x2b, 'pids'}, {0x2b, 'freezer'}, {0x2d, 'blkio'}, {0x494bb62ea5ea08fe, 'io'}, {0x0, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'cpuset'}, {0x2d, 'blkio'}]}, 0x34) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001780)={r3, 0x0, 0xc6, 0x1000, &(0x7f0000000240)="3b32b544784f188db8d81a9b652390168c4c167f371d7273d11490637ac45206d312448151378647d78fd6dbdf68df58a12638509ba93a2ea8e64d10ba6fac4bc85fca2c2e4e016ffbfee651d0d51fc65d4cb58cfb05ac649cd2d9c1a5394b62ae219219bdd191e4e1be052155fbe0534258ecae7d543be52fe30e42e7f7be8f417b084339ab43a443f6827a652e1853052834693f9a5e23513197db3c9b91d28eaa5631754df83f8e9b4c4e39e03dc2c35372ad930daee25a979ff174de5f786f455601dc3d", &(0x7f0000000740)=""/4096, 0x5, 0x0, 0x59, 0x0, &(0x7f0000000380)="eb3ba9548d632dcf9a0fc4df00ec2cafbbfe1bae793a52f23f4df3390e65d515935aed932a70dc0d21553bf94e0b3769d63816be328b2a66691f9aab971ed8363e24f9f639c504a8bdaca12be5f90a6d8b18ecc4ae09d97fbd", &(0x7f0000001740), 0x3, 0x0, 0x3}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x143ffd, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r4, &(0x7f0000000180), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r4, &(0x7f0000000180), 0x0}, 0x20) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES64=r6], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_alloc\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r9, &(0x7f0000003540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[], 0x2008}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x86002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1003, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 136.374609ms ago: executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800004e9d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r2}, &(0x7f0000000080), &(0x7f0000000280)}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8f01100000009875f37538e486dd63"], 0xfdef) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r8}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0x40086607, 0x20001412) 96.356505ms ago: executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000300000001000000000000010000000000000000000000000000000105000000100000000000000000000003000000000100000002"], 0x0, 0x53}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2f00000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000006000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="000000007b8af8ff00000000bfa200000000000007f1dc6992ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r6}, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=ANY=[@ANYRES64=r6, @ANYRES64=r4, @ANYRES64=r7, @ANYBLOB="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", @ANYRES64, @ANYRES64=r6, @ANYRES8=r1, @ANYRESDEC=r5, @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r8}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_remove_blocks\x00', r5}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.stat\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r9, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r11 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/1901], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r11, 0x40042408, r12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r13, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) sendmsg$inet(r3, &(0x7f00000009c0)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000380), 0x6e, &(0x7f0000000400)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, &(0x7f00000004c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x40}, 0x40000000) 0s ago: executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x6f9}, 0xc) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0xb65, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000002000000b705000008000000850000006900000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r4}, 0xc) unlink(0x0) kernel console output (not intermixed with test programs): d promiscuous mode [ 23.535197][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.542154][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.549274][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.556043][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.609675][ T319] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.616553][ T319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.623703][ T319] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.630525][ T319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.660824][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.667684][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.674762][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.681581][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.692581][ T317] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.699452][ T317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.706548][ T317] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.713310][ T317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.722812][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.729666][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.736760][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.743541][ T314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.754780][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.762046][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.769103][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.776217][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.783213][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.790306][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.797263][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.804255][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.811440][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.818459][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.825792][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.833111][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.865063][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.872601][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.880663][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.887505][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.894699][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.903467][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.910310][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.917461][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.925351][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.932110][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.939261][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.947253][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.954069][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.973384][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.981096][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.006982][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.014775][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.023047][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.031111][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.037957][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.045129][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.053017][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.060782][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.068932][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.076879][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.083782][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.090974][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.098808][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.117598][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.124897][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.132178][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.140244][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.148565][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.155386][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.162618][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.170432][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.178294][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.185946][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.194043][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.201944][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.208700][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.232902][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.240336][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.247650][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.255762][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.263902][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.270757][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.278525][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.286676][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.294639][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.301484][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.308656][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.316554][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.324212][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.332093][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.345238][ T312] device veth0_vlan entered promiscuous mode [ 24.351316][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.359588][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.368137][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.376338][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.391843][ T314] device veth0_vlan entered promiscuous mode [ 24.400377][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.407636][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.414820][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.423049][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.431178][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.439089][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.446857][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.454663][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.462600][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.470276][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.484735][ T319] device veth0_vlan entered promiscuous mode [ 24.498013][ T312] device veth1_macvtap entered promiscuous mode [ 24.504888][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.514497][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.521866][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.529230][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.537517][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.545524][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.553246][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.560965][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.568975][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.576876][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.585049][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.592383][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.599649][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.607645][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.614912][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.633419][ T317] device veth0_vlan entered promiscuous mode [ 24.644248][ T314] device veth1_macvtap entered promiscuous mode [ 24.653087][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.662503][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.670533][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.678645][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.686838][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.694766][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.706003][ T319] device veth1_macvtap entered promiscuous mode [ 24.718550][ T313] device veth0_vlan entered promiscuous mode [ 24.730230][ T317] device veth1_macvtap entered promiscuous mode [ 24.745356][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.753771][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.761963][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.766029][ C0] hrtimer: interrupt took 28579 ns [ 24.770253][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.782679][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.790627][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.799087][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.807400][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.815473][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.823968][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.831479][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.844782][ T313] device veth1_macvtap entered promiscuous mode [ 24.868650][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.878945][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.888412][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.896810][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.904885][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.915597][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.923824][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.932128][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.940374][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.013718][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.087538][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.105419][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.113857][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.127187][ T340] syz-executor.1 (340) used greatest stack depth: 21784 bytes left [ 27.110054][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 27.110071][ T28] audit: type=1400 audit(1716899306.814:109): avc: denied { ioctl } for pid=480 comm="syz-executor.1" path="/dev/ppp" dev="devtmpfs" ino=138 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.717702][ T28] audit: type=1400 audit(1716899308.424:110): avc: denied { create } for pid=568 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 28.963224][ T571] device syzkaller0 entered promiscuous mode [ 29.018870][ T335] syzkaller0: tun_net_xmit 48 [ 29.026074][ T28] audit: type=1400 audit(1716899308.724:111): avc: denied { relabelfrom } for pid=568 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 29.063904][ T569] syzkaller0: tun_net_xmit 1280 [ 29.069298][ T28] audit: type=1400 audit(1716899308.724:112): avc: denied { relabelto } for pid=568 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 29.096483][ T569] syzkaller0: create flow: hash 881652392 index 2 [ 29.108398][ T568] syzkaller0: delete flow: hash 881652392 index 2 [ 29.737518][ T609] device syzkaller0 entered promiscuous mode [ 29.821892][ T609] syzkaller0: tun_net_xmit 1280 [ 29.827238][ T609] syzkaller0: create flow: hash 881652392 index 2 [ 29.877843][ T608] syzkaller0: delete flow: hash 881652392 index 2 [ 30.659303][ T28] audit: type=1400 audit(1716899310.364:113): avc: denied { cpu } for pid=672 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.833180][ T735] device pim6reg1 entered promiscuous mode [ 33.292801][ T791] bridge0: port 3(dummy0) entered blocking state [ 33.302463][ T790] syz-executor.1[790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.302523][ T790] syz-executor.1[790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.319248][ T791] bridge0: port 3(dummy0) entered disabled state [ 33.338383][ T791] device dummy0 entered promiscuous mode [ 33.344033][ T791] bridge0: port 3(dummy0) entered blocking state [ 33.350220][ T791] bridge0: port 3(dummy0) entered forwarding state [ 33.372533][ T798] device syzkaller0 entered promiscuous mode [ 33.384468][ T791] device dummy0 left promiscuous mode [ 33.390226][ T791] bridge0: port 3(dummy0) entered disabled state [ 35.256841][ T845] bridge0: port 3(dummy0) entered blocking state [ 35.311452][ T845] bridge0: port 3(dummy0) entered disabled state [ 35.414852][ T845] device dummy0 entered promiscuous mode [ 35.477241][ T845] bridge0: port 3(dummy0) entered blocking state [ 35.483440][ T845] bridge0: port 3(dummy0) entered forwarding state [ 35.626574][ T843] device dummy0 left promiscuous mode [ 35.642880][ T843] bridge0: port 3(dummy0) entered disabled state [ 38.294383][ T960] Illegal XDP return value 4294967274 on prog (id 262) dev N/A, expect packet loss! [ 38.761544][ T28] audit: type=1400 audit(1716899318.464:114): avc: denied { create } for pid=969 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 38.955192][ T28] audit: type=1400 audit(1716899318.464:115): avc: denied { setopt } for pid=969 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 41.432047][ T1028] syz-executor.3[1028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.432139][ T1028] syz-executor.3[1028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.652412][ T1039] device syzkaller0 entered promiscuous mode [ 42.581373][ T1076] device syzkaller0 entered promiscuous mode [ 42.712174][ T1082] device syzkaller0 entered promiscuous mode [ 42.793454][ T1086] device wg2 entered promiscuous mode [ 42.995302][ T1104] device syzkaller0 entered promiscuous mode [ 43.890229][ T1130] device syzkaller0 entered promiscuous mode [ 43.945215][ T1135] syz-executor.0[1135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.945285][ T1135] syz-executor.0[1135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.153679][ T1147] device syzkaller0 entered promiscuous mode [ 44.387365][ T312] syz-executor.1 (312) used greatest stack depth: 20712 bytes left [ 44.706160][ T1172] device syzkaller0 entered promiscuous mode [ 44.813259][ T1170] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.832132][ T1170] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.854740][ T1170] device bridge_slave_0 entered promiscuous mode [ 44.884683][ T1170] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.904640][ T1170] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.921833][ T1170] device bridge_slave_1 entered promiscuous mode [ 45.012809][ T1178] device syzkaller0 entered promiscuous mode [ 45.369386][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.406477][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.533300][ T350] device bridge_slave_1 left promiscuous mode [ 45.544154][ T350] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.659810][ T350] device bridge_slave_0 left promiscuous mode [ 45.743676][ T350] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.890659][ T350] device veth1_macvtap left promiscuous mode [ 46.024039][ T350] device veth0_vlan left promiscuous mode [ 46.418941][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.431237][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.441175][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.456498][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.463368][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.481799][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 46.498800][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.515622][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.522510][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.549352][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.564885][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.585037][ T1170] device veth0_vlan entered promiscuous mode [ 46.758958][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 46.768848][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 46.786205][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.945416][ T1170] device veth1_macvtap entered promiscuous mode [ 46.956257][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.964729][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.983390][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 47.000228][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.016392][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 47.117539][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 47.125672][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.145474][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 47.160739][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.651982][ T1273] device syzkaller0 entered promiscuous mode [ 50.168036][ T1318] device syzkaller0 entered promiscuous mode [ 50.460747][ T1345] device syzkaller0 entered promiscuous mode [ 51.146669][ T1398] device syzkaller0 entered promiscuous mode [ 51.537553][ T1422] device syzkaller0 entered promiscuous mode [ 52.028319][ T1464] device syzkaller0 entered promiscuous mode [ 52.121400][ T1484] device syzkaller0 entered promiscuous mode [ 52.262696][ T1511] tap0: tun_chr_ioctl cmd 2148553947 [ 52.302440][ T1515] device sit0 entered promiscuous mode [ 52.435376][ T28] audit: type=1400 audit(1716899332.134:116): avc: denied { create } for pid=1525 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 54.180421][ T1612] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 54.219466][ T1610] device sit0 entered promiscuous mode [ 55.041859][ T1632] device pim6reg1 entered promiscuous mode [ 55.139538][ T1638] gretap0: refused to change device tx_queue_len [ 56.149958][ T1694] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 57.014328][ T1710] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 57.392030][ T1732] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 58.167098][ T1745] syz-executor.0[1745] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.205120][ T1745] syz-executor.0[1745] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.509719][ T1761] device syzkaller0 entered promiscuous mode [ 58.553962][ T1763] device syzkaller0 entered promiscuous mode [ 59.695027][ T1818] device syzkaller0 entered promiscuous mode [ 60.213487][ T1839] : renamed from ipvlan1 [ 61.111634][ T1878] device syzkaller0 entered promiscuous mode [ 61.735598][ T1899] device syzkaller0 entered promiscuous mode [ 61.782604][ T1902] device syzkaller0 entered promiscuous mode [ 63.309436][ T1942] device syzkaller0 entered promiscuous mode [ 63.669575][ T1946] device syzkaller0 entered promiscuous mode [ 64.064375][ T1965] device syzkaller0 entered promiscuous mode [ 64.259737][ T1974] device syzkaller0 entered promiscuous mode [ 65.204959][ T1996] device bridge0 entered promiscuous mode [ 66.656332][ T2035] device bridge0 entered promiscuous mode [ 67.088118][ T2066] device veth1_macvtap left promiscuous mode [ 67.160250][ T2066] device syzkaller0 entered promiscuous mode [ 67.584779][ T2098] device syzkaller0 entered promiscuous mode [ 68.484018][ T2127] tun0: tun_chr_ioctl cmd 21731 [ 69.318834][ T2150] device syzkaller0 entered promiscuous mode [ 70.779956][ T28] audit: type=1400 audit(1716899350.484:117): avc: denied { create } for pid=2222 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 70.845389][ T28] audit: type=1400 audit(1716899350.484:118): avc: denied { create } for pid=2222 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 71.039281][ T28] audit: type=1400 audit(1716899350.744:119): avc: denied { write } for pid=2239 comm="syz-executor.4" name="net" dev="proc" ino=19197 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 71.098120][ T28] audit: type=1400 audit(1716899350.764:120): avc: denied { add_name } for pid=2239 comm="syz-executor.4" name="blkio.throttle.io_service_bytes_recursive" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 71.165838][ T28] audit: type=1400 audit(1716899350.764:121): avc: denied { create } for pid=2239 comm="syz-executor.4" name="blkio.throttle.io_service_bytes_recursive" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 71.253961][ T28] audit: type=1400 audit(1716899350.764:122): avc: denied { associate } for pid=2239 comm="syz-executor.4" name="blkio.throttle.io_service_bytes_recursive" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 71.641579][ T2260] syz-executor.0[2260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.641657][ T2260] syz-executor.0[2260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.693524][ T28] audit: type=1400 audit(1716899350.764:123): avc: denied { ioctl } for pid=2239 comm="syz-executor.4" path="pid:[4026532468]" dev="nsfs" ino=4026532468 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 72.142823][ T28] audit: type=1400 audit(1716899351.744:124): avc: denied { append } for pid=2267 comm="syz-executor.2" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 72.289239][ T28] audit: type=1400 audit(1716899351.744:125): avc: denied { create } for pid=2267 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 72.473762][ T2285] device syzkaller0 entered promiscuous mode [ 72.766764][ T2306] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) [ 72.924998][ T2312] device pim6reg1 entered promiscuous mode [ 73.296376][ T2347] device syzkaller0 entered promiscuous mode [ 74.009428][ T2379] syz-executor.1[2379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.009497][ T2379] syz-executor.1[2379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.929527][ T2433] device syzkaller0 entered promiscuous mode [ 76.092772][ T2447] device sit0 entered promiscuous mode [ 76.366220][ T2455] syz-executor.4[2455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.366293][ T2455] syz-executor.4[2455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.119150][ T2482] device sit0 left promiscuous mode [ 77.171779][ T2479] device syzkaller0 entered promiscuous mode [ 77.273805][ T2482] device sit0 entered promiscuous mode [ 78.871466][ T2553] device syzkaller0 entered promiscuous mode [ 79.278464][ T2596] device pim6reg1 entered promiscuous mode [ 79.315344][ T2603] device syzkaller0 entered promiscuous mode [ 79.348170][ T2602] device syzkaller0 entered promiscuous mode [ 79.847458][ T2640] device pim6reg1 entered promiscuous mode [ 80.805004][ T2705] bridge0: port 3(dummy0) entered blocking state [ 80.816876][ T2705] bridge0: port 3(dummy0) entered disabled state [ 80.831300][ T2705] device dummy0 entered promiscuous mode [ 80.843545][ T2705] bridge0: port 3(dummy0) entered blocking state [ 80.849750][ T2705] bridge0: port 3(dummy0) entered forwarding state [ 82.612965][ T2784] device pim6reg1 entered promiscuous mode [ 83.956959][ T2850] device macsec0 entered promiscuous mode [ 83.996204][ T2863] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.003283][ T2863] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.013948][ T2863] device bridge0 left promiscuous mode [ 86.601830][ T2980] device sit0 entered promiscuous mode [ 87.400263][ T2995] device syzkaller0 entered promiscuous mode [ 88.814987][ T3076] geneve1: tun_chr_ioctl cmd 1074025681 [ 89.151628][ T3097] device syzkaller0 entered promiscuous mode [ 89.280665][ T3105] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 89.304360][ T3105] device syzkaller0 entered promiscuous mode [ 89.867414][ T28] audit: type=1400 audit(1716899369.574:126): avc: denied { create } for pid=3127 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 89.905287][ T3132] device wg2 left promiscuous mode [ 90.162501][ T3145] syz-executor.4[3145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.162569][ T3145] syz-executor.4[3145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.085056][ T28] audit: type=1400 audit(1716899370.784:127): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 91.521738][ T3235] device veth0_vlan left promiscuous mode [ 91.527663][ T3235] device veth0_vlan entered promiscuous mode [ 91.534585][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.544447][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.552490][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.617063][ T3288] device syzkaller0 entered promiscuous mode [ 94.013705][ T3329] device syzkaller0 entered promiscuous mode [ 94.228430][ T28] audit: type=1400 audit(1716899373.934:128): avc: denied { ioctl } for pid=3340 comm="syz-executor.0" path="socket:[23584]" dev="sockfs" ino=23584 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 96.005988][ C0] sched: RT throttling activated [ 96.314185][ T3372] device syzkaller0 entered promiscuous mode [ 97.866528][ T3417] device syzkaller0 entered promiscuous mode [ 100.351760][ T3541] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.854931][ T3563] device syzkaller0 entered promiscuous mode [ 101.065216][ T3585] device wg2 entered promiscuous mode [ 101.393476][ T3600] device syzkaller0 entered promiscuous mode [ 101.984627][ T3624] device syzkaller0 entered promiscuous mode [ 102.104887][ T28] audit: type=1400 audit(1716899381.804:129): avc: denied { create } for pid=3641 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 