last executing test programs: 1.991819574s ago: executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1e, 0xe, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000200)={r0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 1.927411573s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x6, 0x5004, 0x7, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), &(0x7f0000001540)=""/166}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001300)={r0, &(0x7f0000000200), &(0x7f00000000c0)=""/109}, 0x20) 1.897160898s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000001d18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a40)={{r0}, &(0x7f0000000940), &(0x7f0000000980)='%ps \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0xa) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 1.809704961s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.715491266s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000d00850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x6, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='ext4_allocate_inode\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='ext4_allocate_inode\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) 1.654329085s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x0, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_request_blocks\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x17, 0x3, &(0x7f0000000700)=ANY=[@ANYRES32=r1], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000001600)={&(0x7f0000000040)=@abs, 0xfffffffffffffc9c, 0x0, 0x0, &(0x7f00000015c0), 0x20}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ff00ff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) socketpair(0x2, 0x4, 0x1, &(0x7f0000000400)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000001b80)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd1200000000000085000000b0000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b30205006023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa8272f3eee97c0c3258918bd811db74b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff90326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff7a9433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0f34d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbdee00550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d3726602111b40e761fd21081920386f14d12ca3c3431ee97471c7868dcdaffaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf974fcf36cbf6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd574d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a8022c8870f228787863a9e0885e238b44ae1c25c9fd8bb27083b8246829e64056000302bffff15405bd5f2eba2000000dd0000000000000000000000000000009a9823fd8fbc5aa165099c5ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a3174b531f573fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb42305651152df60a3a05b89e760b60563c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d0104361c37c61a43b5afd865b60d4cae891b73220f17d25979a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953e88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9463f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d00000000ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a72e1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf5ef06f7244dd357acd09d1ee4928aafe23de66fed972e0dddfb33f64e64701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4faa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a2689217380400a9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9ea81232fbef665f6212f875b2a000000000000000000000000000020bd79e41c682139c58aa9deb039a691ad640e12c12fe11d70fe495906f2d5d71778acbd4eee53a3996cb0de84bd2b059d60c0f96a53ea44e0b293865aa68df494f87db976e36ad6c06912244d4c883c4aaa60b4a1392ce0b2f2c519663b4652ff871e0f6dfff9f7d34ecf04be0a58c3d53174b67d1886e34b81ad8c60da56acc64739c3acab24aa8d0ac92d465074f915608b1b60a948bad401b1a7fb3627bbe6c45123ed44bfdf8cc143bd1b7a663dc3d0476b8e39becffc429e41f66b1e37ae52aacaff0f1dc8ea70b68c25072e20586b19127d75fa71577f265c51000000000000000000000000004c0c1b4742fdb68a34370543d7aec4fbb67bfb3730af0c908d89029365378cca550f508e3699830028643ecfe9f79bd15db571c5420d9b60fa794cfbc7fd039856329b684216237ec55faf25fee7f1a838fc2399d67fe9b245fab52f7a8eb1aadbfbd8d203290f131965a41ca43bf5440e7b1425c15d39559e76384112b80dd0049280a1e9b63e3e7cadefa558b6d38ebe86b49e3f80204b5536f1bde80cb2dade46f6a1b8cc20a5a9b560e736235d518349599b8368bf1e360ecaa0bde20303eef789304761aca34b507fd66115ef36b2cec7629c7609283d1676bb3a018c0dad35189928abf9d06bc9"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x49) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x8a208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc, 0x0, 0x7, 0x0, 0x8000000, 0x200}, 0x0, 0x4, r2, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0x42, 0x3d}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280), 0xfffffff8, r8}, 0x38) 1.066621046s ago: executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_ext_remove_space_done\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_ext_remove_space_done\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) 1.001047796s ago: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000500)='ext4_allocate_inode\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='ext4_allocate_inode\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x200000000000000) 969.668341ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000001d18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a40)={{r0}, &(0x7f0000000940), &(0x7f0000000980)='%ps \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0xa) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 914.564509ms ago: executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000240), 0x2, 0x0) write$cgroup_type(r0, &(0x7f00000002c0), 0x9) r1 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{r2}, &(0x7f0000000640), &(0x7f0000000680)='%+9llu \x00'}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x20, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1d, 0x4, &(0x7f00000003c0)=ANY=[@ANYRESOCT], &(0x7f0000000140)='GPL\x00', 0x7, 0xffffffffffffffe0, &(0x7f0000000180)=""/153}, 0x90) perf_event_open(0x0, 0x0, 0x4000000000000000, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'\x00', 0x6132}) write$cgroup_subtree(r4, &(0x7f00000000c0)=ANY=[], 0x4) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x16) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000000000300000000020020000200000002010000000000000000000105000000000000000000da5b0a179646bd0cbbc5598b68aa6096fb9e584d7c407f0f6a5fd3be16c45b425894314c0e470558098e6f81ed70ed3cd6c2236ba3078e02410f3886a7ad9d5c2face34d66"], 0x0, 0x42}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x20f42, 0x0) write$cgroup_subtree(r6, 0x0, 0xe) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)='o*\x00'}, 0x30) r7 = perf_event_open(&(0x7f0000000500)={0x0, 0xffffffffffffff4a, 0x0, 0x81, 0xff, 0x7d, 0x0, 0xfffffffffffffff5, 0x6d497d56f824ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x4, @perf_config_ext={0x5e79, 0x7}, 0x3, 0x40, 0x3fc, 0x6, 0x7ff, 0xfffffffd, 0x4, 0x0, 0xffe, 0x0, 0xa227}, 0x0, 0x10, r1, 0xa) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x9, 0x36, 0x0, 0x5, 0x0, 0x1, 0xc8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000300), 0xa}, 0xd80, 0x80, 0x4, 0x7, 0x24, 0x101, 0x0, 0x0, 0x1fac, 0x0, 0xffffffffffffff0a}, 0x0, 0x7fffffff, r7, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8923, &(0x7f0000000040)={'bridge_slave_0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x17, 0x4, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x3, &(0x7f0000001b40)=ANY=[@ANYBLOB="85000000ae00000025000000000000009500000000000000afcd48d649379071c33390e418ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fcb4e0b6eab1aa7d55545a34effa077faa55c59e80000bf2255d6a0244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0d64ed69a14858d344df56d5da253590a8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea2fab2e4b380a00d72bc0480f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b03486cbfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ecec37e83efceefd7ca2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbe62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31a0445859a5ece846354c9c3a041a1e7b55c4e81dba1e12289ee399c9ac687d1d4009c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a740201578e63137c9817ac7866ec87122219b0f796ab92b10200ae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d264e77f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5631820420b75b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d074b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d57ba50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b76ed045e52d19cfd99d85c322a9cf17548c54fccad2c7ae8072b82e0880815daf9f1e55343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc693c365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e0bb24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e374d7f5c0cc90d0613cfb47000000000000000000000000260d60c51d0db1"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 858.292508ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r2, &(0x7f0000000680), 0x12) 853.233388ms ago: executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_ext_remove_space_done\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_ext_remove_space_done\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) 834.932022ms ago: executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200f1ff8500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000400)='block_split\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r5, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 805.317136ms ago: executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000071114700000000007b0a00f7"], 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) write$cgroup_int(r1, &(0x7f0000000000), 0xffe000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305829, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) write$cgroup_int(r1, &(0x7f00000002c0), 0x12) 605.936577ms ago: executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000240), 0x2, 0x0) write$cgroup_type(r0, &(0x7f00000002c0), 0x9) r1 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{r2}, &(0x7f0000000640), &(0x7f0000000680)='%+9llu \x00'}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x20, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1d, 0x4, &(0x7f00000003c0)=ANY=[@ANYRESOCT], &(0x7f0000000140)='GPL\x00', 0x7, 0xffffffffffffffe0, &(0x7f0000000180)=""/153}, 0x90) perf_event_open(0x0, 0x0, 0x4000000000000000, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'\x00', 0x6132}) write$cgroup_subtree(r4, &(0x7f00000000c0)=ANY=[], 0x4) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x16) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000000000300000000020020000200000002010000000000000000000105000000000000000000da5b0a179646bd0cbbc5598b68aa6096fb9e584d7c407f0f6a5fd3be16c45b425894314c0e470558098e6f81ed70ed3cd6c2236ba3078e02410f3886a7ad9d5c2face34d66"], 0x0, 0x42}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x20f42, 0x0) write$cgroup_subtree(r6, 0x0, 0xe) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)='o*\x00'}, 0x30) r7 = perf_event_open(&(0x7f0000000500)={0x0, 0xffffffffffffff4a, 0x0, 0x81, 0xff, 0x7d, 0x0, 0xfffffffffffffff5, 0x6d497d56f824ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x4, @perf_config_ext={0x5e79, 0x7}, 0x3, 0x40, 0x3fc, 0x6, 0x7ff, 0xfffffffd, 0x4, 0x0, 0xffe, 0x0, 0xa227}, 0x0, 0x10, r1, 0xa) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x9, 0x36, 0x0, 0x5, 0x0, 0x1, 0xc8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000300), 0xa}, 0xd80, 0x80, 0x4, 0x7, 0x24, 0x101, 0x0, 0x0, 0x1fac, 0x0, 0xffffffffffffff0a}, 0x0, 0x7fffffff, r7, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8923, &(0x7f0000000040)={'bridge_slave_0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x17, 0x4, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x3, &(0x7f0000001b40)=ANY=[@ANYBLOB="85000000ae00000025000000000000009500000000000000afcd48d649379071c33390e418ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fcb4e0b6eab1aa7d55545a34effa077faa55c59e80000bf2255d6a0244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0d64ed69a14858d344df56d5da253590a8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea2fab2e4b380a00d72bc0480f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b03486cbfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ecec37e83efceefd7ca2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbe62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31a0445859a5ece846354c9c3a041a1e7b55c4e81dba1e12289ee399c9ac687d1d4009c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a740201578e63137c9817ac7866ec87122219b0f796ab92b10200ae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d264e77f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5631820420b75b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d074b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d57ba50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b76ed045e52d19cfd99d85c322a9cf17548c54fccad2c7ae8072b82e0880815daf9f1e55343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc693c365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e0bb24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e374d7f5c0cc90d0613cfb47000000000000000000000000260d60c51d0db1"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 565.870493ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r2, &(0x7f0000000680), 0x12) 546.054486ms ago: executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_ext_remove_space_done\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_ext_remove_space_done\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) 525.034979ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000000000e8000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000002100b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x99) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x2000003, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f00000001c0)={r3, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000000)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r5}, 0x10) gettid() 489.347165ms ago: executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x4, 0xffff, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[r1, r1]}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x3, 0x0, r1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000024c0), &(0x7f0000001280), 0x2, r2}, 0x27) 448.497861ms ago: executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000000), 0x400000) 428.900064ms ago: executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x15}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 347.473517ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x10) socketpair(0x18, 0x0, 0x2, &(0x7f0000004080)) 327.07748ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff0e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f0000000800)=""/154}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='ext4_es_find_extent_range_enter\x00', r1}, 0x10) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) 310.165882ms ago: executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000002c0)=""/106}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000340)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x4c) 298.302414ms ago: executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.stat\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r2}, 0x8) ioctl$SIOCSIFHWADDR(r1, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) 222.322536ms ago: executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000240), 0x2, 0x0) write$cgroup_type(r0, &(0x7f00000002c0), 0x9) r1 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{r2}, &(0x7f0000000640), &(0x7f0000000680)='%+9llu \x00'}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x20, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1d, 0x4, &(0x7f00000003c0)=ANY=[@ANYRESOCT], &(0x7f0000000140)='GPL\x00', 0x7, 0xffffffffffffffe0, &(0x7f0000000180)=""/153}, 0x90) perf_event_open(0x0, 0x0, 0x4000000000000000, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'\x00', 0x6132}) write$cgroup_subtree(r4, &(0x7f00000000c0)=ANY=[], 0x4) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x16) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000000000300000000020020000200000002010000000000000000000105000000000000000000da5b0a179646bd0cbbc5598b68aa6096fb9e584d7c407f0f6a5fd3be16c45b425894314c0e470558098e6f81ed70ed3cd6c2236ba3078e02410f3886a7ad9d5c2face34d66"], 0x0, 0x42}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x20f42, 0x0) write$cgroup_subtree(r6, 0x0, 0xe) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)='o*\x00'}, 0x30) r7 = perf_event_open(&(0x7f0000000500)={0x0, 0xffffffffffffff4a, 0x0, 0x81, 0xff, 0x7d, 0x0, 0xfffffffffffffff5, 0x6d497d56f824ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x4, @perf_config_ext={0x5e79, 0x7}, 0x3, 0x40, 0x3fc, 0x6, 0x7ff, 0xfffffffd, 0x4, 0x0, 0xffe, 0x0, 0xa227}, 0x0, 0x10, r1, 0xa) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x9, 0x36, 0x0, 0x5, 0x0, 0x1, 0xc8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000300), 0xa}, 0xd80, 0x80, 0x4, 0x7, 0x24, 0x101, 0x0, 0x0, 0x1fac, 0x0, 0xffffffffffffff0a}, 0x0, 0x7fffffff, r7, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8923, &(0x7f0000000040)={'bridge_slave_0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x17, 0x4, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x3, &(0x7f0000001b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 104.761084ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r2, &(0x7f0000000680), 0x12) 85.420117ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x6, 0x5004, 0x7, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), &(0x7f0000001540)=""/166}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001300)={r0, &(0x7f0000000200), &(0x7f00000000c0)=""/109}, 0x20) 19.900667ms ago: executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x63, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002c00000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000000)=0xd, 0x400000) 0s ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.10' (ED25519) to the list of known hosts. 