102.939650][ T3667] device syzkaller0 entered promiscuous mode [ 103.167422][ T3674] syz-executor.3[3674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.167494][ T3674] syz-executor.3[3674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.217836][ T3678] syz-executor.3[3678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.312747][ T3678] syz-executor.3[3678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.952588][ T3701] device syzkaller0 entered promiscuous mode [ 105.727981][ T3750] syz-executor.1[3750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.728052][ T3750] syz-executor.1[3750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.865888][ T3753] device syzkaller0 entered promiscuous mode [ 105.991317][ T3764] device pim6reg1 entered promiscuous mode [ 106.078200][ T3776] syz-executor.4[3776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.078263][ T3776] syz-executor.4[3776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.091428][ T3776] syz-executor.4[3776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.196444][ T3776] syz-executor.4[3776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.712221][ T3796] device veth0_vlan left promiscuous mode [ 106.979206][ T3796] device veth0_vlan entered promiscuous mode [ 107.058943][ T3803] device pim6reg1 entered promiscuous mode [ 107.300335][ T3809] device syzkaller0 entered promiscuous mode [ 107.957497][ T3863] Â: renamed from pim6reg1 [ 108.443190][ T3888] device pim6reg1 entered promiscuous mode [ 108.599694][ T3895] device syzkaller0 entered promiscuous mode [ 109.023692][ T3936] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 109.299907][ T3949] bpf_get_probe_write_proto: 2 callbacks suppressed [ 109.299924][ T3949] syz-executor.1[3949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.306695][ T3949] syz-executor.1[3949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.075886][ T3977] syz-executor.0[3977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.126132][ T3977] syz-executor.0[3977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.224615][ T3981] device syzkaller0 entered promiscuous mode [ 110.294572][ T3993] device veth1_macvtap left promiscuous mode [ 110.315630][ T3993] device veth1_macvtap entered promiscuous mode [ 110.321834][ T3993] device macsec0 entered promiscuous mode [ 110.358500][ T3996] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 111.311147][ T4019] device pim6reg1 entered promiscuous mode [ 111.355764][ T28] audit: type=1400 audit(1716899391.054:130): avc: denied { setattr } for pid=4020 comm="syz-executor.2" path="/dev/net/tun" dev="devtmpfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 111.524189][ T4026] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 111.776008][ T28] audit: type=1400 audit(1716899391.474:131): avc: denied { create } for pid=4049 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 111.837163][ T4048] syz-executor.1[4048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.837230][ T4048] syz-executor.1[4048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.108091][ T4060] device syzkaller0 entered promiscuous mode [ 112.144880][ T4062] device syzkaller0 entered promiscuous mode [ 112.568876][ T4067] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 113.235837][ T4090] device syzkaller0 entered promiscuous mode [ 116.526710][ T4181] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.533566][ T4181] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.548397][ T4181] device bridge_slave_0 entered promiscuous mode [ 116.555700][ T4181] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.563357][ T4181] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.570827][ T4181] device bridge_slave_1 entered promiscuous mode [ 117.119395][ T434] device bridge_slave_1 left promiscuous mode [ 117.125363][ T434] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.232282][ T434] device bridge_slave_0 left promiscuous mode [ 117.240671][ T434] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.256794][ T434] device veth1_macvtap left promiscuous mode [ 117.262631][ T434] device veth0_vlan left promiscuous mode [ 117.421199][ T4181] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.428081][ T4181] bridge0: port 2(bridge_slave_1) entered forwarding state [ 117.435181][ T4181] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.441971][ T4181] bridge0: port 1(bridge_slave_0) entered forwarding state [ 117.480540][ T800] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.489031][ T800] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.574033][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 117.587899][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 117.607894][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 117.624840][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 117.643004][ T1040] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.649904][ T1040] bridge0: port 1(bridge_slave_0) entered forwarding state [ 117.669079][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 117.687235][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 117.704097][ T1040] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.710988][ T1040] bridge0: port 2(bridge_slave_1) entered forwarding state [ 117.763548][ T4214] device syzkaller0 entered promiscuous mode [ 117.921428][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 117.935882][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 117.960951][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 117.983418][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 118.066748][ T4181] device veth0_vlan entered promiscuous mode [ 118.099903][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 118.201680][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 118.287126][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 118.357407][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.399265][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 118.463217][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 118.536727][ T4181] device veth1_macvtap entered promiscuous mode [ 118.586371][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 118.604895][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 118.730102][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 118.871667][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 118.926599][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 118.948644][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 118.957143][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 118.974638][ T28] audit: type=1400 audit(1716899398.674:132): avc: denied { mounton } for pid=4181 comm="syz-executor.4" path="/dev/binderfs" dev="devtmpfs" ino=370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 119.523137][ T4259] device syzkaller0 entered promiscuous mode [ 119.636409][ T4260] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.643325][ T4260] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.651605][ T4260] device bridge_slave_0 entered promiscuous mode [ 119.658729][ T4260] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.665623][ T4260] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.674381][ T4260] device bridge_slave_1 entered promiscuous mode [ 119.710744][ T350] device bridge_slave_1 left promiscuous mode [ 119.719936][ T350] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.727920][ T350] device bridge_slave_0 left promiscuous mode [ 119.738340][ T350] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.759262][ T350] device veth1_macvtap left promiscuous mode [ 119.777480][ T350] device veth0_vlan left promiscuous mode [ 120.130957][ T4260] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.137864][ T4260] bridge0: port 2(bridge_slave_1) entered forwarding state [ 120.144943][ T4260] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.151845][ T4260] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.248490][ T4226] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.266808][ T4226] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.337465][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.344865][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.543364][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 120.560416][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.567308][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.575105][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 120.597369][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.604223][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 120.629492][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 120.656467][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 120.685855][ T4260] device veth0_vlan entered promiscuous mode [ 120.724209][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 120.740813][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.762153][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 120.808305][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 121.000592][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 121.012300][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 121.049644][ T4260] device veth1_macvtap entered promiscuous mode [ 121.083812][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 121.094784][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 121.117781][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 121.141965][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 121.163416][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 122.572438][ T4343] device syzkaller0 entered promiscuous mode [ 123.716286][ T4387] device syzkaller0 entered promiscuous mode [ 125.318367][ T4437] device syzkaller0 entered promiscuous mode [ 125.371909][ T4439] device syzkaller0 entered promiscuous mode [ 126.837164][ T4482] device syzkaller0 entered promiscuous mode [ 126.977641][ T4491] bridge0: port 3(dummy0) entered disabled state [ 126.983876][ T4491] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.990815][ T4491] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.183469][ T4511] device syzkaller0 entered promiscuous mode [ 128.791749][ T4550] device syzkaller0 entered promiscuous mode [ 129.664948][ T4591] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.672003][ T4591] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.700457][ T4590] device syzkaller0 entered promiscuous mode [ 130.946427][ T4623] device syzkaller0 entered promiscuous mode [ 131.025443][ T4636] device pim6reg1 entered promiscuous mode [ 131.096674][ T4636] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 132.168747][ T4665] device syzkaller0 entered promiscuous mode [ 132.252103][ T4674] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.258990][ T4674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.266110][ T4674] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.272960][ T4674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.280886][ T4674] device bridge0 entered promiscuous mode [ 132.868024][ T4698] device syzkaller0 entered promiscuous mode [ 133.257694][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.365313][ T4712] syz-executor.3[4712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.365359][ T4712] syz-executor.3[4712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.399919][ T4712] syz-executor.3[4712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.416089][ T4712] syz-executor.3[4712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.697182][ T4731] device syzkaller0 entered promiscuous mode [ 134.853611][ T4769] device syzkaller0 entered promiscuous mode [ 134.883689][ T4773] device syzkaller0 entered promiscuous mode [ 135.405089][ T4816] device syzkaller0 entered promiscuous mode [ 135.600206][ T4824] device syzkaller0 entered promiscuous mode [ 136.267370][ T4860] device syzkaller0 entered promiscuous mode [ 137.476292][ T4902] device syzkaller0 entered promiscuous mode [ 138.569095][ T4955] device syzkaller0 entered promiscuous mode [ 139.624648][ T4986] device syzkaller0 entered promiscuous mode [ 140.245935][ T5000] device syzkaller0 entered promiscuous mode [ 141.958315][ T5032] device syzkaller0 entered promiscuous mode [ 142.553117][ T5045] device syzkaller0 entered promiscuous mode [ 142.634905][ T5047] tap0: tun_chr_ioctl cmd 1074025677 [ 142.688375][ T5047] tap0: linktype set to 804 [ 144.198477][ T5087] device syzkaller0 entered promiscuous mode [ 145.254552][ T5131] device syzkaller0 entered promiscuous mode [ 145.775552][ T5169] device syzkaller0 entered promiscuous mode [ 147.028560][ T5218] device syzkaller0 entered promiscuous mode [ 147.067541][ T5226] syz-executor.3[5226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.067611][ T5226] syz-executor.3[5226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.085547][ T5219] Â: renamed from pim6reg1 [ 148.335790][ T5266] device syzkaller0 entered promiscuous mode [ 148.375017][ T5265] device syzkaller0 entered promiscuous mode [ 148.417046][ T5278] bridge0: port 3(dummy0) entered disabled state [ 148.426960][ T5278] device bridge_slave_1 left promiscuous mode [ 148.433639][ T5278] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.441524][ T5278] device bridge_slave_0 left promiscuous mode [ 148.447740][ T5278] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.571869][ T5284] device bridge_slave_1 left promiscuous mode [ 148.579392][ T5284] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.601050][ T5284] device bridge_slave_0 left promiscuous mode [ 148.610032][ T5284] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.871145][ T5317] syz-executor.3[5317] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.871217][ T5317] syz-executor.3[5317] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.952584][ T5320] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 148.977585][ T5318] device veth1_macvtap left promiscuous mode [ 148.991956][ T5318] device veth1_macvtap entered promiscuous mode [ 149.016008][ T5318] device macsec0 entered promiscuous mode [ 149.036983][ T5323] device syzkaller0 entered promiscuous mode [ 149.376660][ T5329] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.383596][ T5329] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.576983][ T5329] device bridge0 left promiscuous mode [ 149.666824][ T5335] device bridge_slave_1 left promiscuous mode [ 149.674662][ T5335] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.696556][ T5335] device bridge_slave_0 left promiscuous mode [ 149.702653][ T5335] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.801646][ T5339] device syzkaller0 entered promiscuous mode [ 149.837661][ T5355] syz-executor.0[5355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.837726][ T5355] syz-executor.0[5355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.920061][ T5363] device veth1_macvtap left promiscuous mode [ 149.937491][ T5363] device macsec0 left promiscuous mode [ 150.071965][ T5365] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.079001][ T5365] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.162454][ T5355] device veth1_macvtap entered promiscuous mode [ 150.171037][ T5355] device macsec0 entered promiscuous mode [ 150.235302][ T5371] device bridge_slave_1 left promiscuous mode [ 150.364653][ T5371] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.372360][ T5371] device bridge_slave_0 left promiscuous mode [ 150.378659][ T5371] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.911722][ T5392] syz-executor.1[5392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.911817][ T5392] syz-executor.1[5392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.204448][ T5413] syz-executor.4[5413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.217676][ T5413] syz-executor.4[5413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.467373][ T5421] device veth1_macvtap left promiscuous mode [ 151.594785][ T5427] device veth1_macvtap entered promiscuous mode [ 151.611694][ T5427] device macsec0 entered promiscuous mode [ 151.878599][ T5450] device pim6reg1 entered promiscuous mode [ 153.639066][ T5503] syz-executor.3[5503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.639134][ T5503] syz-executor.3[5503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.859299][ T5543] device syzkaller0 entered promiscuous mode [ 154.896057][ T28] audit: type=1400 audit(1716899434.594:133): avc: denied { create } for pid=5546 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 154.918176][ T5548] device pim6reg1 entered promiscuous mode [ 155.973550][ T5573] device syzkaller0 entered promiscuous mode [ 157.229739][ T5627] syz-executor.3[5627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.229807][ T5627] syz-executor.3[5627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.458702][ T5663] device syzkaller0 entered promiscuous mode [ 160.499841][ T5697] device syzkaller0 entered promiscuous mode [ 162.590604][ T5760] device syzkaller0 entered promiscuous mode [ 162.755141][ T5762] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 162.970255][ T5787] device syzkaller0 entered promiscuous mode [ 163.029061][ T5783] device syzkaller0 entered promiscuous mode [ 163.881307][ T5807] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 164.202915][ T5819] device syzkaller0 entered promiscuous mode [ 164.393878][ T5824] device syzkaller0 entered promiscuous mode [ 164.854881][ T5859] device syzkaller0 entered promiscuous mode [ 166.186005][ T5889] device syzkaller0 entered promiscuous mode [ 167.321832][ T5931] device syzkaller0 entered promiscuous mode [ 168.822639][ T5972] device syzkaller0 entered promiscuous mode [ 170.331152][ T6023] device syzkaller0 entered promiscuous mode [ 171.875939][ T6063] device syzkaller0 entered promiscuous mode [ 173.561352][ T6107] device syzkaller0 entered promiscuous mode [ 175.074541][ T28] audit: type=1400 audit(1716899454.774:134): avc: denied { write } for pid=6175 comm="syz-executor.0" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 175.277276][ T28] audit: type=1400 audit(1716899454.984:135): avc: denied { remove_name } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 175.340900][ T28] audit: type=1400 audit(1716899454.984:136): avc: denied { rename } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 175.942581][ T6209] device wg2 left promiscuous mode [ 175.975930][ T6209] device wg2 entered promiscuous mode [ 178.496844][ T6274] device syzkaller0 entered promiscuous mode [ 179.348927][ T6301] device syzkaller0 entered promiscuous mode [ 179.704787][ T6327] device syzkaller0 entered promiscuous mode [ 180.081984][ T6337] device syzkaller0 entered promiscuous mode [ 180.228976][ T28] audit: type=1400 audit(1716899459.934:137): avc: denied { create } for pid=6340 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 180.512578][ T6361] device syzkaller0 entered promiscuous mode [ 180.824166][ T6378] device syzkaller0 entered promiscuous mode [ 180.882107][ T6384] device syzkaller0 entered promiscuous mode [ 181.310639][ T6397] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.317622][ T6397] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.325021][ T6397] device bridge_slave_0 entered promiscuous mode [ 181.331976][ T6397] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.342047][ T6397] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.351124][ T6397] device bridge_slave_1 entered promiscuous mode [ 181.598329][ T6397] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.605212][ T6397] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.612303][ T6397] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.619090][ T6397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.752977][ T6421] device syzkaller0 entered promiscuous mode [ 181.823119][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.831824][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.858545][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.884545][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 181.905586][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 181.948425][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 181.966148][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.978152][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.010974][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.027231][ T6397] device veth0_vlan entered promiscuous mode [ 182.041012][ T6397] device veth1_macvtap entered promiscuous mode [ 182.048123][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 182.061578][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 182.072032][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 182.176548][ T434] device bridge_slave_1 left promiscuous mode [ 182.186136][ T434] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.193642][ T434] device bridge_slave_0 left promiscuous mode [ 182.201050][ T434] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.209668][ T434] device veth1_macvtap left promiscuous mode [ 182.215630][ T434] device veth0_vlan left promiscuous mode [ 182.540152][ T6464] device syzkaller0 entered promiscuous mode [ 184.265455][ T6536] device pim6reg1 entered promiscuous mode [ 184.939157][ T6586] device syzkaller0 entered promiscuous mode [ 185.311122][ T6616] device syzkaller0 entered promiscuous mode [ 185.363143][ T6624] device syzkaller0 entered promiscuous mode [ 185.671232][ T6640] device syzkaller0 entered promiscuous mode [ 185.684371][ T6642] device syzkaller0 entered promiscuous mode [ 185.730207][ T6650] device wg2 entered promiscuous mode [ 185.862529][ T6680] device syzkaller0 entered promiscuous mode [ 187.262197][ T6746] device syzkaller0 entered promiscuous mode [ 187.803315][ T6788] device syzkaller0 entered promiscuous mode [ 187.920905][ T6797] device syzkaller0 entered promiscuous mode [ 188.182275][ T6813] device syzkaller0 entered promiscuous mode [ 188.996042][ T6852] device syzkaller0 entered promiscuous mode [ 190.771282][ T6924] device syzkaller0 entered promiscuous mode [ 190.859875][ T6927] device syzkaller0 entered promiscuous mode [ 191.899649][ T6964] device syzkaller0 entered promiscuous mode [ 191.918758][ T6962] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.926023][ T6962] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.933745][ T6962] device bridge_slave_0 entered promiscuous mode [ 191.950504][ T6962] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.957459][ T6962] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.964648][ T6962] device bridge_slave_1 entered promiscuous mode [ 191.972030][ T434] device veth1_macvtap left promiscuous mode [ 191.979486][ T434] device veth0_vlan left promiscuous mode [ 192.176111][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.183411][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.200480][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.209607][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.217862][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.225105][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.232364][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.240522][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.248653][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.255535][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.264630][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.272321][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.376439][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 192.386406][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.395978][ T6962] device veth0_vlan entered promiscuous mode [ 192.436715][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 192.447130][ T6962] device veth1_macvtap entered promiscuous mode [ 192.483703][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 192.499686][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 192.511435][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 192.673616][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 192.687118][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 193.108358][ T7005] device veth0_vlan left promiscuous mode [ 193.132705][ T7005] device veth0_vlan entered promiscuous mode [ 193.292397][ T7011] device syzkaller0 entered promiscuous mode [ 194.517166][ T7055] device syzkaller0 entered promiscuous mode [ 194.588633][ T7059] device syzkaller0 entered promiscuous mode [ 194.735081][ T28] audit: type=1400 audit(1716899474.434:138): avc: denied { create } for pid=7070 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 194.842441][ T7078] device syzkaller0 entered promiscuous mode [ 194.916685][ T7084] device syzkaller0 entered promiscuous mode [ 195.096971][ T7086] device syzkaller0 entered promiscuous mode [ 195.792812][ T7101] device syzkaller0 entered promiscuous mode [ 196.087293][ T7134] device veth1_macvtap left promiscuous mode [ 196.984676][ T7152] device syzkaller0 entered promiscuous mode [ 197.619796][ T7195] device syzkaller0 entered promiscuous mode [ 198.783897][ T7229] device syzkaller0 entered promiscuous mode [ 198.802451][ T7242] device veth1_macvtap left promiscuous mode [ 198.822398][ T7242] device macsec0 left promiscuous mode [ 199.211289][ T7272] ªªªªª»: renamed from macsec0 [ 199.455370][ T7292] device veth1_macvtap left promiscuous mode [ 200.153096][ T7320] geneve1: tun_chr_ioctl cmd 1074025681 [ 200.439165][ T7324] device syzkaller0 entered promiscuous mode [ 201.382693][ T7377] geneve1: tun_chr_ioctl cmd 1074025681 [ 201.569678][ T7380] syz-executor.4[7380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.569749][ T7380] syz-executor.4[7380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.337950][ T7436] geneve1: tun_chr_ioctl cmd 1074025681 [ 203.785730][ T7450] device veth1_macvtap left promiscuous mode [ 203.794734][ T7450] device macsec0 left promiscuous mode [ 204.405675][ T7486] geneve1: tun_chr_ioctl cmd 1074025681 [ 206.547079][ T7560] device syzkaller0 entered promiscuous mode [ 207.499551][ T7590] device syzkaller0 entered promiscuous mode [ 207.644839][ T7586] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.666043][ T7586] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.684720][ T7586] device bridge_slave_0 entered promiscuous mode [ 207.695496][ T7586] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.704970][ T7586] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.712801][ T7586] device bridge_slave_1 entered promiscuous mode [ 207.878515][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 207.896682][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.916232][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.931037][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.943485][ T4354] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.950363][ T4354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.957936][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.974731][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.002556][ T4354] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.009441][ T4354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.089890][ T43] device bridge_slave_1 left promiscuous mode [ 208.097215][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.146344][ T43] device bridge_slave_0 left promiscuous mode [ 208.152299][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.171767][ T43] device veth0_vlan left promiscuous mode [ 208.359556][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 208.367877][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.375618][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 208.384113][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 208.395687][ T7586] device veth0_vlan entered promiscuous mode [ 208.840328][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.850465][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 208.858134][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.878605][ T7586] device veth1_macvtap entered promiscuous mode [ 208.885079][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 208.893619][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 208.901799][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 209.072079][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 209.084246][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 209.103816][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 209.122498][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 210.531754][ T7690] device syzkaller0 entered promiscuous mode [ 211.204260][ T7740] device syzkaller0 entered promiscuous mode [ 211.220351][ T7734] device syzkaller0 entered