2024/06/16 18:14:42 fuzzer started 2024/06/16 18:14:42 dialing manager at 10.128.0.163:30014 [ 19.330636][ T28] audit: type=1400 audit(1718561682.937:66): avc: denied { node_bind } for pid=284 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 19.333568][ T28] audit: type=1400 audit(1718561682.937:67): avc: denied { name_bind } for pid=284 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 70.001818][ T28] audit: type=1400 audit(1718561733.607:68): avc: denied { mounton } for pid=343 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 70.009678][ T343] cgroup: Unknown subsys name 'net' [ 70.037025][ T345] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 70.047163][ T343] cgroup: Unknown subsys name 'devices' [ 70.049657][ T28] audit: type=1400 audit(1718561733.607:69): avc: denied { mount } for pid=343 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 70.074494][ T28] audit: type=1400 audit(1718561733.637:70): avc: denied { mounton } for pid=347 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 70.099327][ T28] audit: type=1400 audit(1718561733.637:71): avc: denied { mount } for pid=347 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 70.122285][ T28] audit: type=1400 audit(1718561733.647:72): avc: denied { unmount } for pid=343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 70.141822][ T28] audit: type=1400 audit(1718561733.657:73): avc: denied { setattr } for pid=350 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=166 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 70.164746][ T28] audit: type=1400 audit(1718561733.657:74): avc: denied { relabelto } for pid=345 comm="mkswap" name="swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.182667][ T344] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 70.189899][ T28] audit: type=1400 audit(1718561733.657:75): avc: denied { write } for pid=345 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.223758][ T28] audit: type=1400 audit(1718561733.777:76): avc: denied { read } for pid=344 comm="syz-executor" name="swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.249015][ T28] audit: type=1400 audit(1718561733.777:77): avc: denied { open } for pid=344 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.309108][ T343] cgroup: Unknown subsys name 'hugetlb' [ 70.314536][ T343] cgroup: Unknown subsys name 'rlimit' 2024/06/16 18:15:34 starting 5 executor processes [ 70.624108][ T359] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.631437][ T359] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.638755][ T359] device bridge_slave_0 entered promiscuous mode [ 70.649452][ T360] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.656292][ T360] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.663604][ T360] device bridge_slave_0 entered promiscuous mode [ 70.671402][ T360] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.678296][ T360] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.685487][ T360] device bridge_slave_1 entered promiscuous mode [ 70.696697][ T359] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.703549][ T359] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.710886][ T359] device bridge_slave_1 entered promiscuous mode [ 70.850445][ T363] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.857410][ T363] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.864382][ T363] device bridge_slave_0 entered promiscuous mode [ 70.879947][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.886783][ T361] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.894183][ T361] device bridge_slave_0 entered promiscuous mode [ 70.903922][ T363] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.910818][ T363] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.918014][ T363] device bridge_slave_1 entered promiscuous mode [ 70.929515][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.936355][ T361] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.943591][ T361] device bridge_slave_1 entered promiscuous mode [ 70.974787][ T362] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.981662][ T362] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.988883][ T362] device bridge_slave_0 entered promiscuous mode [ 71.010505][ T362] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.017371][ T362] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.024454][ T362] device bridge_slave_1 entered promiscuous mode [ 71.052992][ T359] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.059860][ T359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.066933][ T359] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.073895][ T359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.119450][ T360] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.126295][ T360] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.133667][ T360] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.140424][ T360] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.211305][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.218414][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.225342][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.232435][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.240256][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.247962][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.258141][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.266093][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.272939][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.308691][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.316609][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.323363][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.330560][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.339222][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.373627][ T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.382324][ T65] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.390378][ T65] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.397196][ T65] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.405481][ T65] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.413442][ T65] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.420282][ T65] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.427453][ T65] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.435110][ T65] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.447768][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.454977][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 71.463273][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.471286][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.478114][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.487186][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.505787][ T360] device veth0_vlan entered promiscuous mode [ 71.517907][ T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.525684][ T65] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 71.533066][ T65] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.540650][ T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 71.548803][ T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.556506][ T65] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 71.563889][ T65] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.571672][ T65] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.579596][ T65] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.586405][ T65] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.595459][ T359] device veth0_vlan entered promiscuous mode [ 71.613848][ T360] device veth1_macvtap entered promiscuous mode [ 71.622710][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.630693][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.638950][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 71.646793][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 71.654806][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 71.662230][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.669486][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.676593][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.683821][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.702977][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 71.711004][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 71.719181][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 71.727106][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 71.735336][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.743389][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.751422][ T382] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.758255][ T382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.765401][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.773469][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.781686][ T382] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.788539][ T382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.795766][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.803843][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.811889][ T382] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.818724][ T382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.826180][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.833681][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.850545][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 71.858522][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 71.866356][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.874575][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.882485][ T382] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.889317][ T382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.896435][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.904251][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.911945][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.919805][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.951662][ T359] device veth1_macvtap entered promiscuous mode [ 71.960708][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 71.968443][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.976211][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.984024][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.991881][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.999769][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 72.007910][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.015943][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 72.024075][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.035933][ T361] device veth0_vlan entered promiscuous mode [ 72.047306][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 72.055030][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.063631][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 72.071625][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.080180][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 72.088233][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 72.096240][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 72.104318][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 72.112366][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.119654][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.126838][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.134103][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.143331][ T362] device veth0_vlan entered promiscuous mode [ 72.164890][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 72.176795][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 72.186193][ T361] device veth1_macvtap entered promiscuous mode [ 72.202661][ T363] device veth0_vlan entered promiscuous mode [ 72.219922][ T362] device veth1_macvtap entered promiscuous mode [ 72.226545][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 72.235447][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 72.242977][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 72.251389][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.259577][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 72.267444][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.275586][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 72.283378][ T397] syz-executor.1 (397) used greatest stack depth: 21960 bytes left [ 72.291354][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 72.299467][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 72.307854][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.315167][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.325861][ T363] device veth1_macvtap entered promiscuous mode [ 72.397567][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 72.405546][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 72.413618][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 72.420987][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 72.429053][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 72.437273][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 72.450834][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 72.459054][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 72.467039][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 72.475286][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 72.483408][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 72.491643][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 72.499728][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 72.798869][ T448] Illegal XDP return value 4294967274 on prog (id 38) dev N/A, expect packet loss! [ 73.473446][ T576] device pim6reg1 entered promiscuous mode [ 73.576158][ T595] device syzkaller0 entered promiscuous mode [ 73.721862][ T615] device veth1_to_team entered promiscuous mode [ 73.870911][ T651] device pim6reg1 entered promiscuous mode [ 74.177507][ C0] hrtimer: interrupt took 27467 ns [ 74.938870][ T764] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 75.020510][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 75.020524][ T28] audit: type=1400 audit(1718561738.627:111): avc: denied { create } for pid=765 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 75.457513][ T796] rose0: tun_chr_ioctl cmd 1074025677 [ 75.517574][ T796] rose0: linktype set to 776 [ 75.566434][ T805] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 75.728685][ T815] device syzkaller0 entered promiscuous