promiscuous mode [ 212.486595][ T7775] device syzkaller0 entered promiscuous mode [ 212.523037][ T7777] device syzkaller0 entered promiscuous mode [ 212.778148][ T7801] device syzkaller0 entered promiscuous mode [ 213.414962][ T7841] device syzkaller0 entered promiscuous mode [ 213.869663][ T7849] device syzkaller0 entered promiscuous mode [ 214.309325][ T7872] device syzkaller0 entered promiscuous mode [ 214.710883][ T7884] device veth1_macvtap left promiscuous mode [ 215.250237][ T7903] device syzkaller0 entered promiscuous mode [ 215.343625][ T7908] device syzkaller0 entered promiscuous mode [ 215.654057][ T7929] device syzkaller0 entered promiscuous mode [ 216.227999][ T7947] device syzkaller0 entered promiscuous mode [ 216.621828][ T7958] device syzkaller0 entered promiscuous mode [ 217.529607][ T7979] device syzkaller0 entered promiscuous mode [ 218.384502][ T8012] device syzkaller0 entered promiscuous mode [ 218.772464][ T8018] device syzkaller0 entered promiscuous mode [ 219.520189][ T8046] device syzkaller0 entered promiscuous mode [ 219.887877][ T8074] device veth0_vlan left promiscuous mode [ 219.894095][ T8074] device veth0_vlan entered promiscuous mode [ 219.919072][ T8076] device syzkaller0 entered promiscuous mode [ 219.949346][ T8074] device syzkaller0 entered promiscuous mode [ 220.160994][ T8110] device syzkaller0 entered promiscuous mode [ 220.340386][ T8122] device veth0_vlan left promiscuous mode [ 220.346671][ T8122] device veth0_vlan entered promiscuous mode [ 220.386632][ T8122] device syzkaller0 entered promiscuous mode [ 220.493334][ T8141] device sit0 entered promiscuous mode [ 220.579633][ T8145] device syzkaller0 entered promiscuous mode [ 220.608066][ T8151] device pim6reg1 entered promiscuous mode [ 220.993374][ T8172] device veth0_vlan left promiscuous mode [ 220.999852][ T8172] device veth0_vlan entered promiscuous mode [ 221.051871][ T8172] device syzkaller0 entered promiscuous mode [ 221.289733][ T8201] device sit0 entered promiscuous mode [ 221.631134][ T8237] device syzkaller0 entered promiscuous mode [ 222.843878][ T8280] device syzkaller0 entered promiscuous mode [ 222.902683][ T8282] device sit0 left promiscuous mode [ 222.937398][ T8282] device sit0 entered promiscuous mode [ 223.332147][ T8290] syz-executor.3[8290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.332219][ T8290] syz-executor.3[8290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.866563][ T8294] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.939796][ T8294] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.991252][ T8294] device bridge_slave_0 entered promiscuous mode [ 224.024085][ T8294] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.030992][ T8294] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.038264][ T8294] device bridge_slave_1 entered promiscuous mode [ 224.181268][ T8309] device syzkaller0 entered promiscuous mode [ 224.282432][ T8294] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.289330][ T8294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.497305][ T4226] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.506962][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.520911][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.548549][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.558983][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.569590][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.576481][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.583910][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.593430][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.600312][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.621980][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.629896][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.651998][ T8294] device veth0_vlan entered promiscuous mode [ 224.668044][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.675901][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.683882][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.700383][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 224.722514][ T8294] device veth1_macvtap entered promiscuous mode [ 224.729197][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 224.737760][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 224.745914][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 224.762676][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 224.771382][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 224.809690][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 224.817880][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 226.816438][ T8403] device syzkaller0 entered promiscuous mode [ 230.345307][ T8537] device syzkaller0 entered promiscuous mode [ 231.258304][ T8559] device veth1_macvtap left promiscuous mode [ 232.596267][ T8621] device syzkaller0 entered promiscuous mode [ 232.666333][ T8624] device syzkaller0 entered promiscuous mode [ 233.032553][ T8660] device syzkaller0 entered promiscuous mode [ 233.964098][ T8734] device syzkaller0 entered promiscuous mode [ 234.734174][ T8793] syz-executor.2[8793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.734275][ T8793] syz-executor.2[8793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.503201][ T8840] syz-executor.4[8840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.574053][ T8840] syz-executor.4[8840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.056383][ T8848] device syzkaller0 entered promiscuous mode [ 236.176471][ T8858] bridge0: port 3(veth1_macvtap) entered blocking state [ 236.190091][ T8858] bridge0: port 3(veth1_macvtap) entered disabled state [ 237.252039][ T8876] tun0: tun_chr_ioctl cmd 1074025677 [ 237.285414][ T8876] tun0: linktype set to 805 [ 237.477402][ T8294] syz-executor.1 (8294) used greatest stack depth: 20536 bytes left [ 237.556717][ T4260] syz-executor.4 (4260) used greatest stack depth: 19872 bytes left [ 237.623559][ T8881] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.630481][ T8881] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.638463][ T8881] device bridge_slave_0 entered promiscuous mode [ 237.655241][ T8882] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.662613][ T8882] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.669897][ T8882] device bridge_slave_0 entered promiscuous mode [ 237.679157][ T8882] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.686172][ T8882] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.693425][ T8882] device bridge_slave_1 entered promiscuous mode [ 237.700141][ T8881] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.707616][ T8881] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.714863][ T8881] device bridge_slave_1 entered promiscuous mode [ 237.851795][ T8891] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.858763][ T8891] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.865886][ T8891] device bridge_slave_0 entered promiscuous mode [ 237.881524][ T8891] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.888423][ T8891] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.895482][ T8891] device bridge_slave_1 entered promiscuous mode [ 237.902257][ T8882] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.909103][ T8882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.916175][ T8882] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.922974][ T8882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.932538][ T8892] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.939537][ T8892] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.946697][ T8892] device bridge_slave_0 entered promiscuous mode [ 237.954661][ T8892] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.961561][ T8892] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.968776][ T8892] device bridge_slave_1 entered promiscuous mode [ 238.024193][ T8881] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.031055][ T8881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.038141][ T8881] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.044926][ T8881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.071229][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.078790][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.085848][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.093347][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.101611][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.129672][ T434] device veth0_vlan left promiscuous mode [ 238.161073][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.169157][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.175993][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.185300][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.193163][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.233182][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.240779][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.253452][ T8882] device veth0_vlan entered promiscuous mode [ 238.262343][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 238.270662][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 238.278742][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 238.286578][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.294244][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.302327][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.310491][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.317335][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.324693][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.331978][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.349393][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.357693][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.365684][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.372548][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.386788][ T8882] device veth1_macvtap entered promiscuous mode [ 238.396773][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.404658][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.412443][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.420667][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.428396][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 238.436278][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 238.444094][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 238.462070][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 238.470388][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 238.478543][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 238.486201][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.494891][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.502190][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.512176][ T8881] device veth0_vlan entered promiscuous mode [ 238.523732][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 238.532210][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 238.540331][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 238.548334][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 238.572275][ T8881] device veth1_macvtap entered promiscuous mode [ 238.588949][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 238.597976][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 238.606082][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 238.613422][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.620986][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.628191][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.635325][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.642488][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.650545][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.658461][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.665277][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.672445][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.680491][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.688462][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.695285][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.703034][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.710861][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.718580][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.726431][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.734415][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.753251][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.761573][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.770308][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.777165][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.784486][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.792545][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.800453][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.807280][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.814393][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.822258][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.829939][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 238.837917][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 238.845966][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 238.854014][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 238.862550][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.898137][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.907256][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.915041][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 238.923122][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 238.937236][ T8891] device veth0_vlan entered promiscuous mode [ 238.943894][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.966796][ T8903] device syzkaller0 entered promiscuous mode [ 238.977309][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.984618][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.993266][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 239.001448][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.014771][ T8892] device veth0_vlan entered promiscuous mode [ 239.043326][ T8891] device veth1_macvtap entered promiscuous mode [ 239.051630][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 239.063860][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 