mode [ 76.369053][ T873] device syzkaller0 entered promiscuous mode [ 76.387553][ T879] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.768161][ T953] device syzkaller0 entered promiscuous mode [ 77.186546][ T1008] device syzkaller0 entered promiscuous mode [ 77.276025][ T1020] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.845225][ T28] audit: type=1400 audit(1718561741.447:112): avc: denied { write } for pid=1057 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 78.173108][ T28] audit: type=1400 audit(1718561741.777:113): avc: denied { create } for pid=1075 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 78.807386][ T1104] device pim6reg1 entered promiscuous mode [ 79.379174][ T1127] syz-executor.4[1127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.379238][ T1127] syz-executor.4[1127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.452735][ T1140] device syzkaller0 entered promiscuous mode [ 79.541226][ T1147] device pim6reg1 entered promiscuous mode [ 80.279487][ T1188] device syzkaller0 entered promiscuous mode [ 80.984259][ T1235] syz-executor.4[1235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.984325][ T1235] syz-executor.4[1235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.086078][ T1230] device syzkaller0 entered promiscuous mode [ 81.185015][ T28] audit: type=1400 audit(1718561744.787:114): avc: denied { read } for pid=1237 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 81.495081][ T1248] device pim6reg1 entered promiscuous mode [ 81.528149][ T360] syz-executor.1 (360) used greatest stack depth: 21520 bytes left [ 81.776055][ T1266] device syzkaller0 entered promiscuous mode [ 81.796451][ T28] audit: type=1400 audit(1718561745.397:115): avc: denied { create } for pid=1268 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 82.009688][ T1256] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.016553][ T1256] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.024107][ T1256] device bridge_slave_0 entered promiscuous mode [ 82.046882][ T1256] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.056542][ T1256] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.081372][ T1256] device bridge_slave_1 entered promiscuous mode [ 82.366695][ T531] device bridge_slave_1 left promiscuous mode [ 82.389697][ T531] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.441461][ T531] device bridge_slave_0 left promiscuous mode [ 82.447458][ T531] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.532043][ T531] device veth1_macvtap left promiscuous mode [ 82.551355][ T531] device veth0_vlan left promiscuous mode [ 82.722008][ T1282] syz-executor.3 (1282) used greatest stack depth: 21208 bytes left [ 82.844463][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 82.854606][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 82.865540][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 82.873959][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 82.887514][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.894384][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.943297][ T1310] device syzkaller0 entered promiscuous mode [ 82.970717][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.978784][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 82.993384][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.005650][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.012519][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.020816][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 83.033846][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.055033][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 83.076129][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.133860][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 83.183542][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 83.204346][ T1256] device veth0_vlan entered promiscuous mode [ 83.213882][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 83.223886][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.329569][ T1256] device veth1_macvtap entered promiscuous mode [ 83.381137][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.407130][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 83.452795][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 83.510525][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 83.557600][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 83.584874][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 83.596433][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 83.605351][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 83.660828][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 84.194728][ T1391] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 85.721540][ T1473] device bridge0 entered promiscuous mode [ 85.892318][ T28] audit: type=1400 audit(1718561749.497:116): avc: denied { create } for pid=1482 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 88.647988][ T1601] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 90.017237][ C1] sched: RT throttling activated [ 90.262461][ T1634] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 90.818686][ T1667] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 92.997378][ T1755] syz-executor.1 (1755) used greatest stack depth: 20712 bytes left [ 93.968694][ T464] device bridge_slave_1 left promiscuous mode [ 93.974676][ T464] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.007325][ T464] device bridge_slave_0 left promiscuous mode [ 94.058157][ T464] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.112123][ T464] device veth1_macvtap left promiscuous mode [ 94.157514][ T464] device veth0_vlan left promiscuous mode [ 94.736221][ T1836] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.743423][ T1836] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.758409][ T1836] device bridge_slave_0 entered promiscuous mode [ 94.765439][ T1836] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.772361][ T1836] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.797701][ T1836] device bridge_slave_1 entered promiscuous mode [ 95.464464][ T1836] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.471335][ T1836] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.478437][ T1836] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.485209][ T1836] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.576944][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.591187][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.712448][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 95.731054][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.803218][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 95.829623][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.911691][ T1341] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.918573][ T1341] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.957376][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.975766][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.985753][ T1341] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.992637][ T1341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.017091][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 96.035167][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.066237][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.084465][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.104482][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 96.124649][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 96.206897][ T1836] device veth0_vlan entered promiscuous mode [ 96.214231][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 96.229611][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.255810][ T1836] device veth1_macvtap entered promiscuous mode [ 96.275357][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 96.290659][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.314097][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 96.332496][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 96.349028][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 96.378575][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 96.392735][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 96.401162][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 96.409870][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 96.441336][ T1918] device syzkaller0 entered promiscuous mode [ 96.568284][ T1937] bridge0: port 3(vlan1) entered blocking state [ 96.574371][ T1937] bridge0: port 3(vlan1) entered disabled state [ 96.589315][ T1937] device vlan1 entered promiscuous mode [ 96.594864][ T1937] bridge0: port 3(vlan1) entered blocking state [ 96.600942][ T1937] bridge0: port 3(vlan1) entered forwarding state [ 97.300256][ T1963] device syzkaller0 entered promiscuous mode [ 98.077739][ T2015] device syzkaller0 entered promiscuous mode [ 98.402662][ T2027] device sit0 entered promiscuous mode [ 99.234617][ T2066] bridge0: port 3(vlan1) entered blocking state [ 99.241125][ T2066] bridge0: port 3(vlan1) entered disabled state [ 99.247891][ T2066] device vlan1 entered promiscuous mode [ 99.253464][ T2066] bridge0: port 3(vlan1) entered blocking state [ 99.259542][ T2066] bridge0: port 3(vlan1) entered forwarding state [ 99.343913][ T2063] device sit0 entered promiscuous mode [ 99.669874][ T2075] bridge0: port 3(vlan1) entered disabled state [ 99.763607][ T2075] tun0: tun_chr_ioctl cmd 21731 [ 99.806370][ T2075] device veth0_vlan left promiscuous mode [ 99.879469][ T2075] device veth0_vlan entered promiscuous mode [ 99.918866][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 99.926919][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 99.961011][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 99.970213][ T382] bridge0: port 3(vlan1) entered blocking state [ 99.976292][ T382] bridge0: port 3(vlan1) entered forwarding state [ 100.010680][ T2080] device syzkaller0 entered promiscuous mode [ 100.327683][ T2103] device sit0 left promiscuous mode [ 100.485380][ T2111] device sit0 entered promiscuous mode [ 100.772354][ T2118] device syzkaller0 entered promiscuous mode [ 101.368234][ T2141] syz-executor.4 (2141) used greatest stack depth: 20056 bytes left [ 101.478938][ T2148] device syzkaller0 entered promiscuous mode [ 101.675305][ T2158] device syzkaller0 entered promiscuous mode [ 101.722937][ T2156] bridge0: port 3(vlan1) entered disabled state [ 101.838112][ T2156] tun0: tun_chr_ioctl cmd 21731 [ 101.867309][ T2156] device veth0_vlan left promiscuous mode [ 101.888686][ T2156] device veth0_vlan entered promiscuous mode [ 101.933722][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.948016][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.957720][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 101.965037][ T19] bridge0: port 3(vlan1) entered blocking state [ 101.971136][ T19] bridge0: port 3(vlan1) entered forwarding state [ 101.994226][ T2161] device syzkaller0 entered promiscuous mode [ 102.488434][ T2190] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 102.687434][ T2193] device sit0 left promiscuous mode [ 102.854173][ T2197] device sit0 entered promiscuous mode [ 103.110465][ T2209] bridge0: port 3(vlan1) entered disabled state [ 103.194868][ T2209] tun0: tun_chr_ioctl cmd 21731 [ 103.216961][ T2209] device veth0_vlan left promiscuous mode [ 103.229743][ T2209] device veth0_vlan entered promiscuous mode [ 103.236676][ T2209] bridge0: port 3(vlan1) entered blocking state [ 103.242766][ T2209] bridge0: port 3(vlan1) entered forwarding state [ 103.273721][ T2209] device syzkaller0 entered promiscuous mode [ 103.494433][ T2240] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 104.076964][ T2258] tun0: tun_chr_ioctl cmd 21731 [ 104.109819][ T2258] device veth0_vlan left promiscuous mode [ 104.132278][ T2258] device veth0_vlan entered promiscuous mode [ 104.167912][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.180294][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.223448][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.370882][ T2264] device syzkaller0 entered promiscuous mode [ 104.436292][ T2272] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 104.761739][ T2285] device sit0 entered promiscuous mode [ 105.065262][ T2300] device syzkaller0 entered promiscuous mode [ 105.088055][ T2305] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 105.293792][ T2313] tun0: tun_chr_ioctl cmd 21731 [ 105.344159][ T2313] device veth0_vlan left promiscuous mode [ 105.361213][ T2313] device veth0_vlan entered promiscuous mode [ 105.473419][ T2313] device syzkaller0 entered promiscuous mode [ 106.622701][ T2363] tun0: tun_chr_ioctl cmd 21731 [ 106.706058][ T2363] device veth0_vlan left promiscuous mode [ 106.775901][ T2363] device veth0_vlan entered promiscuous mode [ 106.846796][ T2366] device sit0 left promiscuous mode [ 107.136137][ T2367] device syzkaller0 entered promiscuous mode [ 107.171211][ T2368] device sit0 entered promiscuous mode [ 109.968250][ T2480] device sit0 left promiscuous mode [ 110.129519][ T2488] device sit0 entered promiscuous mode [ 110.569010][ T2466] syz-executor.0 (2466) used greatest stack depth: 19096 bytes left [ 111.637090][ T2574] device sit0 entered promiscuous mode [ 111.730930][ T2578] tun0: tun_chr_ioctl cmd 21731 [ 111.777451][ T2578] device veth0_vlan left promiscuous mode [ 111.816156][ T2578] device veth0_vlan entered promiscuous mode [ 111.848749][ T2583] device syzkaller0 entered promiscuous mode [ 116.273872][ T2676] device sit0 left promiscuous mode [ 116.532599][ T2685] device sit0 entered promiscuous mode [ 130.802353][ T2846] device pim6reg1 entered promiscuous mode [ 136.029583][ T2971] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 136.502028][ T2998] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 136.596912][ T28] audit: type=1400 audit(1718561800.197:117): avc: denied { create } for pid=3007 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 136.965532][ T3032] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 138.271225][ T3067] device pim6reg1 entered promiscuous mode [ 138.530261][ T3093] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 138.553913][ T3085] device syzkaller0 entered promiscuous mode [ 138.739927][ T3103] device pim6reg1 entered promiscuous mode [ 139.031845][ T3126] device syzkaller0 entered promiscuous mode [ 139.493311][ T3144] device pim6reg1 entered promiscuous mode [ 139.905326][ T28] audit: type=1400 audit(1718561803.507:118): avc: denied { create } for pid=3159 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 140.142596][ T3171] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 140.650298][ T3179] device syzkaller0 entered promiscuous mode [ 141.779331][ T3231] device syzkaller0 entered promiscuous mode [ 142.845827][ T3265] device syzkaller0 entered promiscuous mode [ 146.242141][ T3343] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.249108][ T3343] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.256272][ T3343] device bridge_slave_0 entered promiscuous mode [ 146.263242][ T3343] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.270361][ T3343] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.277772][ T3343] device bridge_slave_1 entered promiscuous mode [ 146.522764][ T3343] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.529651][ T3343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.536730][ T3343] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.543532][ T3343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.787589][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 146.795669][ T381] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.864511][ T381] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.952246][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.972798][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.979681][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.005250][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.058611][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.065488][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.359807][ T3382] device syzkaller0 entered promiscuous mode [ 147.595931][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.635629][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 147.673858][ T3343] device veth0_vlan entered promiscuous mode [ 147.711573][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 147.730971][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 147.747654][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 147.785859][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 147.827471][ T464] device bridge_slave_1 left promiscuous mode [ 147.833435][ T464] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.860493][ T464] device bridge_slave_0 left promiscuous mode [ 147.887737][ T464] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.990617][ T464] device veth1_macvtap left promiscuous mode [ 148.047339][ T464] device veth0_vlan left promiscuous mode [ 148.496653][ T3343] device veth1_macvtap entered promiscuous mode [ 148.568881][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.576195][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 148.627733][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 148.689797][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 148.723552][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 148.762074][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 148.797783][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 148.805987][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 148.838401][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 151.679231][ T3479] device syzkaller0 entered promiscuous mode [ 153.702323][ T3540] device syzkaller0 entered promiscuous mode [ 155.292062][ T3588] device syzkaller0 entered promiscuous mode [ 156.409282][ T3632] device syzkaller0 entered promiscuous mode [ 157.868829][ T8] device vlan1 left promiscuous mode [ 157.874127][ T8] bridge0: port 3(vlan1) entered disabled state [ 157.892034][ T8] device bridge_slave_1 left promiscuous mode [ 157.927981][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.945625][ T8] device bridge_slave_0 left promiscuous mode [ 157.957381][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.060015][ T8] device veth1_macvtap left promiscuous mode [ 160.065875][ T8] device veth0_vlan left promiscuous mode [ 160.175188][ T3676] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.182086][ T3676] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.189350][ T3676] device bridge_slave_0 entered promiscuous mode [ 160.196579][ T3676] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.203536][ T3676] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.211322][ T3676] device bridge_slave_1 entered promiscuous mode [ 160.301342][ T3690] device syzkaller0 entered promiscuous mode [ 160.954505][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 160.963993][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.979212][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.987447][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.995596][ T1287] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.002463][ T1287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.009799][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.018713][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.032409][ T1287] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.039283][ T1287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.057480][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 161.066026][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.073708][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.081560][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.094034][ T3676] device veth0_vlan entered promiscuous mode [ 161.100880][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.109334][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.116845][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.131623][ T3676] device veth1_macvtap entered promiscuous mode [ 161.140037][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 161.152681][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 161.175976][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 163.046441][ T3745] device syzkaller0 entered promiscuous mode [ 165.071683][ T3797] device syzkaller0 entered promiscuous mode [ 166.667903][ T3851] device syzkaller0 entered promiscuous mode [ 167.968259][ T3914] device syzkaller0 entered promiscuous mode [ 168.799763][ T3959] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.806617][ T3959] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.893998][ T3959] device bridge_slave_0 entered promiscuous mode [ 168.955976][ T3959] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.987315][ T3959] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.994601][ T3959] device bridge_slave_1 entered promiscuous mode [ 169.170312][ T8] device bridge_slave_1 left promiscuous mode [ 169.190656][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.222967][ T8] device bridge_slave_0 left promiscuous mode [ 169.257416][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.301555][ T8] device veth1_macvtap left promiscuous mode [ 169.336522][ T8] device veth0_vlan left promiscuous mode [ 169.592933][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.600426][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.617513][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.626717][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.651974][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.658847][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.680277][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.689041][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.697022][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.703900][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.711846][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 169.726921][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.760579][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.844664][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.870109][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.906802][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 169.938689][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 170.005120][ T3959] device veth0_vlan entered promiscuous mode [ 170.031137][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 170.053553][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 170.116936][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.190921][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 170.241188][ T3959] device veth1_macvtap entered promiscuous mode [ 170.311011][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 170.330221][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 170.454315][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 170.479847][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 170.825516][ T4012] device syzkaller0 entered promiscuous mode [ 170.843239][ T4019] device wg2 entered promiscuous mode [ 171.340212][ T4058] device wg2 left promiscuous mode [ 171.418038][ T4058] device wg2 entered promiscuous mode [ 172.136467][ T4073] device syzkaller0 entered promiscuous mode [ 172.184111][ T4093] device wg2 entered promiscuous mode [ 172.335420][ T4107] device pim6reg1 entered promiscuous mode [ 172.923583][ T4124] device wg2 entered promiscuous mode [ 173.269422][ T4143] device pim6reg1 entered promiscuous mode [ 173.330771][ T4155] device wg2 entered promiscuous mode [ 174.581364][ T4182] device syzkaller0 entered promiscuous mode [ 174.590420][ T4059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.619012][ T4191] device pim6reg1 entered promiscuous mode [ 175.837423][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.858254][ T4232] device pim6reg1 entered promiscuous mode [ 175.879864][ T4231] device syzkaller0 entered promiscuous mode [ 176.273623][ T4253] device pim6reg1 entered promiscuous mode [ 176.458581][ T4261] device pim6reg1 entered promiscuous mode [ 177.296554][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 177.341860][ T4291] device pim6reg1 entered promiscuous mode [ 177.369081][ T4295] device pim6reg1 entered promiscuous mode [ 177.837651][ T4059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 177.869213][ T4326] device pim6reg1 entered promiscuous mode [ 177.924680][ T4328] device pim6reg1 entered promiscuous mode [ 178.267326][ T4360] device pim6reg1 entered promiscuous mode [ 178.311179][ T4365] device pim6reg1 entered promiscuous mode [ 179.046304][ T4395] device pim6reg1 entered promiscuous mode [ 179.568524][ T4423] device pim6reg1 entered promiscuous mode [ 181.340469][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.999889][ T5495] Â: renamed from pim6reg1 [ 207.146078][ T5527] Â: renamed from pim6reg1 [ 208.379875][ T5572] Â: renamed from pim6reg1 [ 209.598593][ T5610] Â: renamed from pim6reg1 [ 209.977573][ T5641] €Â0: renamed from pim6reg1 [ 211.169483][ T5663] Â: renamed from pim6reg1 [ 211.351017][ T5678] €Â0: renamed from pim6reg1 [ 212.511070][ T5711] Â: renamed from pim6reg1 [ 212.615841][ T5716] €Â0: renamed from pim6reg1 [ 213.836999][ T5742] Â: renamed from pim6reg1 [ 214.011558][ T5747] €Â0: renamed from pim6reg1 [ 216.199324][ T5789] €Â0: renamed from pim6reg1 [ 216.376804][ T5791] Â: renamed from pim6reg1 [ 222.061954][ T5840] Â: renamed from pim6reg1 [ 223.275129][ T5879] Â: renamed from pim6reg1 [ 227.380175][ T5926] Â: renamed from pim6reg1 [ 232.126318][ T5996] device syzkaller0 entered promiscuous mode [ 236.344835][ T6097] syz-executor.0[6097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.344918][ T6097] syz-executor.0[6097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.946894][ T6139] syz-executor.3[6139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.087947][ T6139] syz-executor.3[6139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.270548][ T6196] syz-executor.0[6196] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.317378][ T6196] syz-executor.0[6196] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.513812][ T6207] device syzkaller0 entered promiscuous mode [ 241.582315][ T6318] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 242.152733][ T6349] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 242.820674][ T6375] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 250.700647][ T6551] device pim6reg1 entered promiscuous mode [ 251.908116][ T28] audit: type=1400 audit(1718561915.517:119): avc: denied { ioctl } for pid=6603 comm="syz-executor.2" path="cgroup:[4026532480]" dev="nsfs" ino=4026532480 ioctlcmd=0x9436 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 252.826599][ T6643] device pim6reg1 entered promiscuous mode [ 256.256675][ T6708] syz-executor.2[6708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.256744][ T6708] syz-executor.2[6708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.323485][ T6708] syz-executor.2[6708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.371923][ T6708] syz-executor.2[6708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.131023][ T6741] syz-executor.3[6741] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.162220][ T6741] syz-executor.3[6741] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.211454][ T6741] syz-executor.3[6741] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.238874][ T6741] syz-executor.3[6741] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.490194][ T6774] syz-executor.4[6774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.525022][ T6774] syz-executor.4[6774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.539357][ T6906] bond_slave_1: mtu less than device minimum [ 259.799896][ T6936] bond_slave_1: mtu less than device minimum [ 262.529209][ T7213] bpf_get_probe_write_proto: 6 callbacks suppressed [ 262.529227][ T7213] syz-executor.2[7213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.555666][ T7213] syz-executor.2[7213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.569557][ T7219] tap0: tun_chr_ioctl cmd 1074025677 [ 262.599628][ T7219] tap0: linktype set to 780 [ 262.903473][ T7249] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 263.320806][ T7286] tap0: tun_chr_ioctl cmd 1074025677 [ 263.325949][ T7286] tap0: linktype set to 780 [ 265.307303][ T7377] device pim6reg1 entered promiscuous mode [ 266.306282][ T7453] device wg2 left promiscuous mode [ 266.320950][ T7453] device wg2 entered promiscuous mode [ 266.332436][ T7453] tap0: tun_chr_ioctl cmd 1074025677 [ 266.337667][ T7453] tap0: linktype set to 704 [ 268.452016][ T7640] device wg2 left promiscuous mode [ 268.541922][ T7640] device wg2 entered promiscuous mode [ 268.611358][ T7640] tap0: tun_chr_ioctl cmd 1074025677 [ 268.643820][ T7640] tap0: linktype set to 704 [ 269.337936][ T7684] device wg2 left promiscuous mode [ 269.377934][ T7684] device wg2 entered promiscuous mode [ 269.418125][ T7684] tap0: tun_chr_ioctl cmd 1074025677 [ 269.423289][ T7684] tap0: linktype set to 704 [ 269.843725][ T7721] device wg2 left promiscuous mode [ 269.899559][ T7721] device wg2 entered promiscuous mode [ 269.923354][ T7721] tap0: tun_chr_ioctl cmd 1074025677 [ 269.931636][ T7721] tap0: linktype set to 704 [ 272.110574][ T7772] device wg2 left promiscuous mode [ 272.169183][ T7779] device wg2 entered promiscuous mode [ 272.196399][ T7772] tap0: tun_chr_ioctl cmd 1074025677 [ 272.201840][ T7772] tap0: linktype set to 704 [ 274.112222][ T7813] device wg2 left promiscuous mode [ 274.141307][ T7813] device wg2 entered promiscuous mode [ 274.154451][ T7813] tap0: tun_chr_ioctl cmd 1074025677 [ 274.167762][ T7813] tap0: linktype set to 704 [ 276.844216][ T7936] bridge0: port 3(gretap0) entered blocking state [ 276.850661][ T7936] bridge0: port 3(gretap0) entered disabled state [ 276.857182][ T7936] device gretap0 entered promiscuous mode [ 276.877423][ T7936] bridge0: port 3(gretap0) entered blocking state [ 276.883707][ T7936] bridge0: port 3(gretap0) entered forwarding state [ 279.524129][ T8101] syz-executor.0[8101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.524195][ T8101] syz-executor.0[8101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.665794][ T8101] device syzkaller0 entered promiscuous mode [ 280.005620][ T8125] device wg2 left promiscuous mode [ 280.108756][ T8125] device wg2 entered promiscuous mode [ 280.208011][ T8125] tap0: tun_chr_ioctl cmd 1074025677 [ 280.248521][ T8125] tap0: linktype set to 704 [ 280.383380][ T8147] syz-executor.4[8147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.383448][ T8147] syz-executor.4[8147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.457119][ T8147] device syzkaller0 entered promiscuous mode [ 281.446789][ T8200] device wg2 left promiscuous mode [ 281.462213][ T8198] device pim6reg1 entered promiscuous mode [ 281.475991][ T8200] device wg2 entered promiscuous mode [ 281.493683][ T8200] tap0: tun_chr_ioctl cmd 1074025677 [ 281.498948][ T8200] tap0: linktype set to 704 [ 281.667985][ T8223] syz-executor.0[8223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.668057][ T8223] syz-executor.0[8223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.875432][ T8223] device syzkaller0 entered promiscuous mode [ 281.922073][ T8234] device pim6reg1 entered promiscuous mode [ 282.202384][ T8266] device pim6reg1 entered promiscuous mode [ 282.212940][ T8269] syz-executor.4[8269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.213003][ T8269] syz-executor.4[8269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.259703][ T8269] device syzkaller0 entered promiscuous mode [ 282.939366][ T8306] device wg2 left promiscuous mode [ 282.992767][ T8306] device wg2 entered promiscuous mode [ 283.102937][ T8306] tap0: tun_chr_ioctl cmd 1074025677 [ 283.136715][ T8306] tap0: linktype set to 704 [ 283.409177][ T8307] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.418258][ T8307] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.425561][ T8307] device bridge_slave_0 entered promiscuous mode [ 283.440815][ T8307] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.447990][ T8307] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.456598][ T8307] device bridge_slave_1 entered promiscuous mode [ 283.530683][ T2886] device bridge_slave_1 left promiscuous mode [ 283.561366][ T2886] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.568726][ T2886] device bridge_slave_0 left promiscuous mode [ 283.574732][ T2886] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.582625][ T2886] device veth1_macvtap left promiscuous mode [ 