239.071731][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 239.104354][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 239.111628][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 239.119145][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 239.127322][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 239.135555][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 239.143996][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 239.164256][ T8892] device veth1_macvtap entered promiscuous mode [ 239.173105][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 239.200786][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 239.210858][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 239.234541][ T8918] syz-executor.1[8918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.234604][ T8918] syz-executor.1[8918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.235834][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 239.265842][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 239.315858][ T8927] syz-executor.4[8927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.316854][ T8927] syz-executor.4[8927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.428113][ T8934] tun0: tun_chr_ioctl cmd 1074025677 [ 239.477425][ T8934] tun0: linktype set to 805 [ 239.709300][ T434] device bridge_slave_1 left promiscuous mode [ 239.722327][ T434] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.791602][ T434] device bridge_slave_0 left promiscuous mode [ 239.834157][ T434] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.889468][ T434] device bridge_slave_1 left promiscuous mode [ 239.934294][ T434] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.984582][ T434] device bridge_slave_0 left promiscuous mode [ 240.036715][ T434] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.108962][ T434] device veth0_vlan left promiscuous mode [ 240.177111][ T434] device veth0_vlan left promiscuous mode [ 240.880543][ T8983] device veth1_macvtap left promiscuous mode [ 242.532484][ T9051] device veth1_macvtap left promiscuous mode [ 248.092454][ T9220] device veth1_macvtap left promiscuous mode [ 248.707158][ T9256] device veth1_macvtap left promiscuous mode [ 250.468510][ T9307] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.525045][ T9307] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.548172][ T9307] device bridge_slave_0 entered promiscuous mode [ 250.559811][ T9321] syz-executor.2[9321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.559873][ T9321] syz-executor.2[9321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.590894][ T9307] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.643434][ T9307] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.652205][ T9307] device bridge_slave_1 entered promiscuous mode [ 251.680558][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.711344][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.782172][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 251.795149][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.808273][ T1040] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.815159][ T1040] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.830558][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 251.840857][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.848926][ T1040] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.855760][ T1040] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.863073][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.870896][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.878609][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 251.886409][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.894367][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.916839][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 251.925066][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 251.942724][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 251.951839][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 251.960617][ T9307] device veth0_vlan entered promiscuous mode [ 251.971597][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 251.980084][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 252.015658][ T9307] device veth1_macvtap entered promiscuous mode [ 252.022326][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 252.030662][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 252.039256][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 252.055310][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 252.063541][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 252.071798][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 252.079984][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 252.551168][ T10] device bridge_slave_1 left promiscuous mode [ 252.570842][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.661551][ T10] device bridge_slave_0 left promiscuous mode [ 252.695709][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.705332][ T10] device veth0_vlan left promiscuous mode [ 253.214264][ T9388] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.252597][ T9388] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.308102][ T9388] device bridge_slave_0 entered promiscuous mode [ 253.349373][ T9388] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.393818][ T9388] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.442004][ T9388] device bridge_slave_1 entered promiscuous mode [ 253.850683][ T9388] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.857568][ T9388] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.864736][ T9388] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.871549][ T9388] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.291822][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.310162][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.543984][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.557824][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.579856][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.588262][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.596320][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.603175][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.610517][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.619273][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.627364][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.634216][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.641458][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.670549][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.678416][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.686649][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.715881][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 254.728537][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 254.745747][ T9388] device veth0_vlan entered promiscuous mode [ 254.763820][ T9469] device pim6reg1 entered promiscuous mode [ 254.774899][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.784989][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.814607][ T9388] device veth1_macvtap entered promiscuous mode [ 254.826976][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.836327][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.843742][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 254.853268][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.864470][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.919281][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 254.938544][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 254.956612][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 254.988626][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.940985][ T9516] device syzkaller0 entered promiscuous mode [ 260.956809][ T10] device bridge_slave_1 left promiscuous mode [ 260.962795][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.010005][ T10] device bridge_slave_0 left promiscuous mode [ 261.016058][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.025088][ T10] device veth0_vlan left promiscuous mode [ 261.546940][ T9701] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.568300][ T9701] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.583710][ T9701] device bridge_slave_0 entered promiscuous mode [ 261.590834][ T9701] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.597774][ T9701] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.604945][ T9701] device bridge_slave_1 entered promiscuous mode [ 262.078267][ T9701] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.085129][ T9701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.092261][ T9701] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.099037][ T9701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.726332][ T1040] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.733819][ T1040] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.855899][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.906368][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.936941][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 263.000717][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 263.075706][ T801] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.082609][ T801] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.171185][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 263.179938][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 263.188346][ T801] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.195314][ T801] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.202999][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 263.219031][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 263.235604][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 263.252415][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 263.276236][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 263.294416][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 263.368824][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 263.443961][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.519701][ T9701] device veth0_vlan entered promiscuous mode [ 263.532520][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 263.552784][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 263.616523][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 263.631257][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 263.667148][ T9701] device veth1_macvtap entered promiscuous mode [ 263.694925][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 263.713810][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 263.733616][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 263.767459][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 263.785127][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 264.887146][ T9859] syz-executor.0[9859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.887182][ T9860] syz-executor.0[9860] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.887235][ T9859] syz-executor.0[9859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.038156][ T9903] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 266.586450][ T9917] device veth1_macvtap left promiscuous mode [ 267.870394][ T9957] device pim6reg1 entered promiscuous mode [ 272.835336][T10167] device veth1_macvtap left promiscuous mode [ 272.865881][T10167] device veth1_macvtap entered promiscuous mode [ 272.884796][T10167] device macsec0 entered promiscuous mode [ 272.937136][T10171] device veth0_vlan left promiscuous mode [ 272.946125][T10171] device veth0_vlan entered promiscuous mode [ 274.078744][T10214] device veth1_macvtap left promiscuous mode [ 274.089847][T10214] device veth1_macvtap entered promiscuous mode [ 274.096113][T10214] device macsec0 entered promiscuous mode [ 282.356903][T10408] device veth1_macvtap left promiscuous mode [ 282.405809][T10408] device macsec0 left promiscuous mode [ 291.413293][T10669] device veth1_macvtap left promiscuous mode [ 291.431558][T10669] device macsec0 left promiscuous mode [ 294.909691][ T28] audit: type=1400 audit(1716899574.574:139): avc: denied { create } for pid=10772 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 295.493446][ T28] audit: type=1400 audit(1716899575.174:140): avc: denied { read } for pid=10806 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 295.636099][ T28] audit: type=1400 audit(1716899575.224:141): avc: denied { write } for pid=10806 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 296.335729][T10821] syz-executor.4[10821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.335795][T10821] syz-executor.4[10821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.494142][T11005] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.521390][T11005] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.532034][T11005] device bridge_slave_0 entered promiscuous mode [ 302.544760][T11005] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.555042][T11005] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.565676][T11005] device bridge_slave_1 entered promiscuous mode [ 303.397343][ T434] device bridge_slave_1 left promiscuous mode [ 303.422191][ T434] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.467930][ T434] device bridge_slave_0 left promiscuous mode [ 303.480449][ T434] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.721099][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 303.731774][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.766562][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 303.792206][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.817958][ T4354] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.824834][ T4354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.861364][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 303.886583][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.912171][ T4354] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.919076][ T4354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.956657][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 303.979881][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.004096][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 304.029441][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.063094][T11005] device