284.293729][ T8307] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.300611][ T8307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.307702][ T8307] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.314475][ T8307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.491120][ T1287] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.521944][ T1287] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.558751][ T8374] syz-executor.1[8374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.558820][ T8374] syz-executor.1[8374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.641846][ T8367] device syzkaller0 entered promiscuous mode [ 284.827519][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.839310][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.938941][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 284.983861][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.040632][ T1287] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.047504][ T1287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.105191][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.115690][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.137547][ T1287] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.144406][ T1287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.154974][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 285.162997][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.170809][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 285.178776][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 285.214746][ T8307] device veth0_vlan entered promiscuous mode [ 285.227635][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 285.236061][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 285.244367][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 285.309428][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.369903][ T8307] device veth1_macvtap entered promiscuous mode [ 285.420421][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.440728][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.511951][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 285.587721][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 285.679798][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 285.747962][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 285.756074][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 285.847830][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 285.855955][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 286.007591][ T8421] : renamed from ipvlan1 [ 286.201155][ T8432] syz-executor.3[8432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.201226][ T8432] syz-executor.3[8432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.348328][ T8432] device syzkaller0 entered promiscuous mode [ 286.522170][ T28] audit: type=1400 audit(1718561950.127:120): avc: denied { create } for pid=8453 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 286.526844][ T8457] : renamed from ipvlan1 [ 286.999825][ T8461] device syzkaller0 entered promiscuous mode [ 289.483632][ T28] audit: type=1400 audit(1718561953.087:121): avc: denied { write } for pid=8561 comm="syz-executor.3" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 289.627167][ T28] audit: type=1400 audit(1718561953.197:122): avc: denied { create } for pid=8561 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 289.774510][ T8586] device pim6reg1 entered promiscuous mode [ 290.451305][ T8614] device pim6reg1 entered promiscuous mode [ 290.769006][ T8630] device syzkaller0 entered promiscuous mode [ 292.204667][ T8689] device syzkaller0 entered promiscuous mode [ 292.465017][ T8724] device syzkaller0 entered promiscuous mode [ 292.490474][ T8724] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 292.946981][ T8740] device syzkaller0 entered promiscuous mode [ 292.995873][ T8746] device pim6reg1 entered promiscuous mode [ 293.300485][ T8763] device syzkaller0 entered promiscuous mode [ 293.900612][ T8785] device pim6reg1 entered promiscuous mode [ 294.542701][ T2886] bridge0: port 3(gretap0) entered disabled state [ 294.580686][ T2886] device gretap0 left promiscuous mode [ 294.648088][ T2886] bridge0: port 3(gretap0) entered disabled state [ 294.926768][ T2886] device bridge_slave_1 left promiscuous mode [ 294.932749][ T2886] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.941669][ T2886] device bridge_slave_0 left promiscuous mode [ 294.950378][ T2886] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.011669][ T2886] device veth1_macvtap left promiscuous mode [ 295.370037][ T8824] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.380466][ T8824] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.400816][ T8824] device bridge_slave_0 entered promiscuous mode [ 295.500252][ T8824] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.507112][ T8824] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.514487][ T8824] device bridge_slave_1 entered promiscuous mode [ 295.694069][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 295.701781][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.729131][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.757195][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.793502][ T1341] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.800393][ T1341] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.817727][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.829246][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.837788][ T1341] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.844656][ T1341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.853674][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 295.861853][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 295.878852][ T8853] device macsec0 entered promiscuous mode [ 295.892911][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 295.901206][ T1341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 295.946337][ T8824] device veth0_vlan entered promiscuous mode [ 295.966476][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 295.975192][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 295.982788][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 296.007465][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 296.025976][ T8824] device veth1_macvtap entered promiscuous mode [ 296.040170][ T8871] device syzkaller0 entered promiscuous mode [ 296.052465][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 296.066245][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 296.079178][ T28] audit: type=1400 audit(1718561959.687:123): avc: denied { mounton } for pid=8824 comm="syz-executor.1" path="/dev/binderfs" dev="devtmpfs" ino=370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 296.220494][ T8883] device pim6reg1 entered promiscuous mode [ 296.428772][ T8900] device macsec0 entered promiscuous mode [ 296.505009][ T8906] device syzkaller0 entered promiscuous mode [ 298.298810][ T8973] device pim6reg1 entered promiscuous mode [ 298.602960][ T8993] IPv6: sit1: Disabled Multicast RS [ 298.819729][ T9005] device pim6reg1 entered promiscuous mode [ 299.542880][ T9032] device syzkaller0 entered promiscuous mode [ 299.598101][ T9038] device pim6reg1 entered promiscuous mode [ 302.437485][ T9161] device pim6reg1 entered promiscuous mode [ 302.865895][ T9195] device syzkaller0 entered promiscuous mode [ 304.168822][ T8] device vlan1 left promiscuous mode [ 304.174056][ T8] bridge0: port 3(vlan1) entered disabled state [ 304.233677][ T8] device bridge_slave_1 left promiscuous mode [ 304.281221][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.342220][ T8] device bridge_slave_0 left promiscuous mode [ 304.384156][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.448459][ T8] device veth1_macvtap left promiscuous mode [ 304.477313][ T8] device veth0_vlan left promiscuous mode [ 305.076363][ T9278] device syzkaller0 entered promiscuous mode [ 305.433422][ T9265] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.488553][ T9265] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.536495][ T9265] device bridge_slave_0 entered promiscuous mode [ 305.591760][ T9265] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.651880][ T9265] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.720944][ T9265] device bridge_slave_1 entered promiscuous mode [ 306.082637][ T9265] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.089523][ T9265] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.096600][ T9265] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.103450][ T9265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.170783][ T4059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.196812][ T4059] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.224327][ T4059] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.252605][ T4059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 306.290847][ T4059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 306.312792][ T4059] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.319676][ T4059] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.351103][ T4059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 306.376929][ T4059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 306.404351][ T4059] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.411272][ T4059] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.430046][ T4059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 306.438299][ T4059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 306.446265][ T4059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 306.454213][ T4059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 306.488295][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 306.496499][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 306.516439][ T9265] device veth0_vlan entered promiscuous mode [ 306.537767][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 306.545519][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 306.568492][ T9265] device veth1_macvtap entered promiscuous mode [ 306.577380][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 306.584669][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 306.599972][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 306.615615][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 306.633654][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 306.658153][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 306.666277][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 306.696690][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 306.714991][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 307.031436][ T9393] device pim6reg1 entered promiscuous mode [ 312.459995][ T9620] device sit0 entered promiscuous mode [ 313.334911][ T9670] device sit0 left promiscuous mode [ 313.351261][ T9671] device sit0 entered promiscuous mode [ 313.978305][ T9707] device sit0 left promiscuous mode [ 314.108577][ T9712] device sit0 entered promiscuous mode [ 315.051456][ T9757] device pim6reg1 entered promiscuous mode [ 315.596512][ T9805] syz-executor.2[9805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.596573][ T9805] syz-executor.2[9805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.695153][ T9819] device syzkaller0 entered promiscuous mode [ 315.915461][ T9840] syz-executor.4[9840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.915549][ T9840] syz-executor.4[9840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.066130][ T9871] device syzkaller0 entered promiscuous mode [ 317.454242][ T9887] syz-executor.0[9887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.454311][ T9887] syz-executor.0[9887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.899600][ T9906] device syzkaller0 entered promiscuous mode [ 318.550244][ T9920] device sit0 entered promiscuous mode [ 319.935282][ T9964] device pim6reg1 entered promiscuous mode [ 320.596075][ T28] audit: type=1400 audit(1718561984.197:124): avc: denied { create } for pid=9991 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 321.508521][T10034] syz-executor.0[10034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.508591][T10034] syz-executor.0[10034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.525456][T10029] device pim6reg1 entered promiscuous mode [ 322.444675][T10079] syz-executor.0[10079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.444748][T10079] syz-executor.0[10079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.005908][T10078] device syzkaller0 entered promiscuous mode [ 323.061981][T10084] device sit0 entered promiscuous mode [ 323.305995][T10117] device syzkaller0 entered promiscuous mode [ 323.742414][T10175] device syzkaller0 entered promiscuous mode [ 323.980741][T10197] device pim6reg1 entered promiscuous mode [ 324.187522][T10221] device syzkaller0 entered promiscuous mode [ 325.057947][T10247] device pim6reg1 entered promiscuous mode [ 325.105357][T10245] device pim6reg1 entered promiscuous mode [ 325.743375][T10328] device syzkaller0 entered promiscuous mode [ 325.844777][T10337] device veth1_macvtap left promiscuous mode [ 325.851094][T10337] device macsec0 left promiscuous mode [ 325.864225][T10337] device veth1_macvtap entered promiscuous mode [ 325.870386][T10337] device macsec0 entered promiscuous mode [ 326.042305][T10363] device syzkaller0 entered promiscuous mode [ 326.414823][T10407] device syzkaller0 entered promiscuous mode [ 326.544316][T10414] device sit0 left promiscuous mode [ 326.627088][T10429] device sit0 entered promiscuous mode [ 326.818069][T10441] device syzkaller0 entered promiscuous mode [ 327.535712][T10497] device sit0 entered promiscuous mode [ 327.757098][T10539] device syzkaller0 entered promiscuous mode [ 327.812654][T10543] tap0: tun_chr_ioctl cmd 2147767506 [ 327.862883][T10546] device sit0 left promiscuous mode [ 327.954079][T10555] device sit0 entered promiscuous mode [ 328.147642][T10572] device syzkaller0 entered promiscuous mode [ 328.206007][T10581] tap0: tun_chr_ioctl cmd 2147767506 [ 328.384954][T10597] device sit0 left promiscuous mode [ 328.474396][T10610] device sit0 entered promiscuous mode [ 328.534464][T10612] device veth1_macvtap left promiscuous mode [ 328.540407][T10612] device macsec0 left promiscuous mode [ 328.559071][T10607] device syzkaller0 entered promiscuous mode [ 328.565582][T10613] device veth1_macvtap entered promiscuous mode [ 328.571737][T10613] device macsec0 entered promiscuous mode [ 328.606320][T10621] tap0: tun_chr_ioctl cmd 2147767506 [ 328.808913][T10658] device syzkaller0 entered promiscuous mode [ 328.845035][T10662] tap0: tun_chr_ioctl cmd 2147767506 [ 328.854731][T10664] syz-executor.1[10664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.854791][T10664] syz-executor.1[10664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.872808][T10668] syz-executor.2[10668] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.884488][T10668] syz-executor.2[10668] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.054913][T10696] syz-executor.3[10696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.066676][T10696] syz-executor.3[10696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.095087][T10692] device wg2 entered promiscuous mode [ 329.193452][T10703] device syzkaller0 entered promiscuous mode [ 329.526676][T10750] syz-executor.1[10750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.526738][T10750] syz-executor.1[10750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.632066][T10757] device syzkaller0 entered promiscuous mode [ 329.909228][T10784] device wg2 left promiscuous mode [ 329.949521][T10784] device wg2 entered promiscuous mode [ 330.188490][T10828] device sit0 left promiscuous mode [ 330.225935][T10831] device wg2 entered promiscuous mode [ 330.255340][T10828] device sit0 entered promiscuous mode [ 330.379118][T10850] syz-executor.3[10850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.379184][T10850] syz-executor.3[10850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.587350][T10867] device syzkaller0 entered promiscuous mode [ 331.197961][T10934] device sit0 left promiscuous mode [ 331.234443][T10934] device sit0 entered promiscuous mode [ 336.098047][T11042] bpf_get_probe_write_proto: 6 callbacks suppressed [ 336.098063][T11042] syz-executor.1[11042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.109993][T11042] syz-executor.1[11042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.017183][T11108] syz-executor.2[11108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.040210][T11108] syz-executor.2[11108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.110723][T11129] device sit0 left promiscuous mode [ 343.244747][T11129] device sit0 entered promiscuous mode [ 347.093056][T11166] device syzkaller0 entered promiscuous mode [ 347.108431][T11166] syzkaller0: tun_net_xmit 1280 [ 347.242152][T11184] device sit0 left promiscuous mode [ 347.325281][T11184] device sit0 entered promiscuous mode [ 347.528854][T11206] device syzkaller0 entered promiscuous mode [ 347.586382][T11208] device syzkaller0 entered promiscuous mode [ 347.981152][T11238] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 1 (only 8 groups) [ 348.069420][T11242] device syzkaller0 entered promiscuous mode [ 348.117871][T11247] device syzkaller0 entered promiscuous mode [ 348.544978][T11276] syz-executor.3[11276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.545049][T11276] syz-executor.3[11276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.739488][T11278] device bridge0 entered promiscuous mode [ 349.230268][T11287] device syzkaller0 entered promiscuous mode [ 349.296132][T11294] device syzkaller0 entered promiscuous mode [ 349.345034][T11301] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 349.373241][T11304] syz-executor.3[11304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.373307][T11304] syz-executor.3[11304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.401731][T11304] syz-executor.3[11304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.416853][T11306] €Â: renamed from pim6reg1 [ 349.433315][T11304] syz-executor.3[11304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.562099][T11313] device bridge0 entered promiscuous mode [ 350.139648][T11330] device syzkaller0 entered promiscuous mode [ 350.194323][T11333] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 350.343922][T11340] syz-executor.3[11340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.343985][T11340] syz-executor.3[11340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.396052][T11340] syz-executor.3[11340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.469559][T11340] syz-executor.3[11340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.598857][T11353] device syzkaller0 entered promiscuous mode [ 351.440344][T11397] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 351.609814][T11401] device bridge0 entered promiscuous mode [ 352.473340][T11427] device syzkaller0 entered promiscuous mode [ 352.555739][T11427] syzkaller0: tun_net_xmit 1280 [ 354.717949][T11600] device syzkaller0 entered promiscuous mode [ 354.736042][T11600] syzkaller0: tun_net_xmit 1280 [ 355.556879][T11640] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.565162][T11640] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.609754][T11640] device bridge_slave_0 entered promiscuous mode [ 355.642570][T11640] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.668865][T11640] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.697965][T11640] device bridge_slave_1 entered promiscuous mode [ 355.987349][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 355.994641][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 356.045148][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 356.068004][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.076212][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.083073][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.102206][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 356.112231][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 356.127560][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.134489][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.144654][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 356.152729][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 356.220909][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 356.238009][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 356.270817][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 356.296553][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 356.377713][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 356.429091][T11640] device veth0_vlan entered promiscuous mode [ 356.467028][ T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 356.487686][T11640] device veth1_macvtap entered promiscuous mode [ 356.548505][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 356.656415][ T4059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 356.678671][ T8] device bridge_slave_1 left promiscuous mode [ 356.684625][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.733376][ T8] device bridge_slave_0 left promiscuous mode [ 356.756953][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.789476][ T8] device veth1_macvtap left promiscuous mode [ 357.178581][T11745] bond_slave_1: mtu greater than device maximum [ 357.545196][T11777] bond_slave_1: mtu greater than device maximum [ 357.972222][T11797] device syzkaller0 entered promiscuous mode [ 358.334054][T11838] device syzkaller0 entered promiscuous mode [ 358.381641][T11852] bond_slave_1: mtu greater than device maximum [ 358.655161][T11883] device syzkaller0 entered promiscuous mode [ 359.470703][T11925] device syzkaller0 entered promiscuous mode [ 360.124686][T11980] device syzkaller0 entered promiscuous mode [ 360.694303][T12018] device syzkaller0 entered promiscuous mode [ 361.213901][T12056] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 361.787179][T12083] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 362.885421][T12166] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 363.138315][T12189] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 363.249653][T12204] bridge0: port 3(veth1_macvtap) entered blocking state [ 363.270432][T12204] bridge0: port 3(veth1_macvtap) entered disabled state [ 363.565393][T12229] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 364.154149][T12274] bridge0: port 3(veth1_macvtap) entered blocking state [ 364.166503][T12274] bridge0: port 3(veth1_macvtap) entered disabled state [ 364.307118][T12308] bridge0: port 3(veth1_macvtap) entered blocking state [ 364.321867][T12308] bridge0: port 3(veth1_macvtap) entered disabled state [ 364.387597][T12318] device pim6reg1 entered promiscuous mode [ 368.127916][T12352] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 372.139510][T12391] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 372.765282][T12423] bpf_get_probe_write_proto: 12 callbacks suppressed [ 372.765307][T12423] syz-executor.1[12423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.813719][T12423] syz-executor.1[12423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.159872][T12454] syz-executor.0[12454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.175129][T12454] syz-executor.0[12454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.208596][T12460] syz-executor.3[12460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.220688][T12460] syz-executor.3[12460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.428233][T12481] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 373.607622][T12513] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 373.718335][T12539] syz-executor.0[12539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.718389][T12539] syz-executor.0[12539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.916302][T12546] device wg2 left promiscuous mode [ 374.073819][T12580] syz-executor.3[12580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.074159][T12580] syz-executor.3[12580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.754344][T12641] device wg2 left promiscuous mode [ 374.984571][T12676] device syzkaller0 entered promiscuous mode [ 375.645068][T12737] device syzkaller0 entered promiscuous mode [ 376.151918][T12787] device syzkaller0 entered promiscuous mode [ 377.951005][ T28] audit: type=1400 audit(1718562041.557:125): avc: denied { create } for pid=12950 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 378.783221][T12983] device syzkaller0 entered promiscuous mode [ 378.855482][T12987] device pim6reg1 entered promiscuous mode [ 379.039829][T12982] device syzkaller0 entered promiscuous mode [ 379.245360][T13012] device pim6reg1 entered promiscuous mode [ 379.338138][T13010] device syzkaller0 entered promiscuous mode [ 379.616685][T13023] device syzkaller0 entered promiscuous mode [ 380.058299][T13031] device syzkaller0 entered promiscuous mode [ 380.504017][T13062] device syzkaller0 entered promiscuous mode [ 380.753342][T13100] device syzkaller0 entered promiscuous mode [ 380.864146][T13113] device syzkaller0 entered promiscuous mode [ 380.985301][T13139] device syzkaller0 entered promiscuous mode [ 381.244050][T13171] device syzkaller0 entered promiscuous mode [ 381.438058][T13169] device syzkaller0 entered promiscuous mode [ 381.515194][T13187] device syzkaller0 entered promiscuous mode [ 381.723188][T13218] device syzkaller0 entered promiscuous mode [ 382.031929][T13251] device syzkaller0 entered promiscuous mode [ 382.308161][T13289] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 382.331493][T13287] device syzkaller0 entered promiscuous mode [ 382.820165][T13319] device syzkaller0 entered promiscuous mode [ 382.960511][T13367] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 382.965442][T13365] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 382.975844][T13365] pim6reg0: linktype set to 0 [ 383.046154][T13381] device syzkaller0 entered promiscuous mode [ 383.348313][T13407] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 383.353932][T13407] pim6reg0: linktype set to 0 [ 383.628089][T13443] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 383.727500][T13455] device veth1_macvtap left promiscuous mode [ 383.757992][T13455] device veth1_macvtap entered promiscuous mode [ 383.764514][T13455] device macsec0 entered promiscuous mode [ 383.968439][T13487] device veth1_macvtap left promiscuous mode [ 383.974292][T13487] device macsec0 left promiscuous mode [ 383.991832][T13485] device syzkaller0 entered promiscuous mode [ 384.004666][T13487] device veth1_macvtap entered promiscuous mode [ 384.012689][T13487] device macsec0 entered promiscuous mode [ 384.058131][T13497] device bridge0 entered promiscuous mode [ 384.104412][T13505] GPL: port 1(veth0) entered blocking state [ 384.110226][T13505] GPL: port 1(veth0) entered disabled state [ 384.116119][T13505] device veth0 entered promiscuous mode [ 384.228131][T13516] device veth1_macvtap left promiscuous mode [ 384.233977][T13516] device macsec0 left promiscuous mode [ 384.246113][T13516] device veth1_macvtap entered promiscuous mode [ 384.252472][T13516] device macsec0 entered promiscuous mode [ 384.867632][T13587] GPL: port 1(veth0) entered blocking state [ 384.917701][T13587] GPL: port 1(veth0) entered disabled state [ 384.954931][T13587] device veth0 entered promiscuous mode [ 385.667448][T13603] device syzkaller0 entered promiscuous mode [ 385.920005][T13643] device veth1_macvtap left promiscuous mode [ 385.924299][T13646] bpf_get_probe_write_proto: 2 callbacks suppressed [ 385.924314][T13646] syz-executor.3[13646] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.932434][T13646] syz-executor.3[13646] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.938721][T13643] device veth1_macvtap entered promiscuous mode [ 385.964419][T13631] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 385.976103][T13643] device macsec0 entered promiscuous mode [ 386.029600][T13658] device syzkaller0 entered promiscuous mode [ 386.222614][T13650] device syzkaller0 entered promiscuous mode [ 386.286169][T13673] GPL: port 1(veth0) entered blocking state [ 386.292016][T13673] GPL: port 1(veth0) entered disabled state [ 386.300202][T13673] device veth0 entered promiscuous mode [ 386.332093][T13681] device veth1_macvtap left promiscuous mode [ 386.349424][T13681] device veth1_macvtap entered promiscuous mode [ 386.355562][T13681] device macsec0 entered promiscuous mode [ 386.361403][T13679] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 386.435159][T13697] GPL: port 1(veth0) entered blocking state [ 386.441029][T13697] GPL: port 1(veth0) entered disabled state [ 386.447279][T13697] device veth0 entered promiscuous mode [ 386.464500][T13700] device syzkaller0 entered promiscuous mode [ 386.800487][T13717] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 386.882056][T13712] device syzkaller0 entered promiscuous mode [ 386.972830][T13731] device syzkaller0 entered promiscuous mode [ 387.122267][T13741] device syzkaller0 entered promiscuous mode [ 387.299791][T13757] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 388.295850][T13778] device syzkaller0 entered promiscuous mode [ 389.618230][T13829] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.079878][T13839] device syzkaller0 entered promiscuous mode [ 390.498981][T13855] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 390.654281][T13866] device syzkaller0 entered promiscuous mode [ 390.724423][T13875] device syzkaller0 entered promiscuous mode [ 391.278315][T13878] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.299065][ T10] device veth0 left promiscuous mode [ 391.304218][ T10] GPL: port 1(veth0) entered disabled state [ 391.312387][ T10] device bridge_slave_1 left promiscuous mode [ 391.319308][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.351447][ T10] device bridge_slave_0 left promiscuous mode [ 391.367205][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.408202][ T10] device veth1_macvtap left promiscuous mode [ 392.172831][T13872] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.180820][T13872] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.188188][T13872] device bridge_slave_0 entered promiscuous mode [ 392.206692][T13872] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.232994][T13872] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.240359][T13872] device bridge_slave_1 entered promiscuous mode [ 392.303555][T13911] device syzkaller0 entered promiscuous mode [ 392.558801][T13921] device syzkaller0 entered promiscuous mode [ 392.670244][T13913] device syzkaller0 entered promiscuous mode [ 392.689037][T13935] device veth1_macvtap left promiscuous mode [ 392.727457][T13935] device veth1_macvtap entered promiscuous mode [ 392.747162][T13935] device macsec0 entered promiscuous mode [ 392.989084][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 393.000769][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 393.037824][T12644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 393.058011][T12644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 393.086261][T12644] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.093135][T12644] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.134438][T12644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 393.173314][T12644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 393.201636][T12644] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.208525][T12644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 393.254535][T12644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 393.293119][T13964] device veth1_macvtap left promiscuous mode [ 393.298983][T13964] device macsec0 left promiscuous mode [ 393.330397][T13965] device veth1_macvtap entered promiscuous mode [ 393.356769][T13965] device macsec0 entered promiscuous mode [ 393.369946][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 393.382314][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 393.415013][T13872] device veth0_vlan entered promiscuous mode [ 393.479124][T12644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 393.497707][T12644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 393.558089][T12644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 393.604877][T12644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 393.653665][T12644] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 393.699604][T12644] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 393.749162][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 393.787639][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 393.848906][T13872] device veth1_macvtap