veth0_vlan entered promiscuous mode [ 304.154058][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 304.184793][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 304.193719][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 304.202318][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 304.215002][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 304.242041][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 304.258253][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 304.282285][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 304.311876][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 304.329633][T11005] device veth1_macvtap entered promiscuous mode [ 304.718060][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 304.739659][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 304.794278][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 304.850833][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 308.029608][T11166] device veth1_macvtap left promiscuous mode [ 314.271293][T11329] device syzkaller0 entered promiscuous mode [ 314.778006][T11359] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 319.015286][ T9388] syz-executor.1 (9388) used greatest stack depth: 19512 bytes left [ 319.474276][ T28] audit: type=1400 audit(1716899599.174:142): avc: denied { setopt } for pid=11474 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 319.568043][ T7792] device bridge_slave_1 left promiscuous mode [ 319.574019][ T7792] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.625494][ T7792] device bridge_slave_0 left promiscuous mode [ 319.635447][ T7792] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.652015][ T7792] device veth0_vlan left promiscuous mode [ 319.981051][T11482] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.051209][T11482] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.138187][T11482] device bridge_slave_0 entered promiscuous mode [ 320.261738][T11482] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.297767][T11482] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.306034][T11482] device bridge_slave_1 entered promiscuous mode [ 321.015174][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.082550][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.199839][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 321.225587][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 321.239336][ T1040] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.246227][ T1040] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.412334][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 321.496728][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 321.504752][ T1040] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.511619][ T1040] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.552140][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 321.560094][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 321.585321][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 321.755706][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 321.777625][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 321.785819][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 321.880938][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 321.888991][T11482] device veth0_vlan entered promiscuous mode [ 321.895502][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 321.902989][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 321.914120][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 321.922408][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 321.967779][T11482] device veth1_macvtap entered promiscuous mode [ 321.991932][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 322.000718][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 322.045051][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 322.122370][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 322.147759][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 322.336356][T11545] syz-executor.1[11545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.336415][T11545] syz-executor.1[11545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.424561][T11579] syz-executor.4[11579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.477987][T11579] syz-executor.4[11579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.276404][T11603] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 325.616308][T11649] syz-executor.4[11649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.616381][T11649] syz-executor.4[11649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.468174][ T28] audit: type=1400 audit(1716899606.174:143): avc: denied { create } for pid=11680 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 326.700062][T11681] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.707253][T11681] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.718132][T11685] device bridge_slave_1 left promiscuous mode [ 326.735470][T11685] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.746601][T11685] device bridge_slave_0 left promiscuous mode [ 326.758695][T11685] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.748085][T11735] syz-executor.1[11735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.748155][T11735] syz-executor.1[11735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.824256][T11741] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.842802][T11741] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.864122][T11741] device bridge_slave_1 left promiscuous mode [ 327.871479][T11741] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.879257][T11741] device bridge_slave_0 left promiscuous mode [ 327.902389][T11741] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.040807][T11788] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.047998][T11788] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.196202][T11796] device bridge_slave_1 left promiscuous mode [ 329.210868][T11795] EXT4-fs warning (device sda1): ext4_group_extend:1870: need to use ext2online to resize further [ 329.254859][T11796] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.311815][T11796] device bridge_slave_0 left promiscuous mode [ 329.317929][T11796] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.604919][ T28] audit: type=1400 audit(1716899611.304:144): avc: denied { create } for pid=11904 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 331.659903][T11905] device veth0_vlan left promiscuous mode [ 331.671495][T11905] device veth0_vlan entered promiscuous mode [ 334.928455][ T28] audit: type=1400 audit(1716899614.634:145): avc: denied { create } for pid=11994 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 338.969098][T12112] device pim6reg1 entered promiscuous mode [ 343.089714][T12197] device veth0_vlan left promiscuous mode [ 343.095739][T12197] device veth0_vlan entered promiscuous mode [ 343.168676][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 343.182839][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 343.197322][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 345.096945][T12272] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 345.396009][T12296] device geneve1 entered promiscuous mode [ 345.508763][T12298] geneve1: tun_chr_ioctl cmd 1074025677 [ 345.541758][T12298] geneve1: Linktype set failed because interface is up [ 346.446813][T12316] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 346.725282][T12321] device veth0_vlan left promiscuous mode [ 346.736498][T12321] device veth0_vlan entered promiscuous mode [ 347.125972][T12341] »»»»»»: renamed from wg2 [ 347.329505][T12347] »»»»»»: renamed from wg2 [ 347.761426][T12375] »»»»»»: renamed from wg2 [ 350.884676][T12470] »»»»»»: renamed from wg2 [ 356.770515][ T28] audit: type=1400 audit(1716899636.474:146): avc: denied { create } for pid=12666 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 357.995999][T12707] »»»»»»: renamed from wg2 [ 361.722735][T12857] device syzkaller0 entered promiscuous mode [ 361.862952][ T28] audit: type=1400 audit(1716899641.564:147): avc: denied { create } for pid=12878 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 371.048714][T13209] syz-executor.1[13209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.048822][T13209] syz-executor.1[13209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.829029][T13435] device veth1_macvtap entered promiscuous mode [ 374.985982][T13435] device macsec0 entered promiscuous mode [ 375.170692][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 375.287221][T13452] device pim6reg1 entered promiscuous mode [ 375.508956][T13467] device veth1_macvtap entered promiscuous mode [ 375.527259][T13467] device macsec0 entered promiscuous mode [ 375.539000][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 375.810258][ T28] audit: type=1400 audit(1716899655.514:148): avc: denied { create } for pid=13481 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 375.917162][T13492] syz-executor.2[13492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.917230][T13492] syz-executor.2[13492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.968424][T13494] device pim6reg1 entered promiscuous mode [ 376.015951][T13496] device pim6reg1 entered promiscuous mode [ 376.444061][T13529] device pim6reg1 entered promiscuous mode [ 376.753108][T13569] device pim6reg1 entered promiscuous mode [ 377.256429][T13615] device pim6reg1 entered promiscuous mode [ 378.326610][T13644] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.337927][T13644] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.347223][T13652] EXT4-fs warning (device sda1): ext4_group_extend:1862: can't shrink FS - resize aborted [ 378.381954][T13644] device bridge_slave_0 entered promiscuous mode [ 378.406616][T13644] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.423543][T13644] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.434226][T13644] device bridge_slave_1 entered promiscuous mode [ 378.445604][T13653] device veth1_macvtap left promiscuous mode [ 378.452715][T13653] device macsec0 left promiscuous mode [ 378.496461][T13652] device veth1_macvtap entered promiscuous mode [ 378.510211][T13652] device macsec0 entered promiscuous mode [ 378.681354][ T10] device veth1_macvtap left promiscuous mode [ 378.695476][ T10] device veth0_vlan left promiscuous mode [ 379.264762][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 379.275628][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 379.404453][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 379.436475][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 379.468492][ T4354] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.475371][ T4354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 379.483127][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 379.492711][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 379.500816][ T4354] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.507686][ T4354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 379.529958][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 379.546124][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 379.554100][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 379.562494][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 379.601585][T13692] device syzkaller0 entered promiscuous mode [ 379.608769][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 379.624455][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 379.633335][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 379.643733][T13644] device veth0_vlan entered promiscuous mode [ 379.652106][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 379.677035][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 379.684455][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 379.841028][T13644] device veth1_macvtap entered promiscuous mode [ 379.883175][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 379.920853][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 379.945000][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 380.045425][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 380.077536][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 381.472378][T13782] device pim6reg1 entered promiscuous mode [ 382.678910][T13818] device veth1_macvtap left promiscuous mode [ 382.684776][T13818] device macsec0 left promiscuous mode [ 382.806275][T13830] device veth1_macvtap entered promiscuous mode [ 382.892152][T13830] device macsec0 entered promiscuous mode [ 383.349173][T13818] device syzkaller0 entered promiscuous mode [ 383.956831][T13898] veth0_vlan: mtu less than device minimum [ 384.000507][ T28] audit: type=1400 audit(1716899663.704:149): avc: denied { create } for pid=13902 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 384.064811][T13910] device veth1_macvtap left promiscuous mode [ 385.046183][T14003] device veth1_macvtap left promiscuous mode [ 385.054348][T14003] device macsec0 left promiscuous mode [ 385.085666][T14003] device veth1_macvtap entered promiscuous mode [ 385.104795][T14003] device macsec0 entered promiscuous mode [ 385.201368][T14008] device syzkaller0 entered promiscuous mode [ 385.856006][T14041] device veth1_macvtap entered promiscuous mode [ 385.866554][T14041] device macsec0 entered promiscuous mode [ 385.878171][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 385.968590][T14041] device syzkaller0 entered promiscuous mode [ 388.215052][T14124] device veth0_vlan left promiscuous mode [ 388.222346][T14124] device veth0_vlan entered promiscuous mode [ 388.826341][T14163] syz-executor.1[14163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.826415][T14163] syz-executor.1[14163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.337553][T14296] geneve1: tun_chr_ioctl cmd 1074025681 [ 399.010490][T14540] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.017621][T14540] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.024891][T14540] device bridge_slave_0 entered promiscuous mode [ 399.031692][T14540] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.038615][T14540] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.045825][T14540] device bridge_slave_1 entered promiscuous mode [ 