entered promiscuous mode [ 393.888757][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 393.896513][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 393.953008][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 394.039684][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 394.067605][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 394.252721][T14005] device veth1_macvtap left promiscuous mode [ 394.266956][T14005] device macsec0 left promiscuous mode [ 394.285088][T14005] device veth1_macvtap entered promiscuous mode [ 394.305427][T14005] device macsec0 entered promiscuous mode [ 395.108140][T14046] device syzkaller0 entered promiscuous mode [ 395.439290][T14083] device veth1_macvtap left promiscuous mode [ 395.445133][T14083] device macsec0 left promiscuous mode [ 395.456388][T14083] device veth1_macvtap entered promiscuous mode [ 395.462680][T14083] device macsec0 entered promiscuous mode [ 396.477446][T14115] device veth1_macvtap left promiscuous mode [ 396.505903][T14115] device macsec0 left promiscuous mode [ 396.530037][T14116] device veth1_macvtap entered promiscuous mode [ 396.536536][T14116] device macsec0 entered promiscuous mode [ 396.581878][ T28] audit: type=1400 audit(1718562060.187:126): avc: denied { create } for pid=14120 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 396.718753][T14145] device veth1_macvtap left promiscuous mode [ 396.757354][T14145] device macsec0 left promiscuous mode [ 397.487787][T14151] device veth1_macvtap entered promiscuous mode [ 397.502550][T14151] device macsec0 entered promiscuous mode [ 400.217583][T14255] device pim6reg1 entered promiscuous mode [ 400.756379][T14259] device veth1_macvtap left promiscuous mode [ 400.767188][T14259] device veth1_macvtap entered promiscuous mode [ 400.915457][T14280] device wg2 entered promiscuous mode [ 400.950212][T14283] device veth1_macvtap left promiscuous mode [ 400.974429][T14283] device veth1_macvtap entered promiscuous mode [ 401.105752][T14294] device pim6reg1 entered promiscuous mode [ 401.926600][T14327] device veth1_macvtap left promiscuous mode [ 401.938981][T14327] device macsec0 left promiscuous mode [ 401.980375][T14327] device veth1_macvtap entered promiscuous mode [ 402.009226][T14327] device macsec0 entered promiscuous mode [ 402.118528][T14338] device pim6reg1 entered promiscuous mode [ 402.750211][T14359] device veth1_macvtap left promiscuous mode [ 402.788062][T14359] device veth1_macvtap entered promiscuous mode [ 402.813898][T14359] device macsec0 entered promiscuous mode [ 402.834901][T14365] device pim6reg1 entered promiscuous mode [ 403.098485][T14402] device pim6reg1 entered promiscuous mode [ 404.971315][T14532] syz-executor.4[14532] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.971388][T14532] syz-executor.4[14532] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.018995][T14532] syz-executor.4[14532] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.037589][T14532] syz-executor.4[14532] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.070460][T14539] device pim6reg1 entered promiscuous mode [ 405.942222][T14578] syz-executor.0[14578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.942306][T14578] syz-executor.0[14578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.997915][T14587] syz-executor.0[14587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.015307][T14587] syz-executor.0[14587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.510621][T14730] device pim6reg1 entered promiscuous mode [ 410.440011][T14764] device pim6reg1 entered promiscuous mode [ 411.695798][T14815] syz-executor.3[14815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.695870][T14815] syz-executor.3[14815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.328234][T14878] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 420.636166][T15074] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) [ 421.599040][T15100] device syzkaller0 entered promiscuous mode [ 422.051709][T15136] device syzkaller0 entered promiscuous mode [ 422.128074][T15146] device pim6reg1 entered promiscuous mode [ 422.535483][T15182] device pim6reg1 entered promiscuous mode [ 422.808243][T15196] device bridge0 entered promiscuous mode [ 423.627346][T15225] device bridge0 entered promiscuous mode [ 423.879642][T15252] device pim6reg1 entered promiscuous mode [ 424.267704][T15269] device bridge0 entered promiscuous mode [ 424.488893][T15288] device pim6reg1 entered promiscuous mode [ 425.120402][T15327] device pim6reg1 entered promiscuous mode [ 425.228955][T15333] device veth1_macvtap left promiscuous mode [ 425.288291][T15333] device macsec0 left promiscuous mode [ 425.485772][T15356] device pim6reg1 entered promiscuous mode [ 425.641056][T15365] device veth1_macvtap left promiscuous mode [ 425.665977][T15365] device macsec0 left promiscuous mode [ 426.158552][T15407] device syzkaller0 entered promiscuous mode [ 427.322236][T15469] device syzkaller0 entered promiscuous mode [ 428.012062][T15514] device syzkaller0 entered promiscuous mode [ 429.255541][T15588] device syzkaller0 entered promiscuous mode [ 429.517964][T15630] device syzkaller0 entered promiscuous mode [ 430.976902][T15746] device pim6reg1 entered promiscuous mode [ 431.302808][T15783] device pim6reg1 entered promiscuous mode [ 431.443884][T15815] device syzkaller0 entered promiscuous mode [ 431.665352][T15857] device syzkaller0 entered promiscuous mode [ 431.853534][T15887] device sit0 entered promiscuous mode [ 432.087691][T15913] device syzkaller0 entered promiscuous mode [ 432.217795][T15894] device syzkaller0 entered promiscuous mode [ 432.243854][T15930] device sit0 left promiscuous mode [ 432.271026][T15937] device sit0 entered promiscuous mode [ 432.574772][T15982] device syzkaller0 entered promiscuous mode [ 432.589417][T15981] device sit0 entered promiscuous mode [ 432.797351][T15997] device syzkaller0 entered promiscuous mode [ 433.014943][T16001] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.022138][T16001] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.032088][T16001] device bridge_slave_0 entered promiscuous mode [ 433.056008][T16001] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.063116][T16001] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.070439][T16001] device bridge_slave_1 entered promiscuous mode [ 433.609645][T16051] device syzkaller0 entered promiscuous mode [ 437.080314][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 437.087907][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 437.097386][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 437.117869][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 437.135916][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.142800][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 437.192212][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 437.217695][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 437.258049][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 437.291535][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.298428][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.333993][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 437.370581][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 437.410785][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 437.454437][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 437.530145][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 437.541954][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 437.562234][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 437.570367][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 437.579007][T16001] device veth0_vlan entered promiscuous mode [ 437.587337][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 437.595224][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 437.606623][T16001] device veth1_macvtap entered promiscuous mode [ 437.614112][ T8] device veth0 left promiscuous mode [ 437.619790][ T8] GPL: port 1(veth0) entered disabled state [ 437.629088][ T8] device bridge_slave_1 left promiscuous mode [ 437.637022][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.651429][ T8] device bridge_slave_0 left promiscuous mode [ 437.698684][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.711278][ T8] device veth1_macvtap left promiscuous mode [ 441.270960][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 441.289144][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 441.297092][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 441.365189][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 441.375274][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 441.423193][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 441.468101][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 441.522132][T16110] device sit0 left promiscuous mode [ 441.570278][T16110] device sit0 entered promiscuous mode [ 441.810663][T16128] Â: renamed from pim6reg1 [ 442.766168][T16158] device sit0 entered promiscuous mode [ 443.353698][T16188] Â: renamed from pim6reg1 [ 444.354817][T16223] Â: renamed from pim6reg1 [ 444.915945][T16245] device sit0 left promiscuous mode [ 444.958782][T16245] device sit0 entered promiscuous mode [ 445.106491][T16251] Â: renamed from pim6reg1 [ 446.169547][T16277] device syzkaller0 entered promiscuous mode [ 446.237469][T16297] device sit0 left promiscuous mode [ 446.288877][T16298] device sit0 entered promiscuous mode [ 447.350665][T16332] device syzkaller0 entered promiscuous mode [ 448.058322][T16386] device syzkaller0 entered promiscuous mode [ 448.598314][T16420] Â: renamed from pim6reg1 [ 448.746709][T16431] device syzkaller0 entered promiscuous mode [ 449.136502][T16457] Â: renamed from pim6reg1 [ 449.861813][T16487] Â: renamed from pim6reg1 [ 450.704586][T16570] device pim6reg1 entered promiscuous mode [ 452.645981][T16714] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.718581][T16714] bridge0: port 1(bridge_slave_0) entered disabled state [ 452.739415][T16714] device bridge_slave_0 entered promiscuous mode [ 452.785669][T16714] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.821364][T16714] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.848046][T16714] device bridge_slave_1 entered promiscuous mode [ 453.045745][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 453.053187][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 453.062137][ T464] device bridge_slave_1 left promiscuous mode [ 453.069007][ T464] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.076566][ T464] device bridge_slave_0 left promiscuous mode [ 453.082783][ T464] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.090849][ T464] device veth1_macvtap left promiscuous mode [ 453.375561][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 453.383857][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 453.391949][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 453.398813][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 453.406057][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 453.414925][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 453.422981][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 453.429833][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 453.454909][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 453.478158][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 453.505581][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 453.519373][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 453.541912][T16714] device veth0_vlan entered promiscuous mode [ 453.588359][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 453.596811][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 453.616760][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 453.653489][T16714] device veth1_macvtap entered promiscuous mode [ 453.679323][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 453.709783][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 453.726155][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 453.922306][ T28] audit: type=1400 audit(1718562117.527:127): avc: denied { create } for pid=16835 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 455.256254][T16874] device syzkaller0 entered promiscuous mode [ 455.426388][T16905] device pim6reg1 entered promiscuous mode [ 455.971493][T16942] device syzkaller0 entered promiscuous mode [ 456.335231][T16965] device pim6reg1 entered promiscuous mode [ 456.621102][T17003] device sit0 left promiscuous mode [ 456.694020][T17003] device sit0 entered promiscuous mode [ 457.395299][T17058] device pim6reg1 entered promiscuous mode [ 458.340372][T17138] device syzkaller0 entered promiscuous mode [ 458.978584][T17177] device syzkaller0 entered promiscuous mode [ 459.753283][T17221] device syzkaller0 entered promiscuous mode [ 460.505219][T17218] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.521065][T17218] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.553602][T17218] device bridge_slave_0 entered promiscuous mode [ 460.560552][T17218] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.567401][T17218] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.574680][T17218] device bridge_slave_1 entered promiscuous mode [ 460.802046][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 460.812086][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 460.871043][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 460.896377][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 460.905682][ T1287] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.912556][ T1287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 460.930060][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 460.939657][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 460.947778][ T1287] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.954631][ T1287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.001326][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 461.012355][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 461.020415][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 461.034721][T17277] device pim6reg1 entered promiscuous mode [ 461.044644][ T10] device bridge_slave_1 left promiscuous mode [ 461.051772][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.063722][ T10] device bridge_slave_0 left promiscuous mode [ 461.074312][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 461.100001][ T10] device veth1_macvtap left promiscuous mode [ 461.106504][ T10] device veth0_vlan left promiscuous mode [ 461.337372][ T4059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 461.363074][T17218] device veth0_vlan entered promiscuous mode [ 461.372605][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 461.381267][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 461.389129][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 461.403184][T17218] device veth1_macvtap entered promiscuous mode [ 461.468638][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 461.485193][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 461.494506][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 461.882869][T17323] device sit0 entered promiscuous mode [ 462.121285][T17332] device syzkaller0 entered promiscuous mode [ 462.257846][T17358] device sit0 left promiscuous mode [ 462.419771][T17358] device sit0 entered promiscuous mode [ 463.155544][T17381] device syzkaller0 entered promiscuous mode [ 463.235782][T17387] device syzkaller0 entered promiscuous mode [ 463.309283][T17398] device sit0 left promiscuous mode [ 463.777180][ T28] audit: type=1400 audit(1718562127.377:128): avc: denied { create } for pid=17416 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 464.184942][T17427] syz-executor.0[17427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.185011][T17427] syz-executor.0[17427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.212070][T17427] syz-executor.0[17427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.224258][T17427] syz-executor.0[17427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.237076][T17427] syz-executor.0[17427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.256950][T17427] syz-executor.0[17427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.347526][T17500] syz-executor.0[17500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.359296][T17500] syz-executor.0[17500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.376152][T17500] syz-executor.0[17500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.403805][T17500] syz-executor.0[17500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.760007][T17544] device sit0 entered promiscuous mode [ 469.583718][T17650] device sit0 left promiscuous mode [ 469.626019][T17650] device sit0 entered promiscuous mode [ 470.063519][T17684] device syzkaller0 entered promiscuous mode [ 470.111123][T17701] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 470.116643][T17701] pim6reg0: linktype set to 821 [ 470.424279][T17705] device syzkaller0 entered promiscuous mode [ 470.517888][T17733] device syzkaller0 entered promiscuous mode [ 470.567926][T17752] device veth1_macvtap left promiscuous mode [ 470.602694][T17752] device veth1_macvtap entered promiscuous mode [ 470.608819][T17752] device macsec0 entered promiscuous mode [ 470.666847][T17762] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 470.674174][T17762] pim6reg0: linktype set to 821 [ 470.698360][T17766] device sit0 left promiscuous mode [ 470.717480][T17766] device sit0 entered promiscuous mode [ 471.134276][T17806] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 471.139859][T17806] pim6reg0: linktype set to 821 [ 471.253115][T17826] Â: renamed from pim6reg1 [ 471.346168][T17844] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 471.351716][T17844] pim6reg0: linktype set to 821 [ 471.363620][T17842] device pim6reg1 entered promiscuous mode [ 471.532570][T17874] device veth0_vlan left promiscuous mode [ 471.539717][T17874] device veth0_vlan entered promiscuous mode [ 471.554142][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 471.580046][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 471.596620][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 471.824189][T17890] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.094874][T17916] device veth0_vlan left promiscuous mode [ 472.103109][T17916] device veth0_vlan entered promiscuous mode [ 472.116620][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 472.126873][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 472.174991][ T1287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 473.226051][T17945] device syzkaller0 entered promiscuous mode [ 473.244117][T17954] Â: renamed from pim6reg1 [ 473.512746][T17978] Â: renamed from pim6reg1 [ 473.546522][T17979] device syzkaller0 entered promiscuous mode [ 473.752234][T18004] device veth0_vlan left promiscuous mode [ 473.758509][T18004] device veth0_vlan entered promiscuous mode [ 473.943273][T18016] Â: renamed from pim6reg1 [ 474.673976][T18055] device syzkaller0 entered promiscuous mode [ 475.287249][T18085] device syzkaller0 entered promiscuous mode [ 475.398609][T18098] device syzkaller0 entered promiscuous mode [ 475.558209][T18110] bpf_get_probe_write_proto: 2 callbacks suppressed [ 475.558228][T18110] syz-executor.3[18110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.564929][T18110] syz-executor.3[18110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.681988][T18119] device veth0_vlan left promiscuous mode [ 475.703474][T18119] device veth0_vlan entered promiscuous mode [ 476.356774][T18140] syz-executor.4[18140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 476.356834][T18140] syz-executor.4[18140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 476.552668][T18163] device veth0_vlan left promiscuous mode [ 476.572403][T18163] device veth0_vlan entered promiscuous mode [ 476.580448][T12644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 476.588815][T12644] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 476.596137][T12644] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 476.731764][T18176] syz-executor.3[18176] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 476.731837][T18176] syz-executor.3[18176] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.022750][T18191] device syzkaller0 entered promiscuous mode [ 477.581044][T18213] syz-executor.0[18213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.581114][T18213] syz-executor.0[18213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.741702][T18218] device syzkaller0 entered promiscuous mode [ 478.489358][T18244] syz-executor.2[18244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.489429][T18244] syz-executor.2[18244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 479.121172][T18271] device veth0_vlan left promiscuous mode [ 479.511495][T18271] device veth0_vlan entered promiscuous mode [ 480.146873][T18311] device syzkaller0 entered promiscuous mode [ 481.034592][T18353] device syzkaller0 entered promiscuous mode [ 481.270796][T18373] bpf_get_probe_write_proto: 2 callbacks suppressed [ 481.270814][T18373] syz-executor.4[18373] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.294158][T18373] syz-executor.4[18373] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.327464][T18373] syz-executor.4[18373] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.356467][T18373] syz-executor.4[18373] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.544855][T18394] device syzkaller0 entered promiscuous mode [ 481.681593][T18406] syz-executor.1[18406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.681665][T18406] syz-executor.1[18406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.694670][T18406] syz-executor.1[18406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.708278][T18406] syz-executor.1[18406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.979841][T18436] syz-executor.4[18436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 482.006765][T18432] device veth0_vlan left promiscuous mode [ 482.026464][T18436] syz-executor.4[18436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 482.038586][T18432] device veth0_vlan entered promiscuous mode [ 482.091123][ T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 482.105789][ T65] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 482.131391][ T65] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 482.238418][T18435] device lo entered promiscuous mode [ 482.806646][T18473] device syzkaller0 entered promiscuous mode [ 483.520012][T18517] device syzkaller0 entered promiscuous mode [ 485.508689][T18639] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.516868][T18639] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.740594][T18669] device syzkaller0 entered promiscuous mode [ 485.856906][T18674] device syzkaller0 entered promiscuous mode [ 486.407862][T18723] device syzkaller0 entered promiscuous mode [ 486.446281][T18722] device syzkaller0 entered promiscuous mode [ 487.149803][T18761] bpf_get_probe_write_proto: 6 callbacks suppressed [ 487.149821][T18761] syz-executor.2[18761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.166791][T18761] syz-executor.2[18761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.200032][T18761] syz-executor.2[18761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.211713][T18761] syz-executor.2[18761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.489259][T18803] syz-executor.4[18803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.504905][T18803] syz-executor.4[18803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.546584][T18803] syz-executor.4[18803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.564260][T18803] syz-executor.4[18803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.678357][T18819] bridge0: port 2(bridge_slave_1) entered disabled state [ 487.698217][T18819] device bridge0 left promiscuous mode [ 487.707001][T18819] device bridge_slave_1 left promiscuous mode [ 487.713071][T18819] bridge0: port 2(bridge_slave_1) entered disabled state [ 487.720400][T18819] device bridge_slave_0 left promiscuous mode [ 487.726411][T18819] bridge0: port 1(bridge_slave_0) entered disabled state [ 488.178008][T18872] bridge0: port 2(bridge_slave_1) entered disabled state [ 488.185818][T18872] bridge0: port 1(bridge_slave_0) entered disabled state [ 488.247838][T18872] device bridge0 left promiscuous mode [ 488.280436][T18878] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 488.717071][T18915] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 489.086394][T18943] device syzkaller0 entered promiscuous mode [ 489.924777][T18985] device syzkaller0 entered promiscuous mode [ 490.615880][T19017] bridge0: port 2(bridge_slave_1) entered disabled state [ 490.690087][T19017] device bridge0 left promiscuous mode [ 495.022314][T19276] device pim6reg1 entered promiscuous mode [ 495.267036][T19285] device pim6reg1 entered promiscuous mode [ 495.454613][T19302] device pim6reg1 entered promiscuous mode [ 495.888166][T19338] device pim6reg1 entered promiscuous mode [ 496.124836][T19359] tap0: tun_chr_ioctl cmd 1074025677 [ 496.150766][T19359] tap0: linktype set to 1 [ 496.303910][T19369] device veth0_vlan left promiscuous mode [ 496.382186][T19369] device veth0_vlan entered promiscuous mode [ 496.499605][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 496.517163][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 496.560588][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 497.037682][T19396] tap0: tun_chr_ioctl cmd 1074025677 [ 497.073532][T19396] tap0: linktype set to 1 [ 497.101122][T19397] device pim6reg1 entered promiscuous mode [ 497.773591][T19424] device pim6reg1 entered promiscuous mode [ 498.059037][T19435] device team_slave_1 entered promiscuous mode [ 498.101682][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 498.122982][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 498.665726][T19447] syz-executor.3[19447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.665801][T19447] syz-executor.3[19447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 499.199690][T19480] syz-executor.0[19480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 499.257786][T19484] syz-executor.0[19484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 499.276356][T19482] device veth0_vlan left promiscuous mode [ 499.327340][T19480] syz-executor.0[19480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 499.347868][T19484] syz-executor.0[19484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 499.420259][T19482] device veth0_vlan entered promiscuous mode [ 499.712917][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 499.729228][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 499.737177][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 499.896834][T19514] syz-executor.0[19514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 499.896901][T19514] syz-executor.0[19514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 499.950622][T19517] O3ãc¤±: renamed from bridge_slave_0 [ 500.337410][T19543] syz-executor.2[19543] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 500.337483][T19543] syz-executor.2[19543] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 501.161689][T19583] O3ãc¤±: renamed from bridge_slave_0 [ 501.560676][T19605] device veth0_vlan left promiscuous mode [ 501.590824][T19605] device veth0_vlan entered promiscuous mode [ 501.668224][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 501.686546][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 501.725829][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 502.212523][T19655] O3ãc¤±: renamed from bridge_slave_0 [ 503.179079][T19667] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 503.186717][T19667] #PF: supervisor instruction fetch in kernel mode [ 503.193134][T19667] #PF: error_code(0x0010) - not-present page [ 503.198950][T19667] PGD 144627067 P4D 144627067 PUD 13937f067 PMD 0 [ 503.205285][T19667] Oops: 0010 [#1] PREEMPT SMP KASAN [ 503.210322][T19667] CPU: 1 PID: 19667 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00009-g25216be1ac5e #0 [ 503.220301][T19667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 503.230284][T19667] RIP: 0010:0x0 [ 503.233580][T19667] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 503.240790][T19667] RSP: 0018:ffffc9000152f908 EFLAGS: 00010246 [ 503.246687][T19667] RAX: 1ffff11025b58e17 RBX: ffff88812dac70b8 RCX: 0000000000040000 [ 503.254498][T19667] RDX: ffffc90002c5c000 RSI: 000000000003b960 RDI: ffff88812daf0000 [ 503.262307][T19667] RBP: ffffc9000152f930 R08: ffffffff841d8707 R09: ffff8881002a7b00 [ 503.270122][T19667] R10: 0000000000000010 R11: dffffc0000000001 R12: 0000000000000004 [ 503.277928][T19667] R13: dffffc0000000000 R14: ffff88812daf0000 R15: dffffc0000000000 [ 503.285742][T19667] FS: 00007f95d65926c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 503.294503][T19667] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 503.300926][T19667] CR2: ffffffffffffffd6 CR3: 000000014073c000 CR4: 00000000003506a0 [ 503.308740][T19667] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 503.316556][T19667] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 503.324364][T19667] Call Trace: [ 503.327484][T19667] [ 503.330264][T19667] ? __die_body+0x62/0xb0 [ 503.334428][T19667] ? __die+0x7e/0x90 [ 503.338160][T19667] ? page_fault_oops+0x7f9/0xa90 [ 503.342934][T19667] ? kernelmode_fixup_or_oops+0x270/0x270 [ 503.348489][T19667] ? kmem_cache_free+0x291/0x510 [ 503.353265][T19667] ? kfree_skbmem+0x104/0x170 [ 503.357779][T19667] ? preempt_schedule_notrace+0x140/0x140 [ 503.363328][T19667] ? is_errata93+0xc7/0x240 [ 503.367669][T19667] ? exc_page_fault+0x537/0x700 [ 503.372359][T19667] ? asm_exc_page_fault+0x27/0x30 [ 503.377221][T19667] ? sk_psock_verdict_data_ready+0xf7/0x160 [ 503.383032][T19667] sk_psock_verdict_data_ready+0x129/0x160 [ 503.388672][T19667] unix_stream_sendmsg+0x8fd/0x1070 [ 503.393717][T19667] ? unix_stream_sendmsg+0x901/0x1070 [ 503.398917][T19667] ? unix_show_fdinfo+0x2f0/0x2f0 [ 503.403797][T19667] ? security_socket_sendmsg+0x82/0xb0 [ 503.409071][T19667] ? unix_show_fdinfo+0x2f0/0x2f0 [ 503.413931][T19667] ____sys_sendmsg+0x5d3/0x9a0 [ 503.418644][T19667] ? __sys_sendmsg_sock+0x40/0x40 [ 503.423496][T19667] __sys_sendmsg+0x2a9/0x390 [ 503.427923][T19667] ? ____sys_sendmsg+0x9a0/0x9a0 [ 503.432702][T19667] ? restore_fpregs_from_fpstate+0xfc/0x230 [ 503.438430][T19667] ? __kasan_check_write+0x14/0x20 [ 503.443368][T19667] ? fpregs_restore_userregs+0x130/0x290 [ 503.448845][T19667] __x64_sys_sendmsg+0x7f/0x90 [ 503.453438][T19667] do_syscall_64+0x3d/0xb0 [ 503.457689][T19667] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 503.463417][T19667] RIP: 0033:0x7f95d587cea9 [ 503.467670][T19667] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 503.487114][T19667] RSP: 002b:00007f95d65920c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 503.495358][T19667] RAX: ffffffffffffffda RBX: 00007f95d59b3f80 RCX: 00007f95d587cea9 [ 503.503164][T19667] RDX: 0000000000000003 RSI: 0000000020000980 RDI: 0000000000000007 [ 503.510977][T19667] RBP: 00007f95d58ebff4 R08: 0000000000000000 R09: 0000000000000000 [ 503.518787][T19667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 503.526597][T19667] R13: 000000000000000b R14: 00007f95d59b3f80 R15: 00007ffd316ea7e8 [ 503.534425][T19667] [ 503.537275][T19667] Modules linked in: [ 503.541025][T19667] CR2: 0000000000000000 [ 503.545002][T19667] ---[ end trace 0000000000000000 ]--- [ 503.550292][T19667] RIP: 0010:0x0 [ 503.553598][T19667] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 503.560797][T19667] RSP: 0018:ffffc9000152f908 EFLAGS: 00010246 [ 503.566696][T19667] RAX: 1ffff11025b58e17 RBX: ffff88812dac70b8 RCX: 0000000000040000 [ 503.574508][T19667] RDX: ffffc90002c5c000 RSI: 000000000003b960 RDI: ffff88812daf0000 [ 503.582321][T19667] RBP: ffffc9000152f930 R08: ffffffff841d8707 R09: ffff8881002a7b00 [ 503.590137][T19667] R10: 0000000000000010 R11: dffffc0000000001 R12: 0000000000000004 [ 503.597952][T19667] R13: dffffc0000000000 R14: ffff88812daf0000 R15: dffffc0000000000 [ 503.605753][T19667] FS: 00007f95d65926c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 503.614525][T19667] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 503.620941][T19667] CR2: ffffffffffffffd6 CR3: 000000014073c000 CR4: 00000000003506a0 [ 503.628757][T19667] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 503.636561][T19667] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 503.644380][T19667] Kernel panic - not syncing: Fatal exception [ 503.650523][T19667] Kernel Offset: disabled [ 503.654639][T19667] Rebooting in 86400 seconds..