399.189074][T14540] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.195950][T14540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.203041][T14540] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.209845][T14540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 399.276431][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 399.285143][ T4226] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.300403][ T4226] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.339920][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 399.350221][ T1040] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.357095][ T1040] bridge0: port 1(bridge_slave_0) entered forwarding state [ 399.377361][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 399.393038][ T1040] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.399923][ T1040] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.576894][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 399.592707][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 399.623322][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 399.642213][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 399.655483][T14540] device veth0_vlan entered promiscuous mode [ 399.665790][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 399.676925][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 399.694251][T14540] device veth1_macvtap entered promiscuous mode [ 399.703996][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 399.712080][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 399.720236][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 399.737516][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 399.745956][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 399.754366][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 399.763103][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 399.827671][ T7792] device bridge_slave_1 left promiscuous mode [ 399.838018][ T7792] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.850699][ T7792] device bridge_slave_0 left promiscuous mode [ 399.860370][ T7792] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.881886][ T7792] device veth1_macvtap left promiscuous mode [ 399.898831][ T7792] device veth0_vlan left promiscuous mode [ 400.650320][T14634] EXT4-fs warning (device sda1): ext4_group_extend:1862: can't shrink FS - resize aborted [ 401.582741][ T28] audit: type=1400 audit(1716899681.284:150): avc: denied { create } for pid=14687 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 405.043930][T14812] device pim6reg1 entered promiscuous mode [ 408.869923][T14890] device syzkaller0 entered promiscuous mode [ 409.261792][T14909] device bridge0 entered promiscuous mode [ 413.479582][T15065] device syzkaller0 entered promiscuous mode [ 413.600627][T15073] syz-executor.2[15073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.600697][T15073] syz-executor.2[15073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.651748][T15076] syz-executor.2[15076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.679323][T15076] syz-executor.2[15076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.974163][T15111] device veth1_macvtap left promiscuous mode [ 415.076335][T15111] device macsec0 left promiscuous mode [ 415.344086][T15131] device veth0_vlan left promiscuous mode [ 415.494251][T15131] device veth0_vlan entered promiscuous mode [ 421.306480][T15277] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.330807][T15277] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.350861][T15277] device bridge_slave_0 entered promiscuous mode [ 421.397846][T15277] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.427674][T15277] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.471225][T15277] device bridge_slave_1 entered promiscuous mode [ 421.877119][ T7794] device veth0_vlan left promiscuous mode [ 422.120776][T15277] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.127830][T15277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.134912][T15277] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.141718][T15277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.256402][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.332642][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.376131][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 422.383451][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 422.406142][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 422.414305][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 422.450704][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.457582][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.497061][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 422.505265][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 422.607510][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.614380][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.655990][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 422.663933][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 422.671782][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 422.679756][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 423.149368][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 423.160937][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 423.183482][T15277] device veth0_vlan entered promiscuous mode [ 423.207010][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 423.224253][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 423.244100][T15277] device veth1_macvtap entered promiscuous mode [ 423.253870][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 423.261814][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 423.269591][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 423.280315][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 423.292720][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 423.320297][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 423.329258][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 423.338798][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 423.347367][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 426.545424][T15416] bridge0: port 3(veth1_macvtap) entered blocking state [ 426.556639][T15416] bridge0: port 3(veth1_macvtap) entered disabled state [ 427.467344][T15448] device pim6reg1 entered promiscuous mode [ 427.708201][T15451] bridge0: port 3(veth1_macvtap) entered blocking state [ 427.715063][T15451] bridge0: port 3(veth1_macvtap) entered disabled state [ 428.040243][T15482] device veth0_vlan left promiscuous mode [ 428.055081][T15482] device veth0_vlan entered promiscuous mode [ 428.137095][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 428.159190][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 428.226597][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 429.461919][ T28] audit: type=1400 audit(1716899709.164:151): avc: denied { create } for pid=15533 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 430.227861][T15576] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.249355][T15576] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.273648][T15576] device bridge_slave_0 entered promiscuous mode [ 430.299732][T15576] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.322531][T15576] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.348424][T15576] device bridge_slave_1 entered promiscuous mode [ 430.779901][T15576] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.786909][T15576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 430.794071][T15576] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.800883][T15576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 430.870831][ T4226] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.878763][ T4226] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.886557][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 430.893917][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 430.906247][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 430.939722][ T4354] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.946615][ T4354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 431.049514][ T4354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 431.086748][ T4354] bridge0: port 2(bridge_slave_1) entered blocking state [ 431.093619][ T4354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 431.176982][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 431.194664][ T4226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 431.234695][T15576] device veth0_vlan entered promiscuous mode [ 431.250443][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 431.267887][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 431.299390][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 431.326816][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 431.361659][T15576] device veth1_macvtap entered promiscuous mode [ 431.388214][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 431.399952][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 431.428037][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 431.451372][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 431.473593][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 431.522125][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 431.534704][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 431.562549][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 431.602467][ T1040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 432.530496][T15641] device syzkaller0 entered promiscuous mode [ 432.621257][T15645] device pim6reg1 entered promiscuous mode [ 434.104407][T15720] gretap0: refused to change device tx_queue_len [ 435.186039][T15738] device pim6reg1 entered promiscuous mode [ 435.199297][T15744] syz-executor.2[15744] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.199363][T15744] syz-executor.2[15744] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.232204][T15748] device veth0_vlan left promiscuous mode [ 435.258432][T15748] device veth0_vlan entered promiscuous mode [ 436.336760][T15793] device pim6reg1 entered promiscuous mode [ 438.617370][T15878] device team_slave_0 entered promiscuous mode [ 438.659840][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 438.671220][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 438.946740][T15905] bridge0: port 3(veth1_macvtap) entered blocking state [ 438.971229][T15905] bridge0: port 3(veth1_macvtap) entered disabled state [ 439.605600][T15943] device syzkaller0 entered promiscuous mode [ 439.669236][T15948] device syzkaller0 entered promiscuous mode [ 440.131311][T15974] device pim6reg1 entered promiscuous mode [ 440.389485][T15990] device syzkaller0 entered promiscuous mode [ 441.144193][T16017] device syzkaller0 entered promiscuous mode [ 442.129415][ C0] softirq: huh, entered softirq 3 NET_RX ffffffff840b6220 with preempt_count 00000103, exited with 00000102? [ 442.140954][ T294] BUG: scheduling while atomic: syz-fuzzer/294/0x00000002 [ 442.147902][ T294] Modules linked in: [ 442.151627][ T294] Preemption disabled at: [ 442.151634][ T294] [] release_sock+0x30/0x1b0 [ 442.161793][ T294] CPU: 0 PID: 294 Comm: syz-fuzzer Not tainted 6.1.75-syzkaller-00026-g68c821783c76 #0 [ 442.171224][ T294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 442.181155][ T294] Call Trace: [ 442.184244][ T294] [ 442.187027][ T294] dump_stack_lvl+0x151/0x1b7 [ 442.191532][ T294] ? release_sock+0x30/0x1b0 [ 442.195959][ T294] ? release_sock+0x30/0x1b0 [ 442.200473][ T294] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 442.205769][ T294] ? release_sock+0x30/0x1b0 [ 442.210194][ T294] dump_stack+0x15/0x1b [ 442.214188][ T294] __schedule_bug+0x195/0x260 [ 442.218710][ T294] ? cpu_util_update_eff+0x10e0/0x10e0 [ 442.223994][ T294] ? ring_buffer_lock_reserve+0x1b68/0x1f80 [ 442.229729][ T294] __schedule+0xcf7/0x1550 [ 442.233978][ T294] ? timerqueue_add+0x250/0x270 [ 442.238668][ T294] ? __sched_text_start+0x8/0x8 [ 442.243354][ T294] schedule+0xc3/0x180 [ 442.247258][ T294] schedule_hrtimeout_range_clock+0x1ef/0x360 [ 442.253161][ T294] ? hrtimer_nanosleep_restart+0x170/0x170 [ 442.258794][ T294] ? select_estimate_accuracy+0x2f3/0x3f0 [ 442.264620][ T294] ? __remove_hrtimer+0x4d0/0x4d0 [ 442.269481][ T294] ? _raw_write_lock_irq+0xa5/0x170 [ 442.274505][ T294] ? _raw_write_lock_irqsave+0x1e0/0x1e0 [ 442.279985][ T294] schedule_hrtimeout_range+0x2a/0x40 [ 442.285184][ T294] do_epoll_wait+0x1919/0x1ad0 [ 442.289789][ T294] ? vbin_printf+0x1bc0/0x1bc0 [ 442.294386][ T294] ? ep_destroy_wakeup_source+0x70/0x70 [ 442.299762][ T294] ? bpf_bprintf_cleanup+0x48/0x60 [ 442.304825][ T294] ? bpf_trace_printk+0x1be/0x300 [ 442.309941][ T294] ? bpf_trace_run2+0xe9/0x290 [ 442.314542][ T294] ? do_epoll_wait+0x1ad0/0x1ad0 [ 442.319316][ T294] ? bpf_trace_run2+0xe9/0x290 [ 442.323911][ T294] ? timespec64_add_safe+0x1ba/0x220 [ 442.329036][ T294] ? nsecs_to_jiffies+0x30/0x30 [ 442.333895][ T294] do_epoll_pwait+0x5c/0x1f0 [ 442.338331][ T294] __x64_sys_epoll_pwait+0x2b4/0x300 [ 442.343467][ T294] ? __ia32_sys_epoll_wait+0x2a0/0x2a0 [ 442.348741][ T294] ? __bpf_trace_sys_enter+0x62/0x70 [ 442.353857][ T294] ? syscall_enter_from_user_mode+0x12c/0x190 [ 442.359779][ T294] do_syscall_64+0x3d/0xb0 [ 442.364014][ T294] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 442.369656][ T294] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 442.375383][ T294] RIP: 0033:0x40720e [ 442.379117][ T294] Code: 48 83 ec 38 e8 13 00 00 00 48 83 c4 38 5d c3 cc cc cc cc cc cc cc cc cc cc cc cc cc 49 89 f2 48 89 fa 48 89 ce 48 89 df 0f 05 <48> 3d 01 f0 ff ff 76 15 48 f7 d8 48 89 c1 48 c7 c0 ff ff ff ff 48 [ 442.398558][ T294] RSP: 002b:000000c000e51748 EFLAGS: 00000246 ORIG_RAX: 0000000000000119 [ 442.406799][ T294] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000040720e [ 442.414608][ T294] RDX: 0000000000000080 RSI: 000000c000e51818 RDI: 0000000000000004 [ 442.422421][ T294] RBP: 000000c000e51790 R08: 0000000000000000 R09: 0000000000000000 2024/05/28 12:35:22 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 442.430232][ T294] R10: 00000000000002e8 R11: 0000000000000246 R12: 000000c000e51820 [ 442.438044][ T294] R13: 11ef11ef01ef11ef R14: 000000c000e561a0 R15: 0000000000000037 [ 442.446053][ T294] [ 442.460838][T16083] device veth0_vlan left promiscuous mode [ 442.470430][T16083] device veth0_vlan entered promiscuous mode